147411][T28186] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 05:09:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x22, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:00 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0, 0x2}, 0x1c) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) [ 488.896733][ T28] audit: type=1800 audit(1590988140.487:864): pid=28223 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16082 res=0 [ 488.933285][T28223] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:00 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'veth1_macvtap\x00', {0x2, 0x4e20, @loopback}}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 489.154255][ T28] audit: type=1800 audit(1590988140.737:865): pid=28238 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16082 res=0 [ 489.189054][T28238] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f0000000100)) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="00e60041", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x28182, 0x0) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280)=@gcm_256={{0x303}, "152e82057151eb39", "d192f733af0901a5853582897bf09cb013a881316fe67c43ba3e7c0970e410a0", "056ecaa9", "6039fb2289aef722"}, 0x38) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) keyctl$get_persistent(0x16, r6, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000300)=0x1e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) read$dsp(0xffffffffffffffff, &(0x7f0000000000)=""/159, 0x9f) r7 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000340)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x0, @private1, 0x1000}, @in6={0xa, 0x4e22, 0x4, @private0={0xfc, 0x0, [], 0x1}, 0x40}, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x1c}, 0x7ff}, @in6={0xa, 0x4e21, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfffff000}, @in={0x2, 0x4e24, @rand_addr=0x64010100}], 0xa0) 05:09:01 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:01 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@empty, r2}, 0x14) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) read$fb(r4, &(0x7f00000005c0)=""/216, 0xd8) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x208300, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x6}, 0x8) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000200)={0x324, r7, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xd8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8d0b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xe7ed}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK={0xec, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x600000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fb3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa43f}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x130, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x54}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x70}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb93c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x46}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x324}, 0x1, 0x0, 0x0, 0x400}, 0x2040001) [ 489.630223][ T28] audit: type=1800 audit(1590988141.217:866): pid=28263 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16033 res=0 [ 489.661263][T28263] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000009, 0x80000001, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40, 0x0) 05:09:01 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) [ 489.940467][ T28] audit: type=1800 audit(1590988141.527:867): pid=28281 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16033 res=0 [ 489.956941][T28281] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x6, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:01 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000000)=[{{0x2, 0x0, 0x1}, {0x3, 0x1, 0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x1}}, {{0xfff, 0x0, 0x1}, {0x0, 0x1}}, {{0x2, 0x1, 0x1}, {0x3, 0x1, 0x1}}, {{0x1, 0x1, 0x1, 0x1}, {0x2, 0x1, 0x0, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}}, {{0x2, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}], 0x38) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0xce20, @multicast2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0x6}, 0x1c) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) [ 490.402952][ T28] audit: type=1800 audit(1590988141.988:868): pid=28293 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16036 res=0 [ 490.447066][T28295] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x8001, @private2, 0x10001}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e23, 0x8, @loopback, 0x500}, @in6={0xa, 0x4e21, 0x80, @remote, 0x200}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x41}}, @in={0x2, 0x4e23, @empty}], 0xa4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010101}, @in={0x2, 0x4e23, @local}], 0x20) 05:09:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000200)=ANY=[], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$TCSBRKP(r3, 0x5425, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r5 = socket(0x11, 0x2, 0x0) r6 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x10000000002, 0x511041) symlinkat(&(0x7f0000000100)='./file0\x00', r6, &(0x7f0000000180)='./file0\x00') bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) 05:09:02 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) [ 490.739010][T28311] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:02 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = socket(0x1e, 0x805, 0x0) listen(r4, 0x0) sendmsg$tipc(r4, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r7}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={r7, 0x7}, &(0x7f0000000040)=0x8) r8 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x130, @mcast2, 0x2}, 0xffffffffffffff80) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x24040086, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCAX25OPTRT(r5, 0x89e7, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x2, 0x20}) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r8 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300)='/dev/input/mice\x00', 0x22101) sendmsg$RDMA_NLDEV_CMD_DELLINK(r8, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="20000000041400042bbd7000fc00000800010000000000ff568ed0afcdb7377ded48f0b545ebc39a3257afd4f4ecc8df38ffe76bb483c76992a31835aaeefbb216b0478c829f2445b7fbe799abda7f5b9774faf6aaf4ba0fcd233e193e684b3539d4181c0f6fda31dd1e6f7740cace8631d33fa252597ea0e87e77add6b661d336c480254d64f585e19b3b4f7fea63eb045894871f940130b1a44606a69fcde7675cd59699e11af28389b32c2962809180"], 0x20}, 0x1, 0x0, 0x0, 0x44000}, 0x4004000) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r9}, 0x14) 05:09:02 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r2}, 0x87e9b1a5bf03cec0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000300)=r3) process_vm_writev(r3, &(0x7f0000000200)=[{&(0x7f0000000080)=""/136, 0x88}, {&(0x7f0000000140)=""/132, 0x84}], 0x2, &(0x7f00000005c0)=[{&(0x7f0000000280)=""/57, 0x39}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/81, 0x51}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/178, 0xb2}, {&(0x7f0000000500)=""/8, 0x8}, {&(0x7f0000000540)=""/35, 0x23}, {&(0x7f0000000580)=""/1, 0x1}], 0x8, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r1, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="000000ff", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r5, 0x12, 0x0, 0xfffff9b4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 491.091206][T28327] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) mq_unlink(&(0x7f0000000000)='\x00') prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) 05:09:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x6, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:02 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240), 0xffffffffffffff38) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0xa0, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x78, 0x8, 0x0, 0x1, [{0x74, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}]}]}]}, 0xa0}}, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@empty, @broadcast, 0x0}, &(0x7f0000000100)=0xc) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r6, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r7}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x48051}, 0x4011) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x3, @mcast1, 0x83}], 0x1c) 05:09:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="080000aaa3e04ab583", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$PPPIOCNEWUNIT(r5, 0xc004743e, &(0x7f0000000100)=0x1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) [ 491.421089][T28347] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x81, 0x10000) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x260503, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000100)={0x8000, 0x6}) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000200)={0x0, r9, 0x4}) 05:09:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x7, @empty, 0x7}, @in6={0xa, 0x4e24, 0x80000001, @remote, 0x9889}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e22, 0xfe, @private0={0xfc, 0x0, [], 0x1}}, @in6={0xa, 0x4e21, 0x80, @local, 0xfffffffa}, @in6={0xa, 0x4e22, 0x8000, @empty, 0x7}], 0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:03 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESOCT, @ANYRESHEX], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={0x0}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={r4, 0xfffffff8, 0x10}, &(0x7f0000000140)=0xc) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@empty}, 0x14) connect$packet(r3, &(0x7f0000000000)={0x11, 0x1a, 0x0, 0x1, 0xd1, 0x6, @broadcast}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockopt$PNPIPE_IFINDEX(r7, 0x113, 0x2, &(0x7f0000003380)=0x0, &(0x7f00000033c0)=0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000003c00)=[{{&(0x7f0000000400)=@isdn={0x22, 0xd3, 0x7f, 0x7, 0xe9}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)="c88983c5919824342f5494856e5163bdf91b89d159af626fc9960d14e0294bb98c539aaeb3f3cc429f2991f69063eec414661052f55a6f6829446bbcb1d2c7635d581ca74b7c3edf483bfff2afcdb8635dcd23e1db568833ca94c0f336410e9ba9abe925b299306aa26125d294c6767b849b05121e9f74b98645871f32a984ec769003ba3e75c935fef7ca90184810d3675cd2617d5c14891822d5a02a4facc5425faa284373f81840ed2595e4bfbd71bb5752a08034cdac138efb939f562ae91cc06cd84b5979d19df2", 0xca}], 0x1, &(0x7f00000005c0)=[{0xa0, 0x1, 0x9, "8172938a3074cfba3db0f78f54d6507e3c6769fe8b2fdd5bfab26aa82717707098b90f89c777985dd198cea19508924d1aeec78e9e778b9504784a84e5279f9f66556864b1cb3ae20031f1cce9be1b4c01d882b14e81000a2092573b33f260d62889cadb3bf2c09f2d3441cef8e93539b6ba75b19606918da7ecd2f1bea82a22113e9e37f86a2233368c5c93037b39"}, {0x30, 0x103, 0x2, "23e843bd35423047bfe3371cc568f54386ee8c63eafeaf726a9f5d7bcf7525a8"}, {0xb0, 0x11, 0xfffffff7, "19427214c967b3bfa7370d58f994028235410ce1d2b3f4998822244f23fe134625903bbd69513170d6a77c8b248b34f552504b189914a2525160c4ee8cba55141e6b42d597dc2c8f78d02344dc1c57b12bc0c4b593c515284a7f1ffc855cca742c10e4d0cd20dc6873f4e3d291f07fbdfafb600767a96b49945d3206442d1896833526a084568fdb230cb4cf7ca57e2381307370f190582a9b47f2f1"}, {0xd0, 0x102, 0xfffffeff, "dc91741f813e1ebce006c6bea285f3fe8e680a24deb72d4de4f55b56316f978356cc5e5265d324a549cee02c51152decb2dea877c2bb2078be8264db74bd97f6b10185d07151dac780b32c0aa9974182bd5967d9b7d65b0f4e96d8830199036fd06af96a73562a4ce6fbd671968b959bfebf41238e55f6b8764fa78b7d9c1a4c22528ff28424e6dbec06b6420556448f751c35126a135327fbd4378e2a185c91c62af9ec8385e62c667c153df3af8d0cd5e5ad5cfff1f7db7a6c8a"}, {0x88, 0x10c, 0x5, "826059ecce558b25737de8a7c28fe51fec135c5126492327164495eed704a437c7cc28d5517bf07e8adb0a059c36420f30af9750eab020e91fac00ecc62f582bcaa3cfa53456328039e83b2b4c292e2e0b0595543ed85f8d441bfb90db83f8ec6d56a4d979fad4a1b554bf22f633b3baca84"}, {0x1010, 0x100, 0x6, "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"}, {0xd8, 0x10e, 0x40, "acbebea553096b36f9399fc4e44a87270ce59da64ac449ca2b4d6628814da0e8b52d557239d75a93b28808943e3d38cba8a31b909b4cd43e19aaf4aa3faedd5b04ff770bc467c69fa6c6f13d67ec7142d98512f012306190c16d457c9e8b943265c3aa5bcd484347fda98861a46632867a26bde4eacdfdbc08bcb699bc76d4439180de8a22ccdbd60c15da6a2daeb3843689341951b26346406f7cea9b9e20d17a059f29bb3d3a1fd5c4732f99616f0b1f5578511ee60aff1bbf2d81633d313cede3c746f758"}, {0x58, 0x88, 0x7fffffff, "a2b58e844d6978fe6600c3940602246f072b0e663a367e8381844eaa2f57e79dfe998605a9c6595e8cc2222ffbca9e37948452ac5f10f545bd68ee62813683880c067e49ef3313"}], 0x1418}}, {{&(0x7f0000001a00)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001a80)="9f681c6a6fd63f74762f25a514965deba9c6cddaf94744ac59100b48fcd380725504df6b209389b8c63fd0ad6ede696597e9f324859447ffbf2907b3c4c41d477e1855a52bce8c228405a4cd46a593612b8e4977f71eabcd1decbbe3752439cd5717eba492196d5723e1ad149a0fe3a009b2dd3f2397eb00a9bb474ec552cdbad6a5e401a7ffbedd0669d15c9ce43a2338e0d3d1792006d299e2aa776b0df06c8a963482ca86117d8183b9a74b84e8de5a65", 0xb2}, {&(0x7f0000001b40)="994519a67760b8f306232a662ef9e7dfd411de86e0f455e732017ce411d823aaaa22f24d082343544a31b2211778ba0db8a59e825c7508c38166a51327ad5f047a634ee48d00295cf938f43285", 0x4d}, {&(0x7f0000001bc0)="0c97d87d80570b0cf35276d8891fe71481c414222f9993", 0x17}, {&(0x7f0000001c00)="39cab0b7157079c726499800080e7f54e2bec4d8b2a7e73f48776b92da19a4d7a3055bce3dabaca02d9d6574cbfc8ff06aaea699a3451483b978f73e7c27d9571c69c0cd87b0c3c74ee9ae8707b7b33ee4c101569982ee1d6dce2ea515db3ab6aa92461acab1657071139acd78b056133aff52446f95da6482876236199fe3e1e4ac9a843a03009b2c907dcc77752816ac232353aa570d17925c0ca686832190feb9c592effdd2d0ce4dc0c8121b3a4793a651c99807", 0xb6}, {&(0x7f0000001cc0)="7eaf9c32900608c6ef14ab3a92b5c9786b9f27094e54", 0x16}], 0x5, &(0x7f0000001d80)=[{0x68, 0x101, 0x2, "cd03bdcdcddf69d8be6cf06faaf19a1c8476c572365a32491dfa193007dfa98fbd454372d6f85cd8c9166b686212bcb59f3dd25215c58cd2e6103b18febbcdeaad681e749a9f27b33b33de6ac8557eeadbca4c"}, {0x108, 0x19c, 0x6, "418fd3ca1108798588fae89d9d531284c400e2379ac7cef46f205ff4f783db382694e8a06d772d0ba7e4ac9edb13f344a04d94856a9f5ef965309a1a4d913cce9d925355f8703d21fce9882c2f7dbe33450c73f5127c58aeceb9194b61419caef56dc30ec8e6c4c5643a730a21409567c299b09605b686e8d37989950f8e64e9f51d398a527197c68f55804f0c3817cb2940a6c3e5255a9988635a161793173ec0f1871426453cfdc7280d1f709f52eb9c283220b32658b10916215152108b9af0d864541929f10bf8b7e8d4ff76f046bf57e8d1808273395eb66b350009e96f84742c3e47df9fb6d99a5a30d6ae2ecec388c14d87b7b6"}, {0xd8, 0x114, 0xd1, "8721424e828543ca7e614509a46d1a19f2b2268a3e9aaa298231a84dc9bd8fb09a4c0a40961bb8b960fd05032f1ae558c153155e6d541e4f3f79f4b7cbe8a5a862c3164cff2602950ee64a202c384b39ecf83e84c1db75e0c7a957561550afcc407dc23f1ffdb768a15318f5da93b66f1aa84ad4e2333269181ffd7a4c1154e0cb60b71bf75ae613570dbfe47824f46f7df9e84bfc4916b7b668ac1cf8afd5db2bfde926f6c619e0268d8cbb2eebe314dbbf7e53548f2334b3a5f3c1e3ea55eec510b0f8"}, {0x40, 0x1, 0x7fffffff, "2eec21db402276678407907cf80caf6b930b13373db1ca56923f4e5d50606417a8f4332945403f62aefe"}, {0x10, 0x84, 0x8}, {0x30, 0x100, 0x6, "0da41c5c7f8a65ed593ca7897c7a6677f2bcc991f3a0ac67de216f7b9f"}], 0x2c8}}, {{&(0x7f0000002080)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @local, 0x9}}, 0x80, &(0x7f0000002300)=[{&(0x7f0000002100)="d3d4a4aec311484d59ce24374162bc0c164af572c30dbbc4137d1abbdb1b1632e666074cb6af405cac5f252e501b6e7b57dd91d5567cc6e0d1452b12421b99a5da4a6bbfb08027f40161e94a8d820a774a68ed370a48e5d143e73427df610523cbeda75697f4b0e06541682a3bb09caff2ddc18344b88e032d55f43b5a837d9becf47b9799cca20aece578c95740ef66217c9f84e76a96a2c573bd1e5ba539b37251b865adc0a00be06d25578d1e41e8793eee3031f16e4d5fd34d51c50724cec4a5c063a5b03c63703b8365b8fc209df0363696275436723aeccf2cee48d36237f8743002f0", 0xe6}, {&(0x7f0000002200)="67e80bde00130bc1636220141ff3ee075c523c34e7018b0893c3b31c20178cfe437ff0458259cd6df517f230495512cbba142edbaf7dd5ffc9707fb05db8e4464426688499aac7cc327148e2d167f9bda965295e6b00c73daaf2f043aa9b161f4a39e3dd2ac042089d60b7bed683bd03e7ab0a76c6ce436343a672f8e5bdc698ec3e8a3d2f10d26448b0e77695ac1882b85a5e05ce670bc99a28966677eaf81b4c526f876bd85d664cab968ef4b2b661faa55d417b345fe41b65eb8030814e592e1fd9170b7b15de703adf5c74d981326ef9e185780256c338bc4284c115a30104c6", 0xe2}], 0x2, &(0x7f0000002340)=[{0x1010, 0x10a, 0x2, "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"}, {0x18, 0x10b, 0x6aa, '!'}], 0x1028}}, {{&(0x7f0000003400)=@ll={0x11, 0x18, r9, 0x1, 0x2, 0x6, @multicast}, 0x80, &(0x7f0000003640)=[{&(0x7f0000003480)="d5f283f897055cae2ddc4477ebf20be977ae70c593b510a1d327d967cf3a038f47f1ea543f", 0x25}, {&(0x7f00000034c0)="c7c38f719ec083de22a79560ffd1ce702606ce59e7bb04de9e7835719d5d56a62c0f965791fd37132a5cd7d9a8f8b4eff9d2f690aed67f430a76eb97ba507cdbc995511424271476511a4eb19faaf53ac4a0b3832c57f8762ac0", 0x5a}, {&(0x7f0000003540)="33e5321ea642c7d00af8c305b345688bc0171f00c85c4f398080ab4592d001f628c36a42fcbcdb61a6072a63ff4d7b0621c69510906e53314b585bac0a5edba4a464c05303aee13c674034f62096d5ccdf25aabe52e6", 0x56}, {&(0x7f00000035c0)="ba2d8c8de2ecabbcbf65eba4ea782c7eb0564bf7a295219bc3424f094a17c9bb0a310d96b4c8d7ef86b55b8c9ea3d9ed715b270062afa3ab6f50ffe5f9e9e2ca51c2f78c5dc70661deaaaf0d32dd9bd2ce68c777b58e69c22ed3420a6675664e5872a168940b4032b38630bfaa1eab5d408da840f345dc0bbc8fbe63733709", 0x7f}], 0x4, &(0x7f0000003680)=[{0x80, 0x118, 0x9, "5d5dccd71690028cb73fa5e651dfa5425905ae32bff4f7a16c0b5db302ba8232242c2e39acf5e94b470934938dc5248b65f71acd9d86a73d85f6402c62166d2b7a86fb01aff2ba9bc05b3ddbe286d57b466d16c83246580fbd6b8f596c51304d9449751ae214a9e4de90d2201643f602"}, {0x68, 0x10e, 0x5, "45cbac39dacb28a8affa4596ac32bf560de00002d10d479a0847d33c7d2761f431a2b5c50746a72541fe5dc7248d4faf8551ac907466f80e78e5e963f27c300c14e1763e0f7ea964be5eafdf53ff39d33b90f2"}, {0x30, 0x118, 0x0, "f4b79fc359f51b4887d6e63b9d0ce7abc124e43d5981997bd8c96faf9082"}], 0x118}}, {{0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f00000037c0)="39bae96b03db5f2a14ce75f79d7bd63b9fcd13504ad82c98d0665d82ede1f614104119a235b3f8c63211e19b8d016cdd2c2328c1518c0be833184b6e1ebde5668a3abad5bbe3f7f452e0c8", 0x4b}, {&(0x7f0000003840)="2eeef41b5be864bc285c7a45ba69a6327aacb9b7ab1c", 0x16}, {&(0x7f0000003880)="952a3e8460a7c05d16859331f2e4d1c0a06e900dd404b535c4b85334ea39cabcc40e5f34e2496d0d145debac02371a622930a68b297c34b57ed14b42fe8ee9a8410f72363bcaa26715f737c556759ad9709a5a0ad28268f354e911ff9323473475b81adf848951fdeb398b", 0x6b}, {&(0x7f0000003900)="aa54e4798b3c6d36ece490fbf5dd176e750b3bc6f41ffbc18ad93a879b4424939f9fa145ce197d5f89fcd3c30fdc251a7ba25c20ecaa15e2dadc36ba8ab9cf65edbe297bd7c5025564823719497c20832873fe67382ed4387b4bb942e4832309ab19471fa4b24a3099429f91b354e76b6f376928c0c08b616499f0231af91d48f2ecdbf29b0d7e2605a55a2e1e8ccc46c18800730b484721e5d761fe995ded762c3e9e541e3626cdb31e10184016641611fffa4d6379591c0de9c9527d77c04f30e489619506716740ad39767458d77cbd1564d8226126ead87291605820be45fb00717455cb46f93632c181496813ebbf0ff352ae03", 0xf6}, {&(0x7f0000003a00)="3b136a2d08027fdc5dd0a4e71ee407dc97c998", 0x13}, {&(0x7f0000003a40)}, {&(0x7f0000003a80)="4f2a10376f2d8cf9c590fdc7eb5f087d530e0271465cb5bb7bf04da38accb8e19dff0df3a7cc0e0f4d7f5384431e29f4884584df2646efefbdadf99a3878caab1cd95b2ac43c28a0122a8cce79ff403e11d26a57228cd83fa4", 0x59}], 0x7, &(0x7f0000003b80)=[{0x80, 0x116, 0x8, "14d69c202a2e2cb1da1ec8ec3d40ebc4ecafd2aa0d85fcf9a81d01aa6793abf9fd404427416fd6a4735a5966d08e352818f9e8a3173b92a16ef370af35bac42839904b33400167f022f9321299d19816027474040c5332a34624366a2a788687962ea254d25dbc94a51a90aa928b07"}], 0x80}}], 0x5, 0x4000) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x3, &(0x7f0000000340)=[{&(0x7f0000000180)="e3959997fbd63964d04dad351c23dcb61e9dfc4eab490f3ff2e990eaf4dc7ae9c1389f2a5ad4b3f52099221f95dea816207313a72ff076e7609bf0f4717ea647ce276b5f4d74581b7159", 0x4a, 0x7}, {&(0x7f0000000200)="f4fe0eb2526e887eb8498c47c05f10bf26e864eeed72bf9952b68f81834a57d5f2a416968a2df36647befd5efa25b3268aafe7d45eae1c7184eeeb1a2a207d1f", 0x40, 0x5}, {&(0x7f0000000240)="181d1b597dcd52ff2043dc9aca304962496b22afce80e86f5a81db34435486866bffff958ff430bcfead7ef557a19893482a6c15cd3fda2967c2a3b8e31162ef5a252660b24d5972b962df71e35a4a05f05b0e9d378449dd806719a9f73fb68e811df12229716c15ef6f4df72670122d8551e1fd02ff1ab1361ef69bd937817c1e8ad25e0c1d4c6e8ba894437aeeb332ddeae1cd5a61877d1c12f545b45c128d5aa0655b8f6f9f49262c6a3f93bbfb21085bb6870ff3f1069980a5d05bf4e04e7eaa472bffa8c0ba881457da09a909603c09b6691f6288817fb80ab1606a79c2ccc02b9bcefb0fd85214858070aaaff8ff", 0xf1, 0x5}], 0x201004, &(0x7f00000003c0)={[{@balloc_noborder='block-allocator=noborder'}, {@balloc_notest4='block-allocator=notest4'}], [{@dont_appraise='dont_appraise'}]}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FIOCLEX(r0, 0x5451) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 491.783552][T28370] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x6, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1000}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @broadcast}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, {0xa, 0x4e23, 0x0, @private0, 0x2}, 0x1f, [0x6, 0x42, 0x8001, 0x3, 0x8, 0x6, 0x1, 0x1]}, 0x5c) r5 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x40) write$smackfs_access(r5, &(0x7f00000000c0)={'', 0x20, '^GPL(securityvboxnet1trusted+%,}pXp1', 0x20, 'xatb'}, 0x2b) 05:09:03 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000100)) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) connect$pppoe(r6, &(0x7f0000000040)={0x18, 0x0, {0x1, @empty, 'veth1_virt_wifi\x00'}}, 0x1e) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r8 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r8, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 492.067672][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 492.067680][ T28] audit: type=1800 audit(1590988143.658:873): pid=28397 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16038 res=0 05:09:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$SIOCPNENABLEPIPE(r1, 0x89ed, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)="03000155de78c677909cac9c0449", 0xe}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000040)="bb", 0x1}], 0x10000000000001f4}}], 0x1, 0x4000000) 05:09:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000100)) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) [ 492.123546][T28400] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x800, 0x40) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000000040)) 05:09:03 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) dup3(r4, r3, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x0, 0x4b, 0x0, "a973c60fdc7b714f7e160d3796ac4407ae2edd6184b00004a3035bea0ab0829d6eeb0d2d799abe32d9df2943ffa9f7185cbf97ab0a168a9eebed938e0745a6370231f62ae08e0460108c9c44fb26f54e"}, 0xd8) r7 = accept4(r0, 0x0, 0x0, 0xc0800) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x33, @remote, 0x4e23, 0x0, 'dh\x00', 0x0, 0x7, 0x3d}, 0x2c) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0xe60d, @private1, 0x3}, @in6={0xa, 0x4e23, 0x4, @remote, 0x8}], 0x38) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000280)) pwritev(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)="f4f35bb06b98e50aebb9c12136a719fb331acc0e314066a23bb1c90aa3e83d85d0cad07d6480312a1507ee29024a42f889cb4f8055a0bcd9cee67d2c6d3c4c2f88108e2f8cdf4374c7af5d749c8fb2fa7f971afd838011f882504f0f85f9592de3c5313a454b4a400463e062ab7a9fd8e00653913a60bf1683477e8dade2", 0x7e}], 0x1, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0xfffffffd, @mcast2, 0x2}, 0x1c) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000100)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', r8}, 0x14) 05:09:04 executing program 5 (fault-call:9 fault-nth:0): r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 492.599870][ T28] audit: type=1800 audit(1590988144.188:874): pid=28431 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16382 res=0 [ 492.635251][T28434] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:04 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 492.668329][T28440] IPVS: set_ctl: invalid protocol: 51 172.20.20.187:20003 [ 492.687391][T28444] IPVS: set_ctl: invalid protocol: 51 172.20.20.187:20003 05:09:04 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup3(r5, r2, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xff, 0x400000) accept4(r1, &(0x7f0000000000)=@rc={0x1f, @none}, &(0x7f0000000080)=0x80, 0x800) 05:09:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@v1={0x2, "d36094edaab9050ddbabbfb37af3367b91a980"}, 0x14, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x38) [ 492.866210][ T28] audit: type=1800 audit(1590988144.458:875): pid=28449 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16257 res=0 [ 492.906298][T28452] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(0xffffffffffffffff, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r9 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB="110700000000000000000500000008000300", @ANYRES32=r10, @ANYBLOB="3ccb57e29cbe438622431c58e9e9b2a8087107babaef2c5d0b543cfb286973620c9f0b94e86fdb9cfa2b74a4ec7d5ec26aa36757b98b21fba18d7bed76dc8d0b766c273071e350186e0f94f10ef6b05f1d4255830be74d62ce413d2c24dbc77b3cdbd5cfa7b1af5bc0a9eb8afd35847913a88c1b80c090c5d30148e51ceae388fff50eda31ef48898f044d318faa543266d461f3eed69bb396effc1d68d2bc69dc9622f413ee00efe55c6e3a294a1d3a261da671f60662b4f88534be5b916b5dff449e6e5e977f807a984dd6b2b5cd148fbdcc1e03b4a7f7e95d475ed365d9ea6208f6c78bfe15d8111526017a12d2ce000000000000000000"], 0x1c}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r8, 0x414, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40) 05:09:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x33}}, r4}, 0x14) 05:09:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)=@in={0x2, 0x4e23, @remote}, 0xfffffffffffffdf6, &(0x7f00000001c0)=[{&(0x7f0000000280)="8d6ec3a4df64b1252d3c2b39b4c5bd1848a46d7eceaa2f8ccf847a5b4a2a958381b90a998cfc0124a43c2574a096cb5316ebd8d48a1a44c0ed3098ea4fb50e8492b65e37887fdeb257f5232c8789962532c9d60742980cb78b9039e7e3086fa4f7bac945d9bff9f115b5141a054e2cf3f1892f6eebf9afabc58d749c3f049bff38d9af53fd7ad81c7946d12c", 0x8c}], 0x1, &(0x7f0000000140)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x36}}], 0x20, 0x8000}, 0x80) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x0, @local, 0x53}], 0x1c) 05:09:04 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x82000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r4, &(0x7f0000000040)="240000001e005f0214e8ec19e7fffff807000000000080000000893c7c3508000d000000", 0x24) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)}}], 0x1, 0x48040) [ 493.200545][ T28] audit: type=1800 audit(1590988144.788:876): pid=28481 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16307 res=0 [ 493.240683][T28481] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x2, @remote, 'vcan0\x00'}}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:04 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x2, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 05:09:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r6, 0x2) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:05 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:05 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)={0x2, [0x1f, 0xd8]}, 0x8) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r1}, &(0x7f00000001c0)=0x8) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x5c, &(0x7f00000000c0)=""/92}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) openat$mice(0xffffffffffffff9c, &(0x7f0000000140)='/dev/input/mice\x00', 0x20001) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000040)='ipvlan1\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@empty, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@private2}}, &(0x7f0000000080)=0xe8) [ 493.599209][ T28] audit: type=1800 audit(1590988145.188:877): pid=28507 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16257 res=0 [ 493.631386][T28507] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x1fffd) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000140)=0x4, &(0x7f0000000180)=0x4) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x6, 0x101000) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r6) ioctl$TUNSETGROUP(r4, 0x400454ce, r6) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r4, 0xc2604111, &(0x7f0000000440)={0x0, [[0x6cc, 0xffffffde, 0x185d0f8a, 0x4, 0x81, 0xfffffffb, 0x5, 0x9], [0x5, 0xffff8001, 0x6e, 0xfffffffb, 0xfffff3ad, 0xea, 0x8, 0x3], [0xc, 0x3, 0x4, 0x8, 0x0, 0x0, 0xfffffffe, 0x3]], [], [{0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x401}, {0x95, 0xe3, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x1, 0x1, 0x1}, {0xda, 0xd44, 0x1}, {0x0, 0x20}, {0x1, 0x8, 0x0, 0x1, 0x1}, {0x1000, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x100, 0x1000, 0x1, 0x0, 0x1, 0x1}, {0x7, 0x142, 0x0, 0x0, 0x0, 0x1}, {0xc97, 0x4, 0x0, 0x1, 0x1}, {0x6, 0x7, 0x1}], [], 0x6}) 05:09:05 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0), 0x0, 0x0) 05:09:05 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x3, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000040)={0x1000, 0x9608}) r5 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 493.909386][ T28] audit: type=1800 audit(1590988145.498:878): pid=28529 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16291 res=0 [ 493.939269][T28529] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) epoll_pwait(r3, &(0x7f0000000100)=[{}, {}, {}], 0x3, 0x8402, &(0x7f0000000140)={[0x4]}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r7 = socket(0x11, 0x2, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000180)={0x78, 0xf, 0x33, "49f8c7307cf85b62c5d5291904f2f2d976df245856a4a2569768b543eaa588b52fc4212bff5386f805526b51c0cf7acb6694254f8611b0f377da6a1d", 0xa, "7653eda9438928993dd2c985027e9a97356c22e891f0dc58d25f030c45d2c5b22102b91b4c227fdf36e3f93f023691a6a7f998e397292c3acd3b54f8", 0x48}) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) 05:09:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TIOCL_GETSHIFTSTATE(r4, 0x541c, &(0x7f0000000000)={0x6, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) accept4(r6, 0x0, 0x0, 0xc00) sendmmsg$sock(0xffffffffffffffff, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)}}], 0x1, 0x0) 05:09:05 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) [ 494.332979][ T28] audit: type=1800 audit(1590988145.918:879): pid=28558 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15846 res=0 [ 494.366031][T28558] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r1, 0x8004500f, &(0x7f0000000140)) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x74f) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r4 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_G_AUDOUT(r4, 0x80345631, &(0x7f0000000180)) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) 05:09:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = socket(0x1e, 0x805, 0x0) listen(r1, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r4}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r4, 0xfff}, 0x8) ioctl$SIOCNRDECOBS(r1, 0x89e2) 05:09:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket(0x11, 0x2, 0x0) r3 = semget$private(0x0, 0x3, 0x448) semctl$GETPID(r3, 0x3, 0xb, &(0x7f0000000100)=""/96) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:06 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:06 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000100)=""/178) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="9c4217740a7db12600000000e319017f52562fe158ccaccb7a63bdd8dec720f0f024f956312b24f0b3a237db5c1e691bd0d61d6ac6570f0000000000000000000000000000000800"/86, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @in={0x2, 0x4e21, @multicast1}}}, 0x90) 05:09:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3ff}], 0x1c) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000000280)="d9fd9d27da6fcd460d38ab4c49c53a4f0790fe7c531549447f998e9a1fe9491995b21a569dc630aaca6c1ad9684b6e4204e9106e17954caa1fe8984d44e91decbdfe5b45d7c846458cce9a1844de9d7c9fd55d00a782ad2d2fe564829998a9ebc7dcc31398c4f6682b126b1556cc5241a44ed335424fd677d46dc4d72c8407b74a2acf328bb790fb496f69b0d96cfc49154441f6866ee16cfe782aa06ce3e4d5fdd4c2728d731a43cdb1bc37cb191e79c6c0b3ab894b23472d46a5a9267ee4c37f215a7ec99ee60d36479ca0874dd60e", 0xd0, 0x1, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='n\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$SG_SCSI_RESET(r6, 0x2284, 0x0) [ 494.719266][ T28] audit: type=1800 audit(1590988146.308:880): pid=28577 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16383 res=0 [ 494.749119][T28577] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:07 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x4, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x303}, "9b3b214b790984b6", "959e34d5891a7a98ec94b2c213fccff4f4f5e0b2311dcbb64366c9c05202a799", "e792200a", "9f800dd7cf6ae4c0"}, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r6, 0x6d8}, 0x8) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg$sock(r9, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:07 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(0xffffffffffffffff, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={0x0, 0x7ff}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}, @in6={0xa, 0x4e22, 0x1b, @private1, 0x9}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x6, @local, 0x2}, @in6={0xa, 0x4e23, 0x8, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x4, @loopback, 0x14f}], 0x9c) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={@null=' \x00', 0x9, 'wg2\x00'}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80100, 0x0) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x32, r7}) setxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x1) bind(r3, &(0x7f0000000080)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockname$packet(r6, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0xfffffdb5) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) [ 495.565296][ T28] audit: type=1800 audit(1590988147.158:881): pid=28608 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16372 res=0 [ 495.597187][T28608] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:07 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) [ 495.708103][ T7171] minix_free_inode: bit 1 already cleared 05:09:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000140)={0x0, 0x6, 0x5, r3, 0x0, &(0x7f0000000100)={0x99096c, 0x5, [], @p_u32=&(0x7f0000000040)=0x800}}) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, 0x1406, 0x8, 0x70bd2a, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000010}, 0x90) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.sockprotoname\x00', &(0x7f0000000140)='/proc/partitions\x00', 0x11, 0x3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$nl_generic(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x16c, 0x41, 0x26, 0xfffff9e4, 0x25dfdbff, {0x8}, [@nested={0x129, 0x64, 0x0, 0x1, [@generic="b7b5304e52fe6d72f780eafcb4aa05d824dbc60ca6f37c291f461c021cf4e8d407b2f338dada24be241f4faac4dc4af9b4b04ab31a1ffa10ede555f29a95a4e38aec39ef8916379712b9270b514f9356b39fe25f1f16cfc85f79986b4ab3ccbeba88aa60295faf9ca4fe4758b40c99eb20427f3209cbb3072e129d674ac0029790ded85be50cc3ace91a", @generic="392644e63fe7a9c174738da7af33c31142239d9e6b2c4a952d2933e421417c", @generic="588c34d748e08581a9954fabed7332e2f0712eab26f86af474192b85765889686920d01d4d15ec6245c5b4c4e3a7ffc861ff2d7b472d0326d9166e2093b8bc398eb5baa67148d4fc97e188151ef775f7f3a927e76d680b9908ed68321a2a7cb418f5868aa19d8b543fa7aba7d916f577", @generic="d14b568a2c935a59", @typed={0x4, 0x86, 0x0, 0x0, @binary}]}, @typed={0x6, 0x7, 0x0, 0x0, @str=']\x00'}, @typed={0xc, 0x52, 0x0, 0x0, @u64=0x7ff}, @generic="42ad20f0351590c815d3e9afd483b18cc03895e2c1473b55"]}, 0x16c}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$SNDRV_PCM_IOCTL_PREPARE(r1, 0x4140, 0x0) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @multicast2}], 0x10) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcsa\x00', 0x800, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000840)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f0000000500)={0x2d4, r7, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0x98, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x345f1ac7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ca97556}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40000ca}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ec2054}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x43}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x69}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a8f792}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52e2208}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d2b417c}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68105dd5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x728bdce5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5fedbdc0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4eea82cc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0xb0, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36274725}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x949324}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x16ff}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xec18}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b09a2e2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe976}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f0c2b67}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x9674bcf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f2be2b5}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6074}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5dea5dc3}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5ce248ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc998}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x55b6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf979}, @NLBL_CIPSOV4_A_MLSCATREM={0x0, 0xa, 0x5c86}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xdc, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3fc113fa}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa98c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3fae9d5d}]}, {0x4}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x584933ea}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4429}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e5e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x0, 0x9, 0x5753cf5c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa5f2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f1e4eea}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8e5f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6bbc97f6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61bd991}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6af8f851}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb435}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5c3}]}, {0x1, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x551d84d7}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x75192bcd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4f96}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a36}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x677a44f9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1acd5031}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1d7164c3}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf382b00}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x8c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d561619}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd614}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2ec1}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdac0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x514b208c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x697e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69a579ac}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6cc9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2fb92034}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x345cfc0e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x667f2130}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x62b1}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2d304708}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x484e219e}]}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x20000804}, 0x40000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self\x00', 0x40101, 0x0) 05:09:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000001c0)=0x2, 0x4) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$packet(r8, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) 05:09:07 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x48842, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x4000}) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r4, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3a}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8d1}, 0x40004) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r4, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10c}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004805}, 0x20000045) [ 495.931026][ T28] audit: type=1800 audit(1590988147.518:882): pid=28631 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16384 res=0 05:09:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0x100, 0x0, [], &(0x7f0000000100)=0xff}) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) r8 = fcntl$getown(r7, 0x9) r9 = syz_open_procfs(0x0, &(0x7f0000000180)='cgroup\x00') sendmsg$NFT_BATCH(r9, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0xf0, 0x18, 0xa, 0x3, 0x0, 0x0, {0xc, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0xc4, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x200}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'macvlan1\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv0\x00'}, {0x14, 0x1, 'veth0_to_bond\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x800}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x118}, 0x1, 0x0, 0x0, 0x40002}, 0x4008800) fcntl$lock(r4, 0x6, &(0x7f0000000040)={0x2, 0x3, 0xf938, 0xffffffff, r8}) [ 495.978658][T28631] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:07 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x9b0000, 0xffffff7f, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9a0909, 0x5, [], @value64=0x62d8}}) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{0x303}, "b4ee515f81335b9e", "f076e5faf27266341cd890b95127405d", "84bbe62f", "1447e08037b71796"}, 0x28) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:07 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x6, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:07 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x9, @fixed={[], 0x11}, 0x8bae, 0x2}, 0xe) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000100)={0x99, &(0x7f0000000040)="08fffbd0f1dfd6d313db0c71f966ff089b0c008261ed9adc30ce952e24947936de2834a13db3b0264608ab8cdbefabf147ad6a11dac45648fef219ac8e42f0f7cce3f8ce3675ca0c970ed14b47e17c51b3fbd0d7400750cb6c698d89413911d561468053aa8539180938f539a3def0fe808daf260e89f202c18f66c2d5d8431f0985f88c475e53c78f06dd3b59ab6415515aa3fe3274aa6775"}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x55) [ 496.120734][ T7171] minix_free_inode: bit 1 already cleared 05:09:07 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:07 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xffffffffffffffdd, 0x77, 0x2, 0x80000001}, 0xb) 05:09:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-aes-neon\x00'}, 0x2) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 496.226106][T28671] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 496.274817][ T7171] minix_free_inode: bit 1 already cleared 05:09:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x5e22, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$TCGETS2(r6, 0x802c542a, &(0x7f0000000040)) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x20040040) 05:09:08 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$dupfd(r0, 0x0, r0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e24, 0x5, @empty, 0x7ff}, @in={0x2, 0x4e24, @broadcast}], 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x1, 0x26000) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@loose='loose'}, {@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag', 0x3d, 'posix_acl_access%cgroupmd5sum\xa2lo'}}, {@access_user='access=user'}], [{@fowner_lt={'fowner<', r5}}]}}) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) [ 496.450816][T28689] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:08 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}], 0x10) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000000140)=0x1, 0x4) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="00f20000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) write$P9_RWRITE(r3, &(0x7f0000000440)={0xb, 0x77, 0x2, 0x7ff}, 0xb) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000180)={@none, 0x5, 0x3, 0x8c41}) 05:09:08 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) [ 496.646238][ T7171] minix_free_inode: bit 1 already cleared [ 496.803888][T28715] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 496.920270][ T7171] minix_free_inode: bit 1 already cleared 05:09:09 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$CAPI_CLR_FLAGS(r3, 0x80044325, &(0x7f0000000000)) 05:09:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:09 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x400000, 0x0) bind$bt_sco(r4, &(0x7f0000000100)={0x1f, @none}, 0x8) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="6dba1c151467ec8bf5594c62161b1d325fe145d54eca3b3f2d4081da89bf0ac0c7b8a16594bcc49d60964839d1625c75fdd4ddc69162da4a1bf50fbadefbc5c1f8ccec65f1d5e8dd2914a22252203608000000000000002468859606bd018313b611f73ee1908bd5dfab8855ed48b76ca077e3a548222dd0c5b983effb226fbbb1f4791ae09ad72ac075f49ebb9427f16e50e4c2c1b058fe991eb355c6243a804a19a4581b5b0df28144a73ac0b4cd7236101cf6000000", @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="6112c7c12af1fb8fd2ec06055bded1edbe9f3e5ea46f552ef920b7e0b4a0161ae5ef2b2c98d1a34ceb2a2182af6f3874516dae98ee7334ec5a7a2eac1e30061dd89175c317842504b7c916ab446ac1845fa059f1bafc41772cc5cd5eb9d43dc10fbb6e70cab430ca8e3bbedac1338e6923dbe5423901c151e1325605a424801eb76499a5bb845e4eaea5967d1e66e2d21d35b9b5c109840a3990fa6ff4dc3f6040ff9990799e447fd70715c3346b5075599e731b7136dabebd66b7d9a337fb37a2"], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x30, 0x258, 0x1e0, 0x480, 0x7, 0x2, 0x18, 0x1, {0x9, 0xfffffffd}, {0x1000, 0xfffffff7, 0x1}, {0x10001, 0x1a, 0x1}, {0x80000000, 0x7f}, 0x2, 0x2, 0x800, 0x2, 0x1, 0x4843, 0x6, 0x9, 0x3, 0x6, 0x2, 0x7f, 0xb, 0x200, 0x2, 0x5}) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) 05:09:09 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc140bc96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)='n', 0x1}], 0x4}}], 0x1, 0x0) [ 497.541407][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 497.541414][ T28] audit: type=1800 audit(1590988149.128:887): pid=28738 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16376 res=0 [ 497.636237][T28741] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 497.667349][ T28] audit: type=1804 audit(1590988149.258:888): pid=28738 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir095808877/syzkaller.K32w6C/829/file0" dev="sda1" ino=16376 res=1 05:09:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x22141, 0x0) r2 = socket(0x1e, 0x805, 0x0) listen(r2, 0x0) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r5, 0xc038563c, &(0x7f0000000180)={0x1, 0x0, {0x2, 0x4, 0xdd15, 0x1}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000002c0)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r6}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000040)={r6, @in6={{0xa, 0x4e22, 0x8001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x81}}}, 0x84) 05:09:09 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1000400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:09 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) timer_create(0x1, &(0x7f0000000080)={0x0, 0x24, 0x2, @thr={&(0x7f0000000000)="af39510af0e4c2e58f793919d2450f6ae008e23a5b8fb63ba485bc16c5e5459f6d2667abf5e1b32e408a1a25893835b38e436847b70fa6ebed56", &(0x7f0000000040)="f156c7411b5e125432d81479a40ff28b6431f24dfcf175fbdf5ddf489fd2666703e54aeb677b5542072baf034f4534618a4e6fe2bc"}}, &(0x7f00000000c0)) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) 05:09:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000000)={0xb68, 0x9, 0x4, 0x2020000, 0x5, {}, {0x2, 0x2, 0x0, 0xe6, 0x1f, 0xc3, "44f2763a"}, 0x5, 0x2, @fd, 0x3f}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)="a5499b57635d92219df3cb7582f9506b074394535e5d6f67aea6859911de763633de314ceedec9f05571ac4b5d29b93c147e930de341d863957d03bf50466752b2fb06c15765625b974f5d7cfc66f7dd4120387cd5d5ba3dfd6b6ce34fbf6d539c8727a5ec1f5222db531110fe508a212478d60a7e23cbfa918d25e8d50ed9d3fb304596d839302908b4364ffc04958a0a986bc1b5cfafd731b8cb33e60278e2ac0b620a0dedaee5732790dfdcff1634091acfe7d3efc7ac06faa31ba87f1717698bcd34ac26a0ee4549d079982192c9b51047045a188c6e", 0xd8}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000040)="296d77d66526fbffebd58072d98a8ca64f5e204e7233c268eb1f2a1b", 0x1c}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 497.948786][ T7171] minix_free_inode: bit 1 already cleared [ 498.128728][ T28] audit: type=1800 audit(1590988149.698:889): pid=28780 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15733 res=0 [ 498.186199][T28782] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 498.265813][ T7171] minix_free_inode: bit 1 already cleared 05:09:10 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x8, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x281, 0x0) r2 = socket(0x1e, 0x805, 0x0) listen(r2, 0x0) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80800, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="340000009e8101018e0000000000000000008f18640c4ea4529400020e0000000a0002000000000701000000060086408812adf73f1e5e3fb795267c00009c1803da8ca5b929381484e7dd669173822325cdccb56872f7"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x800) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) fsetxattr$trusted_overlay_origin(r6, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x7ff, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r7}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000040)={r7, @in6={{0xa, 0x4e20, 0x9, @private1={0xfc, 0x1, [], 0x1}, 0x21}}, 0x1fffe00, 0xf5e, 0x7, 0x5, 0x8}, &(0x7f0000000100)=0x98) 05:09:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) recvfrom(r4, &(0x7f0000000700)=""/4096, 0x1000, 0x40000020, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:10 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) read$alg(r3, &(0x7f0000000000)=""/230, 0xe6) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) 05:09:10 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:10 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) [ 499.292698][ T28] audit: type=1800 audit(1590988150.878:890): pid=28800 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16371 res=0 [ 499.324007][T28800] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) sendmmsg$sock(r3, &(0x7f0000001f40)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x8d1, @private0={0xfc, 0x0, [], 0x1}, 0xfffffffd}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000002000)="b9704ce6028fa8115969dd2bf89a512b8ed2ce12dbeeebfce2a7561b40d7b7a07f29ce966ee1c730c3de829287f654e7c180fb7c4d3e26aa104cdf570a61211eac47cff89751a0d5d46c6a20343f0208e4a092b09dec05dc61ec67f91a79b4827b15446e20f051cdf5b91af9730b3febfa45f2273e20d646e8d5b0a7ff5d81ae9dd94c2b590fb6233e7e", 0x8a}, {&(0x7f00000001c0)="e182134bc915ba6ecb59d9dcfa334c011ef22011baefbcfe4b90dc7a1b72973014ae5b140af23c2d490d68c8fc0df3997bf64d73fdd06b095247f7616cc7d6278e02284db6de07c989b78510d008490a9f4b414af95ad5d9cf814dc7a33c7e4f288d1adbeca161e65f99bef2bc8a56c0a80543ed8e476a4bbaba08a7fd971851d9650b66910d4e888c2aa6", 0x8b}, {&(0x7f0000000280)="7a635888228c7e6d97ca9281775bdbf9db50ccdad8b88b4b37f7b14b7708c59aa4ca6a816db8867088c5de99ea88ebedba8f1b89a146534e39fd8e34a73bf4408243bedca9f3b835b772fcf4d46b09fb56368b7fb520ab51dfc315d12a064d7e2e800a666fd96b374d57f45946b5978205429d28ab5af1ffb83e69bfe0c81045aafe", 0x91}, {&(0x7f0000000340)="cf0f9912ce992c592339f1ec4f0590d4a8d7aa534243908b709ee3ba9c0e51dd79f6a039926291cd79cd253fab1ef124c9f0628ce410bf37772c98c53a3388fe0be8e41ce2920572727a1675e273590a4bbc71db376df38f9627e1235182b0c3db104a5f60cbaf90089eed33a2b8ee15f91a291fb8", 0x75}], 0x4, &(0x7f0000000400)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x9031}}], 0x30}}, {{&(0x7f0000000440)=@ethernet={0x1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000004c0)="c1152b4a0039f013044c10a8280cb3ac79f94d5de13d633f79be52886ae45eb6c55a989ca62b1139fba0a54311923950c8a69f8e101920391d94e96a7bc1cb11a65ef8d67bc2243c2dee2cffdeee41bfc18a45940888df0524d4f127efd5e8858c7e9f699294ee8d6664bcd5f329e9960ade3f934d323179ea009f771662c036fed4768e468b320c6603870ce9ec45ca44", 0x91}, {&(0x7f0000000580)="448b9756c6dbf94c236b1edf5968a979a32a74249d2dcd8efd161bbc9b9b34fdb5696424a6bd47d4c720a352e83b6be16ca5c71893d4936bc53b797027c8496eab08bf123700ddc5cecd4d78a96d34788d169287ae99056212ca86327100bad5f72807deb58b576ad69dab4230dafa68b2c0e7941192d9eba937d854614362f2ed3cb73f3c92", 0x86}, {&(0x7f0000000640)="ca6d990b12b7401a6c9323e87f024017b24fa9707f623f9a3d44621260ac0bd51fe1c1dcf34d7eb893938392a5b776e9e85995a328d653b2759d750808c7e48b2a2538710c024d5aa22da96fa542a9ae605ead64256927557f4f7ea8f00502284163e7253f867a888db57538c6a992304c193232f3a8e29741e16997e6b8a7b73bcc08df15be16d3c3b917612d4bd3b85ab875d4b2", 0x95}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="567a9e3af7461dd02a1eccac61a428c9b6452894e613587a0baec2a852413c7aafb60db3beb4c46683356573033e297dee6abc38fd74e544a2ff9891cd675b3005cb7566aa39fa1c3893aeb795b0422a0fa0974dd4388eee44f84ae102e94fb1dc2b0f306655f63606d17e2838c511c1a2f34b0043647d3e41208133462f5051711ee42f971e69", 0x87}, {&(0x7f00000017c0)='0', 0x1}, {&(0x7f0000001800)="fc7d405ce91bfdf40e862974a88a4a053f31600eff42c93bc371957447222b5677adeceb2fa48f8cf2759e110b0a6e79d520ef6e282445371146407b8f0610e4dfe76814b36ecdbd24ab447c13926a6699c178253de3f2b262b428ee4771dba7b18e934f4d60bffb5fd788bf9fd5c5a47afabb823d1f6ee0cb1177cbb94cad60b64ce6271d1b5cf538b4bfc0d68dd165dc5416969dec4ed5cc51393abbd01c8987bf0a4c6cc697320bcdc40039bee04fd015740c4f7a869cc69e931a8e284b7c56201273104d29b5995d84677a38f6b531bc102ca5640dad69383732c1c6a2afd7859573926aa71a470b340b36d8", 0xee}, {&(0x7f0000001900)="f075b0555612a943f2472879ff406f3379f633323f78bccd0b440463dd1d0830d18887fa76ade3e684cca30cbf6ff1e6c48a20d004625de67772462fbca5789465428f58c6c5aa1ec8e98ecff5a4ef9dba255c9e2d1c3099a7e04c144c6c79b4a5dcd414d5e9787bbf9030d476b0f87f601b5034528a7009c9e7d280ad1a9316696010544608a9cffa090d504aedb1f3c7efb0ff172733f28c3112e78d9971bb09cc6b3f9d84fd62b5408efe7180e3410d9df919732beee69a97690b4e09a418485140564430722bb74a35f71023c2397fc88431b9c4b5c850e86d4cf80d6c04ac9ab0ae08944786c37c5014", 0xec}], 0x8}}, {{&(0x7f0000001a80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x2, 0x0, 0x4, 0x3, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001b00)="cbe8872d6e9fda6af0737c45cbc87fc3fe", 0x11}, {&(0x7f0000001b40)="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", 0xfb}, {&(0x7f0000001c40)="f0fa0250600fd5", 0x7}, {&(0x7f0000001c80)="b4e90f184840b842a93b31ef529fd457512ecf8b691c48c240a5677196289373dffa550de432e0e96cf49c92d66b769c0e877f2835b60f925e1920405bac373ce5f20535431cbd675ed814c2e78339fd9413277acb222a93dd3b0cb5c250a1eceee466c9e2f195b12801824d37548a7d0e0e3b2c70ce8311bfe0f330002ead11a86890f4bff2841e3f698f3e34de43ba39e8d43e0f7ef031d003f1c13ad447b540f875ee062be770dfe69705b085bb65a0cd8ab64ae13fe5392db4c3c57d5f2a82f1a06403b5c02254e13d738302bcf6d2e648878574c0e1", 0xd8}, {&(0x7f0000001d80)="d18240a88e647d16e5d9c84fef56beccfeabd473282c4b33c8ce23ff789b96f5c7ba07ede573502ec40104867681690dd607296000beac53b6fe880e0685f3f46b327cfb72fbd0aeb357d4cd7dc64ca2cacb16eff7f9f6598e0a7a0d84d6dbe985cacb90cbe7e9994b10bce47e31398411b3d7f1020564b503f69818cc7dff5528a86d6f3c606358362be7d3ac5579a11f35fbc278fee55b804b5e36c9ce677c29095a5da5b8c1d33e3d610b925b83d8c1a10303d5a41022e43611ef3334341fd2b653498591cbd53372b072b4b3e4ac6aefeaab6b9f2ceb1c51f2224087", 0xde}, {&(0x7f00000020c0)="25b23f19e23897d453d2af66a609d676c31c43ab8f5a23b0f5a7cb9541a644aa436598c04c91b9d0b67610ae085d9572c1c12101e95be7e504072d48bc87d83b0109cc8a98236f1817b27a215ad1c119504ca38b347d28547b9af93678e8a83dfa0f0a04fb90d0dba749fdcb38570d40cc300aeb95bc2f1b380dd1d587c5e5b2c85200b7e6ce91495ac867b0a6ec157cfd43afdac208aeeea8c87cc4c16b2feec15374a91452bceb3748c86fa27253f240b22c48a2bd6bfa539480f66b2d37e908f54cf36aac7cc3346dd93fe8c7a9466501f3784d0b48f70655f051de98b945a1569c444ff0bf9a6ebb91d69a", 0xed}], 0x6, &(0x7f0000001f00)=[@mark={{0x0, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x30}}], 0x3, 0x0) [ 499.423775][ T7171] minix_free_inode: bit 1 already cleared 05:09:11 executing program 4: openat$smackfs_netlabel(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/netlabel\x00', 0x2, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xfffffffffffffd29) [ 499.592490][ T28] audit: type=1800 audit(1590988151.178:891): pid=28816 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16372 res=0 [ 499.641116][T28816] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:11 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:11 executing program 3: sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="cf1a6b9e70ef205755921119fead79d12ded8bc25d6f82f6f5ccb91ce6ddc047d38c0cbf7747ee68d93cf25aba1ee234d3867434756e7c5ff9e84cc3264a8fff851e3db33cc8a44d5c97c0b9a0fd846f00"/95, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r0}, &(0x7f000034f000)=0x2059b000) bind$isdn_base(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x6, 0x81, 0xbe, 0x81}, 0x6) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r2 = semget$private(0x0, 0x0, 0x0) semop(r2, 0x0, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = socket(0x1e, 0x805, 0x0) listen(r3, 0x0) sendmsg$tipc(r3, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x4010) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000002c0)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r6}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r6, 0x10e29e1e}, 0x8) 05:09:11 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f00000002c0), &(0x7f000034f000)=0x8) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xfffffffffffffc70, &(0x7f0000000300)={&(0x7f0000000100)={0x1c, 0x1, 0x6, 0x5, 0x0, 0x0, {0x3}}, 0x1c}, 0x1, 0x0, 0x0, 0x20008085}, 0x40) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000001c0)={0x5, 0x0, [{0x80000001, 0x1, 0x1ff, 0x4, 0x100}, {0x2, 0xfffff2a0, 0x0, 0x6, 0x81}, {0x2, 0xffffffff, 0x0, 0x5, 0x800}, {0xd, 0xfffffffb, 0x1, 0x7, 0x200}, {0xc0000000, 0x2, 0x3, 0x9, 0xe47}]}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 499.764901][ T7171] minix_free_inode: bit 1 already cleared [ 499.928643][ T28] audit: type=1800 audit(1590988151.518:892): pid=28830 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16381 res=0 [ 499.944096][T28830] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 500.022013][ T7171] minix_free_inode: bit 1 already cleared 05:09:12 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x9, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:12 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) 05:09:12 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000100)={0x9, 0x1, 'client1\x00', 0xffffffff80000000, "90239efd0c812911", "2855224d582cc8b2c1ddf2742dc706264e05a51de569f8348301636aef21499f", 0x8, 0x5}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f00000000c0)='\t', 0x0, 0x4, &(0x7f00006f7000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x6, 0x0}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000980)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRESOCT, @ANYBLOB="84aaa77d1de8789a9c56bef81059a87b7e31584919e1521150466612f7a5f40ed0a892ab7b11e7a8025c6394decf6b93c00f9dcbdfcd2c7a9fae1a4702cf4ec4fa733e4962a9ed1b858d7f658096a6c880ae5b53ecaae7f07410200f73f3165c9961b6f4066c99eb86837521636f67d652bb8027525f964eedc4cec9157628b9d46b8dd44c14cc1e7b0cfdd1d7758d1e249b56e3df31f87c912dd6cb62d2805188494b076d2b10cf0488e837a921d81dfd3941d04d2edbd9016c03b50855c8944d32296d5ebd11769a52be08e1bcfcbd8a5f12494b9b4f6bd94cd7b9b6b25359a2c80a7b4307d3071f8d59739281", @ANYRESDEC, @ANYRESDEC, @ANYRES16, @ANYBLOB="57b4bae4c22240383074034da2e66a9b2830d02e3ec17ca2df339310b485665dceb409ffec731198a2ca14d114656dd70e3b05ca8795da57afa821ace85bf49f61205e60483fe2f0f1c924976b8ca31d05edf7989d2e07ab2adcb13d2b9a1919958ec27bad88f0722dd6044113320e08b2d78d77951910f4d17ffdd7590760e1aa8e5766fce9188ff960b2f55b456c8dd15bbd58e6774108a9c31be35526a8b7e3556e13d92bf7c30f399c1756ccb5127e6e74c605a00e4f1b67", @ANYRES64=r2, @ANYBLOB="e0762f36de96ccfd2cdbcf6b9852fb923ba8e980a1675b6085e1aef27d08d15c9c454ad3323aa2f9e779a6867fd2a4a72e62b48e1e1e3cae7a3a39780fc74bd4057c3690a044c75f3849eecc2cf8"], &(0x7f0000a8a000)=0xc) bind$alg(r8, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x14) r9 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r9, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 500.558594][ T28] audit: type=1800 audit(1590988152.148:893): pid=28856 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16370 res=0 [ 500.602911][T28856] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:12 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x49e) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 05:09:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r3, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) rt_sigaction(0x6, &(0x7f00000001c0)={&(0x7f0000000140)="470f38f05c9a02c4826dde63c0430fbaf437dec0430fec9d18640000410fec9e08000000660f3a0af9093e26f34090c4617f108100000021f30fbdda", 0x90000007, &(0x7f0000000180)="d8fff0281d0080000026430fb3960800000066470ffbd9662e6667476690c483010bbf6db000000eded9660f3a638e0000010009c401fe2d61cb0fc70f", {[0x26]}}, &(0x7f00000002c0)={&(0x7f0000000200)="d9f14399c4e24538d78f69889740ec47c1d5fbf3420f2b595844d8eff3430f0fb2350000009ec4a18163c645dea43878050000", 0x0, &(0x7f0000000280)="366666420f38290af3c0e901440fc2496000c461e9ee96500300004403f766440f3acf5a5ed90f2824afc4e2399f5542c01704c4e1fc115f0e"}, 0x8, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000000)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) [ 500.718935][ T7171] minix_free_inode: bit 1 already cleared [ 500.856379][ T28] audit: type=1800 audit(1590988152.448:894): pid=28874 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16376 res=0 [ 500.920814][T28877] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket(0x1e, 0x805, 0x0) listen(r2, 0x0) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000001c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r4}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x1, 0x1, 0x301, 0x0, 0x0, {0x1, 0x0, 0x8}}, 0x14}}, 0x840) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r7}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000040)={r7, @in6={{0xa, 0x4e22, 0x7ff, @private2={0xfc, 0x2, [], 0x1}, 0x5}}, 0xfffffbff, 0xfff9, 0x200, 0x102, 0xa0, 0x10000, 0xfd}, &(0x7f0000000100)=0x9c) 05:09:12 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0xa, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:12 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) 05:09:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) fcntl$dupfd(r3, 0x0, r5) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm], 0x5) r6 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 501.114486][ T7171] minix_free_inode: bit 1 already cleared 05:09:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = socket(0x1e, 0x805, 0x0) listen(r1, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0x44, 0x4, r4}, &(0x7f0000000080)=0x20) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r7}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000140)={r7, 0xe3, "7c565fbd28fed2ac88c9f8cf2737f09e76828b0a504b3134713cd275a7a00832a44644d5545411e7fd64775cc00e3e46a85edd55c68636164f5dcc490b37eb8cbae897fe123ea5f3f4073d6258e9e57d3e132818a23c44f1aec6cd877e24d8af31a9d0bf860e3fc3b62603e27572ad0b83193667b64fc4c08d1fca365f89e3908f5f03f511eb1e2c306d9692f22ec6f30fffd0fca70392397968df4235dc331fc22bdd814852e0f1364c58652952144da39d8d95fb90e9b3672681f7dfdb535dc87c333cf32e76da2954309a651e575e842ae6d0d4e563adad11c0eda1419ec038d9f0"}, &(0x7f00000000c0)=0xeb) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r8, 0x1, 0xe074}, 0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)={r4, 0xfff, 0x3}, 0x8) 05:09:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) write$dsp(r6, &(0x7f0000000100)="ebc0f11603d92d0123c46041979997975be21e3cc7f8b00da3d8db53442d1531cc18742f7a339fa5158c35280ef8e6f59873bf07498494f0e7c4bc36947250bc274ea89f", 0x44) [ 501.277249][ T28] audit: type=1800 audit(1590988152.868:895): pid=28907 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16376 res=0 [ 501.311669][T28907] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:13 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) 05:09:13 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0xb, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 501.472752][ T7171] minix_free_inode: bit 1 already cleared 05:09:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x2c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r6, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000100)={0x77, 0x1, 0x4, 0x70000, 0x4, {0x0, 0xea60}, {0x2, 0x0, 0x20, 0x1, 0x1f, 0x1f, "625dd6cb"}, 0x401, 0x2, @userptr=0x7fff, 0xffffff12}) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000000000001000000000000000500000000000000", @ANYRES32=r2, @ANYBLOB="0000100000000100"/28, @ANYRES32=r3, @ANYBLOB="00000000080020002cf62d69d4f16538000000000056000000000000", @ANYRES32=r0, @ANYBLOB="000000000400000000000000000000000000000000000000000000007e58c3691dedbb432c819bd6f40271773eaa5d8d23546dbaa7babc4163a449ddf1996caa333c80a32449abce3cbc856306adbc471236adfbc44743", @ANYRES32=r0, @ANYBLOB="00000000000000000100"/28, @ANYRES32=r5, @ANYBLOB="000000000500"/28]) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4c20, @remote}], 0x10) 05:09:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x800) r5 = socket(0x1e, 0x805, 0x0) listen(r5, 0x0) sendmsg$tipc(r5, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f00000002c0)={r8}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r8}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={r8, 0xffff, 0x20}, &(0x7f0000000140)=0xc) [ 501.607492][ T28] audit: type=1800 audit(1590988153.198:896): pid=28924 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16374 res=0 [ 501.662004][T28924] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 501.703070][T28924] attempt to access beyond end of device [ 501.746904][T28924] loop1: rw=2049, want=6434, limit=52 05:09:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 501.797670][T28924] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 501.817764][T28924] attempt to access beyond end of device [ 501.830859][T28924] loop1: rw=2049, want=6436, limit=52 [ 501.842613][T28924] Buffer I/O error on dev loop1, logical block 3217, lost async page write 05:09:13 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(0xffffffffffffffff, r0, &(0x7f0000000480), 0xa198) [ 501.931175][ T7171] minix_free_inode: bit 1 already cleared 05:09:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r5, 0x4122, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0xfffffffffffffc00, 0x80) modify_ldt$write(0x1, &(0x7f0000000080)={0xbb2, 0x20000800, 0xffffffffffffffff, 0x1, 0x0, 0x1, 0x0, 0x1}, 0x10) bind$alg(r7, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x69) r8 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r8, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 502.031885][T28957] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 502.084985][T28957] attempt to access beyond end of device [ 502.124891][T28957] loop1: rw=2049, want=6434, limit=52 [ 502.159000][T28957] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 502.209287][T28957] attempt to access beyond end of device 05:09:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f0000000040)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r8) fchownat(r3, &(0x7f0000000000)='./file0\x00', r6, r8, 0x1c00) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 502.256769][T28957] loop1: rw=2049, want=6436, limit=52 [ 502.262179][T28957] Buffer I/O error on dev loop1, logical block 3217, lost async page write 05:09:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="b985f002e8168a4e2eec1d18b8032c4acbfd51678b2cd670286d6e57698bd7ceaee6725217827f79c05a8b07dfeff52b0b63f6b8ab2f5b128994df0480b8e4afc13eb142463a43e76e55f42afe762968287df4df9e8a4ebcaa834252c9b66800"/106, 0x6a, 0x810, &(0x7f00006f7000)={0x2, 0x4e24, @broadcast}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="efb6e1b5", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7, 0x3}, &(0x7f0000000040)=0x8) io_uring_register$IORING_UNREGISTER_FILES(r6, 0x3, 0x0, 0x0) 05:09:13 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) [ 502.351648][ T7171] minix_free_inode: bit 1 already cleared [ 502.538953][T28976] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="000007f95608", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TIOCSERGETLSR(r4, 0x5459, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x3f, @empty, 0xffff}], 0x1c) 05:09:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512-ce\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0x9797) chmod(&(0x7f0000000040)='./file0\x00', 0x81) [ 502.608254][T28976] attempt to access beyond end of device [ 502.639679][T28976] loop1: rw=2049, want=6434, limit=52 [ 502.688092][T28976] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 502.746730][T28976] attempt to access beyond end of device [ 502.775233][T28976] loop1: rw=2049, want=6436, limit=52 [ 502.838078][T28976] Buffer I/O error on dev loop1, logical block 3217, lost async page write 05:09:14 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) [ 502.918282][ T7171] minix_free_inode: bit 1 already cleared [ 503.042186][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 503.042194][ T28] audit: type=1800 audit(1590988154.628:899): pid=29012 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16377 res=0 [ 503.080859][T29012] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:14 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0xc, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = accept4$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f0000000040)) sendmmsg$sock(r8, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000180)="bb", 0x1}], 0x4}}, {{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @empty}, 0x3, 0x3, 0x0, 0x2}}, 0x80, &(0x7f00000002c0)=[{0xffffffffffffffff}], 0x1}}], 0x2, 0x0) [ 503.137542][T29012] attempt to access beyond end of device [ 503.170341][T29012] loop1: rw=2049, want=6434, limit=52 [ 503.176534][T29012] Buffer I/O error on dev loop1, logical block 3216, lost async page write 05:09:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000180)=0x2c46) recvfrom$unix(r3, &(0x7f0000000000)=""/229, 0xe5, 0x23, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 05:09:14 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000480), 0xa198) [ 503.185518][T29012] attempt to access beyond end of device [ 503.194210][T29012] loop1: rw=2049, want=6436, limit=52 [ 503.199666][T29012] Buffer I/O error on dev loop1, logical block 3217, lost async page write [ 503.256195][ T7171] minix_free_inode: bit 1 already cleared [ 503.381346][ T28] audit: type=1800 audit(1590988154.968:900): pid=29030 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16377 res=0 05:09:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 503.428290][T29030] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:15 executing program 0: dup(0xffffffffffffffff) r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0xfffffff8, 0xb, 0x4, 0x1, 0x0, {r1, r2/1000+60000}, {0x0, 0x1, 0x40, 0x4, 0x81, 0x4, "46fa2864"}, 0x6, 0x4, @offset=0x5, 0x1ff, 0x0, r5}) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) r6 = socket$alg(0x26, 0x5, 0x0) r7 = syz_open_dev$loop(&(0x7f00000007c0)='/dev/loop#\x00', 0x3ff, 0x105202) ioctl(r7, 0x9, &(0x7f0000000800)="8d21cd4d5a2af4565158c45d1f4501cc60dd5c7ae30dc55c4de2b5c79ac9f6799053b1f3986d4e8a092cf4efde63671a854ac94a92a392858660ea9dc5fc717bb61268a956c4c2ed2c4de055890be0dc462b4f8faeb62e462c3cd9e5a1871e90464f26f4bf37a51daa4875b80cf2d15626002dc30d368e57a41776eb51ac861c1a296f0ac2a00ed0071412923856f4a7f764ab0911b94e9dbadfdae690ba32cab9fd548f19761924f00c5423c47486851cc10eb46350320d9f4dc75dd414865c1f3bb940d8e1804ad74535412156864fa454d6291818061a9131d890c1761398f607e402437ee705") bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r8 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r8, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 503.500392][T29030] attempt to access beyond end of device [ 503.648266][T29030] loop1: rw=2049, want=6434, limit=52 [ 503.654780][T29030] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 503.663967][T29030] attempt to access beyond end of device [ 503.687128][T29030] loop1: rw=2049, want=6436, limit=52 [ 503.696605][T29030] Buffer I/O error on dev loop1, logical block 3217, lost async page write 05:09:15 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x8) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="000000009ebb42de9b6e13fd48edd97f2abba47e5f59ae8d8616c87c9f4678fb431f2058fb19830bf1cfa5acb323b4382767964f7b37b3f895c12c902fbd7a651712de08298a96874d5388c566257b4a8d301c9302c4b164b903c33de7423a9f5ff1acfe037957ece915f51600000000000000abac680a92986f", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000180)={0x2c, @multicast1, 0x4e24, 0x3, 'wlc\x00', 0x0, 0x6178a80d, 0x16}, 0x2c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getpeername$unix(r4, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 503.776589][ T7171] minix_free_inode: bit 1 already cleared 05:09:15 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0xd, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x228, 0x1, 0x3, 0x5, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFQA_EXP={0x3c, 0xf, 0x0, 0x1, [@CTA_EXPECT_NAT={0x38, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}]}]}, @NFQA_CT={0x190, 0xb, 0x0, 0x1, [@CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010101}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @local}}}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x1}, @CTA_TUPLE_REPLY={0xac, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @loopback}}}]}, @CTA_TUPLE_ORIG={0x5c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3e}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @private=0xa010101}}}]}, @CTA_TUPLE_REPLY={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x2}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'pptp\x00'}}, @CTA_TUPLE_REPLY={0x4}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x9}, @CTA_TIMEOUT={0x8}]}, @NFQA_CT={0x28, 0xb, 0x0, 0x1, [@CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x46}]}]}, @NFQA_PAYLOAD={0x13, 0xa, "510a40c9eedd34ae71c5197424446b"}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd}}]}, 0x228}, 0x1, 0x0, 0x0, 0x8000}, 0x44014) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) r5 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000440)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r5, 0x20, 0x70bd26, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8881}, 0x4000) [ 503.962594][T29051] IPVS: set_ctl: invalid protocol: 44 224.0.0.1:20004 [ 503.965681][ T28] audit: type=1800 audit(1590988155.549:901): pid=29052 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16380 res=0 [ 504.030641][T29056] IPVS: set_ctl: invalid protocol: 44 224.0.0.1:20004 [ 504.041542][T29055] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:15 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000000)=""/240) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 504.240283][ T7171] minix_free_inode: bit 1 already cleared [ 504.305644][ T28] audit: type=1800 audit(1590988155.899:902): pid=29067 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16376 res=0 [ 504.351193][T29067] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 504.379794][T29067] attempt to access beyond end of device [ 504.410119][T29067] loop1: rw=2049, want=6434, limit=52 05:09:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @remote}, 0x10) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000700)=ANY=[@ANYBLOB="02e3d059bbb295e23b602c4088bb6d1668719ff2d9a243aa425b951e7c5140d46b5b0ce262fec41d77246927672c8af729b0c0d6c7594140b165975b1c9da535e50e411d44f38a7a547fc929fb7ea18a56712a5a2bcb249a63aa44f1a60848541daf28d804bf71ab5dd07f3e3d952f8f49b4a56ced1e9ce55ff09b1bc38121a77d308aede3b37d803d2d8c051dcb8c657e281f27c68b5cb96ddb9decf82812d13152ddf69483ab27acd67f1ff392662a6df125c1522aa7c10834a323761c19e646fe14a8b7e6bfb8bd442cea28a4ccc5993870c17b22b092a666fff1dca7d091c5bd3f444103d9419f618c97422f167aab899313f05b14697f9962afc7ebddf3caf1974d0c7d6b0fda", @ANYRES16], &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={0x0, 0x3}, &(0x7f0000000180)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='poly1305-generic\x00', r4}, 0x10) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) sendmmsg$sock(r8, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 504.462837][T29067] attempt to access beyond end of device 05:09:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r3, &(0x7f0000000100)) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) r9 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x5cb, 0x408000) setsockopt$inet6_IPV6_PKTINFO(r9, 0x29, 0x32, &(0x7f00000001c0)={@private0, r5}, 0x14) 05:09:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}], 0x1c) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) syz_open_dev$hidraw(&(0x7f0000000280)='/dev/hidraw#\x00', 0x2, 0x40100) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="001e0004", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r3, 0xc04064aa, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], 0x8, 0x0, [], 0x5, 0x6}) [ 504.516928][T29067] loop1: rw=2049, want=6436, limit=52 [ 504.540317][T29074] attempt to access beyond end of device [ 504.547819][T29074] loop1: rw=0, want=6434, limit=52 [ 504.570433][T29074] attempt to access beyond end of device [ 504.588968][T29074] loop1: rw=0, want=6436, limit=52 05:09:16 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="f3dac6e1", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) write$P9_RWRITE(r2, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) r4 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, r4) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, r4) write$P9_RLOPEN(r2, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0x40, 0x4, 0x1}}}, 0x18) 05:09:16 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0x0) 05:09:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x34, @local, 0x6}], 0x1c) [ 504.715635][ T7171] minix_free_inode: bit 1 already cleared 05:09:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200040, 0x0) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000180)={'batadv_slave_1\x00', {0x2, 0x4e20, @remote}}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r5}, 0x14) 05:09:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f00000001c0)=0x80) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r7, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0x2f1beaee21bd3807, 0x0, 0x0, {0x2, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x4000002}, 0x11) [ 504.881538][ T28] audit: type=1800 audit(1590988156.469:903): pid=29105 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16368 res=0 [ 504.954081][T29105] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:16 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0xe, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:16 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r1) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) 05:09:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0xcb, 0xfe, 0x2, 0xac, 0x80, 0xff, 0x0, 0x7, 0x40, 0x1, 0x12, 0x2, 0x1f, 0x1}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) open_by_handle_at(r7, &(0x7f0000000100)=ANY=[@ANYBLOB="d900000004000000fcd4cc44175da978bfb51117ece0c4feabff3512adcc638f0cac721a051b9feaae0749767a213817330acd1739f6b06d357813bfe746d736647d7df0c72cbffadea2259d53345defb304bec419f930e6f9dadce15b4c763883ca694895a2ecb0be6f338709c3770eb20203c68bd63e5b3308c9f02987fb43d8d32155be02c2347b662edd980b696e90b612b29293d640fd2b8fb8e40de84c23971c37798169aac47d89e7eb0500eef79db06f4efd09da404014e117a5d84789673500"/207], 0x14902) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:16 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0x0) 05:09:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000000)={0x3, 0x40, 0xfafc, {{0x19000000, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @private1, 0x20000000}, r8}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000140), r8, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x8db, 0x3, "bc2baced17f5fe364172cd13fbdedef5cd148159acf9f9e68154da1a0699c427650881be1885fa3dcf1eecb76b1bda373c1249e4fbd278f5505f85454307722e4e2775b1e7c1b6820b64afad73272ea90c2da2ede7a93ccaf0c9b400d038e32230912ea06ad0bfcb63879cec1c4ea8ecb38bdf99bef81a3bc7dec30bed59c74f748041cc44265a2ba8c4bcec96103baef63fc735a7f2d413a9d04f46b089ffb904c497e72d36e4771fe3079828cf6810007f35ceee2bea6a8574a42e66c95cc11c12bbd6a53e16bfeecf0191c38d99a1b3ceb35bd33a636f4e27eb97617c0c6adfc34d14043d736d817bb4d2527997bc2538f13e9ed3e421ec03ec007be0747f", 0x43, 0x20, 0x9, 0xff, 0x1, 0x3, 0x2}, r8}}, 0x128) r9 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r9, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 505.150579][ T7171] minix_free_inode: bit 1 already cleared [ 505.261191][ T28] audit: type=1800 audit(1590988156.849:904): pid=29135 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16379 res=0 05:09:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) sendto$l2tp(r3, &(0x7f0000000080)="fdb66c6d3ee65c88676833424ab9f49766952b65d5b41ba823586e2ea608c6a0a09f481e96bf8f4452d18475a3f97fc3b2e9f2bd2d668063386bebc4a40405f88049feafc044d732260f13117f22036ec546bc603c53c536f7bba9672893059c6c55823d78fcbfdac3db7d344ed0e5d45dc2791f3fbdb98e2955c92f9ff047101ef49405a9080780d84ccad2abb463af4c0ff6a6adf602fccd34f9af4ab7e3edb1", 0xa1, 0x40000, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000000)={{0x3, 0x0, @descriptor="c88a450e90c0b4ad"}, 0x28, [], "383169d98798f2f5de2c9cfc3f86732a9492a2453084e02415d8fc1574accfd9422c89dfe517cbe3"}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 505.331580][T29135] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 505.377290][T29135] attempt to access beyond end of device 05:09:17 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x1c9d00, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r3, 0x1, 0x43, &(0x7f0000000040)={r5, r6/1000+10000}, 0x10) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) 05:09:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x1410, 0x2, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x2}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008080}, 0x800) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(r4, 0x0) [ 505.421360][T29135] loop1: rw=2049, want=6434, limit=52 [ 505.456997][T29135] attempt to access beyond end of device [ 505.505636][T29135] loop1: rw=2049, want=6436, limit=52 05:09:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002b40)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000840)={0x0, 0xd, 0x4, 0x1000, 0x0, {r7, r8/1000+60000}, {0x1, 0xc, 0x4, 0x81, 0x25, 0x5e, "15a1525f"}, 0x0, 0x3, @userptr=0x1, 0x20, 0x0, r9}) sendmmsg$nfc_llcp(r10, &(0x7f0000000d40)=[{&(0x7f00000008c0)={0x27, 0x0, 0x0, 0x5, 0x41, 0x1, "f915a028e90f3cc9080ba036ed177c2275af3d73a94b91ee4a780c872dba109cc6add51ca099216e13f9df5f4cb520febdbcb4fbb278ee7dce77fb241100d1", 0x8}, 0x60, &(0x7f0000000b00)=[{&(0x7f0000000940)="f2c83bb7797285d57284ece369a2af41751198f67b5ef28dd6d361222061a341e497cf6c2e30a02a6897420d0246c6112578a75f0093d06b4281e96c30b8bca5708cc6c057298fa153129cf63bb51c5a514b755d43423da1ea788367dcc25c7b2d8d15bca0b9f635dd4b9f1795329272ce6484cb9423f646ddad041a49e907bdcb2d43f4076889dab5749be1612e3253a11ff769b3f28cadf088caf848387a7323f74000d9d709", 0xa7}, {&(0x7f0000000a00)="890a06171bf77041edbf63c33c6f487a955f82b212000f5033f738f4b67c7203d3205bc8e3345edda4d608e1c822105c48d4adea7ac035a41e731cde38fbbbe8761dcb60159106ddbe2d0bd2c5236904087a06604f684665f03c1f42ee851c6ab449c4bb37316639cd7b01359039a496956fd28469c14862364f2d9b127671a017e02121ee6c95173631a575a5a19820fdbef8eac80a53751f39b92855d97582df3ed79fcc9802437b4bb1f4ff4dae7a0c3e05fb41d547c27f720fb42c8fa563ec", 0xc1}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="38000000000000000201000400002a086c94e3b3c319e4d85b5e9d1fe2a4f64579d4667ee9ff95ef04ff0300"/56], 0x38, 0x80}, {&(0x7f0000000b80)={0x27, 0x1, 0x0, 0x7, 0x40, 0x8, "eaebc25781c809a90a6aba3e4bd7fb2f3a4252258a29d22a7e242fcd9444f42081bb75215fd7d1654f16ecb7417dc189dac0542b46020c6df6c7c6a1889a32", 0xf}, 0x60, &(0x7f0000000d00)=[{&(0x7f0000000c00)="45a79c6f18578ead0679f012ccc6d86854504a9e76e4cead4de2275d1cfc7549761d46ecf449e793", 0x28}, {&(0x7f0000000c40)="4e341acecce2cc57306331599c4b98eb3bc661c32f6475f0dba55331c719f8dd5f8747be603efbf4bd37ca71d19a5d76e1b43cb7e7dfb8fa", 0x38}, {&(0x7f0000000c80)="036307860cf42fd0561c3c5c4994aff98b4b67370ab35af5d83cc043d8ef2f0861638d637532900bef75c555472eb8312b8ea243bb32f3f37bd407453d418ddc95", 0x41}], 0x3, 0x0, 0x0, 0x20000080}], 0x2, 0x14) r11 = openat$mice(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/input/mice\x00', 0x103303) perf_event_open(&(0x7f0000000740)={0x1, 0x70, 0x3, 0x8, 0x80, 0x6, 0x0, 0x6, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x7, 0x401}, 0x8000, 0x9, 0x54a, 0x7, 0x9, 0x4, 0x3ff}, 0x0, 0x9, r11, 0x1) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@empty, r12}, 0x14) sendmmsg$sock(r3, &(0x7f0000004240)=[{{&(0x7f0000000000)=@hci={0x1f, 0xffffffffffffffff, 0x1a2558d2f7251917}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000100)="6df7ccfa702b8c82a4a650f3fa6486abfeaad9228ba82c8cc1768ff8207d3770cb6c78dda4fd1c8b58d1b42d63fb56309e341be188c1b8d8629ed0b323bf4ddfce014b79779c2baa33b908b2964a062f3f71f487a10e0d59f2f7b4fcc4ec18d1425f1b36798dac19c424f3f560d27b97d4f5431e586eaf333a502f1c0e0731365bbfbcf4da81fd04ea7871979fb875a060802ad8568dd2", 0x97}, {&(0x7f00000001c0)="a0713d068ac37377116ed8fa57eea7107747fdb3b151bee8da21367a2f21dba9551c4d96b27142ef5d9f5befa2f2820e5d49bad73e6b5ec810367cece8493dc48f6c5a6853bea35cee79e4976060d25a5210d44e6032bc70cfd8b6aa710ba5bc511eb342dbc7c05c3ff0cb78c4ddaa752e79", 0x72}, {&(0x7f0000000240)="7715eb65f68c57f294030063626bb0ee03fc555190dcf8e71475f9dac9e5be06bf98e7179d89637efa7ff2287d7cdf43b6f924597076481b977ea535cdbf84596d77ed230cf7e194f27fb523cb3218f9f0973dcee0d2e234aafbd0010f204ae33ec9197cca8fcbd9ef5780cf3c616a1836098240ad0594b604bf4b41f47b3b8920a3745d1119d105607cf8bc1d7c84624fa5", 0x92}, {&(0x7f0000000300)="7abe1abe88b673d20b913fa8474f874c7aca609cc67b13a9bca14806b708518db181a591ed0174ae7c65901ca97d97482d702f9b18fafbe6663f7dd4f0e30fc8174482bb4922f2049bcaa05a33bfdbac98124dc5ffd58b3c43d3f4e5ff7229fc5a285fb8a2bd165f269d64ac3b97a1d13996b8cb38d1c21502e5f9048e271f4d06909dbaf4f9f2e379f266e7b8cf7558f599ca5e51e3da26ca80e036b13a5cde0d81aa49d6f2505c9b9e0c55828ae8908f6343b76a80b91ee2ba1cc76443e7933784643998cfa91d2fb8c3f79a705f5a88ff6ff6208bc9218d57bbaeab41f720c8ac5732c10bad3238b89bb7", 0xec}], 0x4, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}}, {{&(0x7f0000002b80)=@ll={0x11, 0x1b, r4, 0x1, 0x81, 0x6, @remote}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002c00)="fd972712f0a07748d226d78196149ed239d9ec9bb79412e4a1e9d4abdb3418bbb2aa733b93c1f73864c575f7541ee7b8c7161240ad63eaab4fa4a035306c70160bb2ed61ff339f328e14f4046850cb4eb8864021245a97758004e99899ed188f57ad6f3e9e5334dd4b3684758f7e593d1718f0b69a7bfd", 0x77}, {&(0x7f0000002c80)="2c2729ae906065a723fee9b5d62eedd5a83ad54da6fb22327ce5ea45ff395b9d8893ebbc6a3da949cff4dde756193670bbf0b2c641ac6e8e741388c6e56e68f49089040e00a96205ee043f3e74b8875ffccb49b7eb6a643addb5078d2d694fb68e2223bc3a61ab0aa0d351f114dac13556dcddb7392876d2692a11cbd967c79d49feda336d190d25cc1bc2570971d59296", 0x91}], 0x2, &(0x7f0000002d80)=[@timestamping={{0x14}}], 0x18}}, {{&(0x7f0000002dc0)=@xdp={0x2c, 0xf, r12, 0x1}, 0x80, &(0x7f0000000680)=[{&(0x7f0000002e40)="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", 0x1000}, {&(0x7f0000003e40)="10f36ea694dd46634d042ae9ddeb", 0xe}, {&(0x7f0000003e80)="fba3acfde990ff875a4661dec80b8a", 0xf}, {&(0x7f0000003ec0)="5fa227e91980c61a4bfb4e5a71", 0xd}, {&(0x7f0000003f00)="b60767cb702ac00c943109b8aa451582a41312d71bc459aaca8cf1990d85bba863171a1b9010e53770e9da1007e114161f66ddcdb73e6837b97aaf12f3c09e5b93bf7876b2b4799688badd6c2d667caa19e42c7b7b1e3ba8448c92d18a90af8304ac45eab657a6c8f46ff959bfd2dc1b3092c20f8fa8d57abb3febcaf6dde915e475b0812c2b540addc1a24f6404ac99c1ca16064513640e20b0d040c337e965099eaee459f8d053ae44158ff9e5e1eca5aceb37b707bbe2fc32d62641ac937fbd36508a8e8a68fc52bbd9f828f61c601698f142b36e88a238cf88278680de9ace46085d7afd73af", 0xe8}, {&(0x7f0000004000)="ba86a210bc85b8d978b0283a6581701f265602500929ce526c9c23a3307255e5541664341ebfc74b1daff6a5", 0x2c}, {&(0x7f0000004040)="bc49e6bf0c5c33e6d53e86f9784e590865e6773ad9593d2674abe206f1559f578f6d29c8b6fea21a3ed179d68266d0657cf291f3804f6375995ba5a50d0e5797b7", 0x41}, {&(0x7f00000040c0)="7c8021ccf1b48fd16980b49e0b8cd37659c177e65f12d4ca3fd939a1eacfd46c27d513871d493788092adbac1786a6d4787d0b54ad88408b3a5080081d7e1b6da19bcbb3fccd65a938f4837ab41d23f45db3949e008167721691f5b7f3f50803288737549446b3ba3ccf7eb687d98eaaf91cd84e8d347fd786e188efe2e8a3fbfb10eff587b20cab7540eaae60e4c95267c3ad6d238f1528876d3474873c396a3f12b26a231af202f61ed1112912a23e3364d3f7a8efdc677e", 0xb9}, {&(0x7f00000004c0)="198aebc326cbece6e2c576b16ae100989497c8cf448c40574c9dd49aafef224d01794fee78a6fdaa1024bc58d1f03838872e34eb8a6e4d31e8ee00caed3c5f9ae6dbb2a17343fa57e7b92da513f9bded0bd95533d844afb59772424d6aa774d2b0db378c5ec86e2e25d9d032fc654905680898902b1db994de8401e56de64c166c5bdbc18f3802240d90c0be05cea96056124a12bd66a41a02c67f3c945042349beded158ab03e065b0f886267a770a7c72e4ae12a8a148d517a8fb6af4398dc8e86e2aafae2205999a9604b909420a1ee3cf953b2eefdbc10c80aa4ec0545f5dc22edcdb24ec2083fb787b8a0d0013e0f5a", 0xf2}, {&(0x7f00000005c0)="3051e3386b1ba61ec48819fc12a13e0ba4ff939bd33ae928f59374dc8d3a7ff70b45f579501e602797746b2b1f3372a5f720084ffabfa47c39c51b0cca11363af4aa6e22d19ec98781b5a4233fdee93d97a2812234f68dae1a713b923671eeaa72137d2cd0041ac9571af1ccd30f3b1b17cb43a99415a42ab34dfd505a48539d4573f833b5bc69095914aaa5ab", 0x8d}], 0xa, &(0x7f0000004200)=[@txtime={{0x18, 0x1, 0x3d, 0x18c68ec3}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x30}}], 0x3, 0x4) 05:09:17 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0x0) [ 505.539035][ T28] audit: type=1800 audit(1590988157.129:905): pid=29167 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 05:09:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r5}, 0x87e9b1a5bf03cec0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000300)=r6) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x6, 0x5, 0x5, 0x0, 'syz1\x00', 0x4}, 0x0, 0x3, 0x3, r6, 0x8, 0x7ff, 'syz0\x00', &(0x7f0000000000)=['&\x00', '#posix_acl_access@nodeveth1procproc\x00', 'systemmime_type\xf3.mime_typeppp0.&#vboxnet1vmnet1eth0}\x00', '\x00', '\x00', '-wlan0\x00', '\x00', '@(\x16ppp1\x00'], 0x6d, [], [0x2, 0x4, 0x7, 0x3ff]}) [ 505.619822][ T28] audit: type=1800 audit(1590988157.129:906): pid=29167 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1 res=0 [ 505.638271][ T7171] minix_free_inode: bit 1 already cleared [ 505.752108][ T28] audit: type=1800 audit(1590988157.339:907): pid=29183 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16370 res=0 [ 505.788889][T29183] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 505.826715][T29183] attempt to access beyond end of device [ 505.842604][T29183] loop1: rw=2049, want=6434, limit=52 [ 505.859568][T29183] attempt to access beyond end of device [ 505.869076][T29183] loop1: rw=2049, want=6436, limit=52 [ 505.953443][ T7171] minix_free_inode: bit 1 already cleared 05:09:17 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0xf, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0xf00, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r3, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x100000000}, @L2TP_ATTR_OFFSET={0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) r7 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r7, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(r7, 0x0) 05:09:17 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x41c101, 0x0) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) 05:09:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 05:09:17 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0x0) 05:09:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="0000040000c019d8043b7d73212c026afaa3", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f00000003c0)=[@in6={0xa, 0x4e21, 0x100, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2f9}], 0x1c) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x101, @private1={0xfc, 0x1, [], 0x1}, 0x4}}, 0x2, 0x34c, 0xe8, 0x0, 0x0, 0x8000, 0x2}, &(0x7f0000000040)=0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={r7, @in6={{0xa, 0x4e20, 0x6b79, @mcast1, 0x5}}, 0x9, 0x2}, &(0x7f00000002c0)=0x90) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg$sock(r9, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x1, @remote, 0x3}], 0x4a) prctl$PR_CAPBSET_READ(0x17, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x3, @local, 0x9}], 0x1c) 05:09:17 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) [ 506.138847][ T28] audit: type=1800 audit(1590988157.729:908): pid=29210 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=4 res=0 05:09:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:17 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x10, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 506.185033][T29214] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\t', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000000500)={0x0, 0x101, 0x8, 0x4, 0x80000000, 0x2c}) syz_mount_image$ceph(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000180)="1e6754584078d7b0f2796011", 0xc}, {&(0x7f00000001c0)="e53b6f3f58ec345194b946a08c7bba87991ec208391715bf8b8d4b1dbe3d6ade5ff019fab8b870027eda90c45b0727f41fa2c9c951c895c132ab474cb6345325dae37537209994640e0a55ee00dc65f67d92a37cdf6f35367253f10b5674ea30671a1015125b5fa4fbc137e88802f15d4987766315097bbd2fe8b511cb362a130c0885c36acbdf83fa2901f00fffb18798f7449a2661e0c295173709fa084757ec8d33fb1139233ac484a46316c63d2fa3ecbaad83d927617ddfee2e09ea634d34cb7b61718826fe88f0c20ceebaba6f0ed786db2ade90e38b", 0xd9, 0x8000}], 0x2000, &(0x7f0000000300)='=.,posix_acl_access\x00') r6 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x6, 0x2c2080) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000380)) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000004c0)=@v2={0x2, @aes128, 0x8, [], "550a49ea7774a97a4b669a997e122108"}) [ 506.272946][T29214] attempt to access beyond end of device [ 506.309497][T29214] loop1: rw=2049, want=6434, limit=52 [ 506.361530][T29214] attempt to access beyond end of device 05:09:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x80000) epoll_pwait(r4, &(0x7f0000000100)=[{}, {}, {}], 0x3, 0xfffffff9, &(0x7f0000000140)={[0xffe00]}, 0x8) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:18 executing program 3: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000200)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000280)=""/4092, 0xffc}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000048, &(0x7f0000000040)=0x6, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000005, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x800000000000048, 0x0, &(0x7f0000000100)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000015a6c1349d49aa3800", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x76, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r4 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) r5 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000000)={0xff, 0xa, 0x2}) ioctl$VIDIOC_S_PRIORITY(r4, 0x40045644, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 506.405821][T29214] loop1: rw=2049, want=6436, limit=52 05:09:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getdents64(r5, &(0x7f0000000100)=""/190, 0xbe) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) io_destroy(0x0) 05:09:18 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0x0) 05:09:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e20, @local}], 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4420, @private=0xa010102}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000080)=""/186, 0xba, 0x2003, 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="404862cef9942b8545eb1d8a5008fbf0a093d983f5de475e1b9cf923474364da0c0f267f82c59ed26cf8e1f5fa3ee945ad27a076ccd8be9a943feb07dcdc78e0c515a8c1f82fca9361418bf7", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r7) [ 506.518806][ T7171] minix_free_inode: bit 1 already cleared 05:09:18 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) ioctl$VFIO_IOMMU_MAP_DMA(r4, 0x3b71, &(0x7f0000000140)={0x20, 0x2, 0x7, 0x9, 0x1f}) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) 05:09:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000900)="64f4fc1422c96c274ce0348c5ca5495817e2406da18358c8e53ae82e0558e12a63395d4f3046fda147690b3f8079b581932cce658504c4cb0c9b0c64cd946661eb71a9758f8631e1ccd5bdae145d5ed903fc70c1b45250dce708d181e86b7441c2f97cd10b2f0910baf020134b0ea215b7484c898317bc6c2a8169c5e5fb12a624c7bcf9f87a6e1a2d65e56a72d21f7a01bd0aa3cc97", 0x96}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)="0f", 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}, {{&(0x7f0000000100)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000180)="c292ae4e1752dc19089c2755686aa266f2ed7e21a70cf380fc6391136d680933c65cf5a12eccf0ea09dfbd215eff8d577ca8a67539d44820c12aba5fcfda8d7a500c95c9197cb952b859d08ad1115a0d760b9f36063a06eb0a694529e1feb044915192be7c4fa9a474bee5ad8a3270e71452e7326a3629bdd45cb0685238495e8503bae46f954b4a46ba690fd9e9c1137be51dbdc2322b366a5bbdcb80fd6ef625f900fc640261172fa8abed7be5f7057f6cc9d2b1a2", 0xb6}, {&(0x7f0000000240)="7f4656dfcadb26318652b0ab2154ab504c5b6895f310a9d96a2e885cc8b58925ed753480a6d94aefd8c74e52f9d2b0a54d3114ab", 0x34}, {&(0x7f00000002c0)="a465352a5b4db49c9fc2d078994aaef331ba3d54f77a85e3c1e841ff54c8b067e3edec05a992d97a6760da2f67a43e9fbec99c180ad9bcb109be02f02caa764d23bda8c8beb681e9f4a5a23b17a1f57c676eb485f7dc48eae50c72337a12d5d94b2d31bdfa7f3ac35b", 0x69}, {&(0x7f0000000380)="94c6fb74337ac7c7a24cdc5b5019559dafb02b1dceed357bf0a99f3abef74b5794200593181bd591b8e3fd06eb2926d7a640c382413266c746cb5f3e071df58db6f3ec268975da2185507c4e0bc539ebb911be744ee9e98c9f6f8efae76828a61f5f1432f6bf64161a742e", 0x6b}, {&(0x7f0000000480)="52c09a67d9200c2a092ef13e8b22377574b2c0d5391d65d32ca46f55d5031f1d6582ddb9a76c4cb9830b24c447efbabfd14c8b17d88050c49a6136f50a5d3b2cb537c8efbafe1cb8caadf9791aaf1d5acd1e4342d68a001028ba5e39fd1aaa711e7aa0a33fd232e5cae9a1cdf830b1a63a495cafa23fe91864298155faed7dc33ac65f8b21dee245f6ccb56f8ebf2f439a42916ec9976cfa7c480fd698425f8245f8d5362dee62b19c6fd496cdd9bee12dc305b9e3f179c48f6448e093a91a7c19a9562177823bbe910f660004be30a589f6b234bb138fd7fb7f44ff1e1898d8a8c79e1101633228ac", 0xe9}, {&(0x7f0000000580)="3b86b751ef1aea6a5550c6e0a766dc491402b8cc15b2d890462885def1ce4c443202e3cc51a4f9e3c65f24c70e78c33d89d2dca1844e9b82e9b5038290eed79a8c405edde9e6804cafcc654cb6e70d85dc769766ad4c32821c57ed19964c03ff343edc81829502a416eb856f6976cf4d246bfc78c2621154ecb0f42e98858314c223071fa59f2179ee2eabfa", 0x8c}, {&(0x7f0000000700)="747e9d7ee3bae6c9c61947a41e43bf7735f199af4e3cd4100d7f5399209aed463b534fa87142ef0a41d5ad8559ff25dbe951ffa339b2ad9d14d5ebb7ffc9a7499147d697c1d2596d7b0607ae218c4d1bc9ca884ebdb8304a4c9edef1f04388ebaeeaeacba3d80408870e0641c194f5ff7ec3790828433c8e9a8634def9f04f2e39e78ba00dee9fca1587243efc5c980f7c83d2fa0423a9d2de235f445b6fa9b14a4b1d2c0aa4f8e5bc6607918a8e5444237c91efd22e3b4187a9732bdea4163f54e9980597c9a3f83ec0feb54ed955579b80c3dec00ccdab46b513175130b1c031864f", 0xe3}], 0x7, &(0x7f0000000800)=[@mark={{0x14, 0x1, 0x24, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x60}}], 0x2, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000009c0)) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) bind$tipc(r7, 0x0, 0x0) [ 506.730111][T29256] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 506.784958][T29256] attempt to access beyond end of device [ 506.844130][T29256] loop1: rw=2049, want=6434, limit=52 [ 506.894506][T29256] buffer_io_error: 10 callbacks suppressed [ 506.894515][T29256] Buffer I/O error on dev loop1, logical block 3216, lost async page write 05:09:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)=""/111, &(0x7f0000000040)=0x6f) r1 = dup(r0) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x480200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 507.077156][T29256] attempt to access beyond end of device [ 507.091839][T29256] loop1: rw=2049, want=6436, limit=52 [ 507.104276][T29256] Buffer I/O error on dev loop1, logical block 3217, lost async page write 05:09:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r7 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80c00) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f43fb26e000000000000a5490000", 0xf}, {&(0x7f0000000340)="ff", 0x1}, {&(0x7f0000000480)="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", 0x199}, {&(0x7f0000000000)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 507.255133][ T7171] minix_free_inode: bit 1 already cleared 05:09:19 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x11, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:19 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0x0) 05:09:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000040)={[{0x6, 0x5, 0x1, 0x81, 0x40, 0xfd, 0x5b, 0x69, 0x9, 0x2, 0x3, 0x3f, 0xb6}, {0x0, 0x3f, 0x20, 0x2, 0x81, 0x6, 0x0, 0x3f, 0x1, 0x0, 0xe2, 0x81, 0x8}, {0x9, 0x2, 0x4, 0x8, 0x20, 0xb2, 0x7f, 0xd, 0x1f, 0x0, 0x7f, 0x3, 0xd02}], 0x9}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x3f, @remote, 0x6}], 0x1c) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r7, 0xc008ae09, &(0x7f00000000c0)) msgget(0x3, 0x3c0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) fallocate(r8, 0x16, 0x5, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) 05:09:19 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="f3b20c9842a860bd042277560a731276cb7e50ae52f154a76da6b199f87ed476b437260a021c8e18c35bd3ba1eaca1a00ce68d36cdb88e6e074ca920edaa", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x200) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-neon\x00'}, 0x58) ioctl$RTC_AIE_ON(r5, 0x7001) accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f00000002c0)="990424c0e4a560ebaf23e5f171d0f5654904d4b0b1b09ebc53c1089b1b7b26b5846a92461f4bb0babecf91ae691e9943f99c96147e8651212c05c9b09b2c15c0dcfd87e7b2fb9221f9383c56d58e9f50bfee4e4b5226792eb55e03c7be882de9c18e4065607eb5a7524da51512f9f84458ee5ee7587cfaaee0c99d58d26c518afc552fa1949e6e1b4c65a80882a700c87323f0fd3b6da63dcc37ce8c47009d38d5238d982fe95a9cb247f577336126eccc979f6d97584aae1b4f5166c1703a49197ca90ebfc5626ee4febea676eecb6f9a989327f811616e4888aff38e8ef5a6cb2bedf0c24719b4cec6956e525cb56c2ccb9adb9702d48aef4f000000000000", 0x100}], 0x4}}], 0x1, 0x2000c000) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x1, {0x1}}, 0x18) 05:09:19 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="000096f31ea7086a2fdd7297c73277d4126bf2775633a24cd5c217", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x5c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000100)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x2, 0x4e22, 0x1, 0xa, 0x0, 0x20, 0x21, r3, r7}, {0xffffffffffffff81, 0x4, 0x3ff, 0x0, 0x1, 0x4, 0x4, 0x64d5b652}, {0x3f, 0xfffffffffffff000, 0x1, 0xe62}, 0x0, 0x0, 0x2, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d4, 0xff}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x1, 0x1, 0x2, 0x9, 0xc9, 0x4}}, 0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@empty, r3}, 0x14) [ 507.558844][T29304] sctp: [Deprecated]: syz-executor.5 (pid 29304) Use of struct sctp_assoc_value in delayed_ack socket option. [ 507.558844][T29304] Use struct sctp_sack_info instead [ 507.663963][T29311] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 507.688908][T29311] attempt to access beyond end of device [ 507.700642][T29311] loop1: rw=2049, want=6434, limit=52 05:09:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000100)={0x0, 0x3b, 0x0, 0x1a, 0x0, 0x7, 0x3, 0xcf, 0x1}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@mcast1, r8}, 0x14) [ 507.717526][T29311] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 507.731613][T29311] attempt to access beyond end of device [ 507.739690][T29311] loop1: rw=2049, want=6436, limit=52 [ 507.745984][T29311] Buffer I/O error on dev loop1, logical block 3217, lost async page write 05:09:19 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000040)={0x78de, 0x800, 0x5, 0x0, 0x1000}) ioctl$SNDRV_PCM_IOCTL_STATUS64(0xffffffffffffffff, 0x80984120, &(0x7f0000000100)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 507.883979][ T7171] minix_free_inode: bit 1 already cleared 05:09:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r4, 0x8983, &(0x7f0000000100)={0x0, 'team0\x00', {0x3}, 0x9}) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r5}, 0x14) 05:09:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e24, @multicast2}], 0x10) [ 508.046079][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 508.046086][ T28] audit: type=1800 audit(1590988159.639:912): pid=29348 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16381 res=0 05:09:19 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f00000000c0)={r3, 0xc}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000000c0)={r3, 0x1}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000040)={r3, &(0x7f0000000000)=""/23}) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) [ 508.086487][T29348] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 508.115834][T29348] attempt to access beyond end of device [ 508.150992][T29348] loop1: rw=2049, want=6434, limit=52 05:09:19 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000080)=0x4) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) [ 508.197352][T29348] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 508.273567][T29348] attempt to access beyond end of device [ 508.308334][T29371] ubi: mtd0 is already attached to ubi0 [ 508.311841][T29348] loop1: rw=2049, want=6436, limit=52 [ 508.327298][T29348] Buffer I/O error on dev loop1, logical block 3217, lost async page write [ 508.383782][T29371] ubi: mtd0 is already attached to ubi0 [ 508.384455][ T7171] minix_free_inode: bit 1 already cleared 05:09:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000100)={0xb, 0x200, 0x1}) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_SMI(r8, 0xaeb7) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:20 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:20 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x12, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040), 0xffffffffffffff18) 05:09:20 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) write$P9_RWRITE(r6, &(0x7f0000000440)={0xb, 0x77, 0x2, 0x5}, 0xb) 05:09:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x589100, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 508.750329][ T28] audit: type=1800 audit(1590988160.339:913): pid=29397 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16374 res=0 05:09:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r1 = socket(0x1e, 0x805, 0x0) listen(r1, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r4}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x80000000, 0x7fff, 0x100, 0x8, 0x0, 0x1, 0x3}, 0x9c) [ 508.805652][T29397] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 508.826312][T29397] attempt to access beyond end of device [ 508.831978][T29397] loop1: rw=2049, want=6434, limit=52 [ 508.877261][T29397] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 508.962970][T29397] attempt to access beyond end of device 05:09:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = dup(r0) r5 = shmget(0x2, 0x4000, 0x40, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @local}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000480)={r8, 0xee, "edd9bddd2bdc99c9348fad40fd7bc32c572bdc41f40582ee46df027259e669ad9e864681795b8c946d2ef1e1202ad052dcec05904cfb865022f6275ab45a0889fffd249d41431321c8d040d783a3f71780edf1a9c34387e0782d05e6afbaa33905520e4e9d9b057523671648a8e9fa26cd2a0a5eea61a9fa6b33f0b54df43a39f2fbdc164bdc55e1021efc286db8f74711ebf166545caaada41785aff84f01c8b4439a6ab1f427f51bd7263db754185a87a33836423f280f75e1b3046d45fc25d70556bcfbb9a1cf3dc9635b0e38caffae15ecaad748ff6cd25d63d312ec4c801673569215fd88f6e795c9a853f9"}, &(0x7f0000000200)=0xf6) 05:09:20 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(0xffffffffffffffff, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="360f35ca1f4144028ac91f3012f2b8a8ea7cd997468eed45ef94e88a34bb6b01a8658621e2e49358b558d458c7d4099ad21a8fac7c48f9a6ee788c287ffdc1ac323420a551cb628ad5e798f1b66f3890cfeb9c60f644f0bdfa1a8650b2a988fd2ceb33d6089e16d625f13103b1842f6bcc450478da663a34", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000080)=""/129) r8 = pidfd_getfd(0xffffffffffffffff, r4, 0x0) ioctl$TIOCMIWAIT(r8, 0x545c, 0x0) write$P9_RWRITE(r1, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) [ 509.010754][T29397] loop1: rw=2049, want=6436, limit=52 [ 509.020423][T29397] Buffer I/O error on dev loop1, logical block 3217, lost async page write 05:09:20 executing program 3: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1}, &(0x7f0000000140)=0xc) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x141000) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x4bc, 0x1, 0x5, 0x801, 0x0, 0x0, {0x93e92fa9a3a003da, 0x0, 0xa}, [{{0x254, 0x1, {{0x0, 0x3}, 0x3, 0x5, 0x5, 0x8001, 0x2, 'syz0\x00', "2e4e91700292836cd4a9d63b85aa312419e712bdc26e77a61018119858bd7b99", "518e4d3b99da1cbc69e3d8cfa9e4da6462dd0875cb72099fdefa1c32a5e145dc", [{0x0, 0x7, {0x0, 0x9}}, {0x1f, 0x4eb, {0x2, 0x6}}, {0x800, 0x8000, {0x3, 0x979a}}, {0x7, 0x7fff}, {0x7, 0x3f, {0x3, 0xff}}, {0x6, 0x0, {0x2, 0x1}}, {0x1, 0x6, {0x1, 0xffff}}, {0x1c, 0xff, {0x2, 0x7f}}, {0x1, 0x1}, {0x2, 0x2, {0x0, 0x40}}, {0x2, 0x2, {0x0, 0xfffffffe}}, {0x1, 0x0, {0x0, 0x2}}, {0x7, 0x5, {0x3, 0x3}}, {0x7, 0x2, {0x2, 0x4}}, {0x101, 0xa4f4, {0x0, 0x7}}, {0xfffb, 0x6, {0x0, 0x2}}, {0xfffd, 0x11c, {0x3, 0x20000}}, {0x8, 0x9, {0x1, 0xffffb034}}, {0x8, 0x4, {0x0, 0x78f7}}, {0x0, 0x2, {0x2, 0x7}}, {0x3, 0x80, {0x0, 0xff}}, {0xfffc, 0x4, {0x1, 0x94be}}, {0x2, 0x4, {0x2, 0x6}}, {0x4, 0x4f, {0x0, 0x7}}, {0x7, 0x81, {0x3, 0x5}}, {0x8000, 0x9, {0x2, 0x3}}, {0x401, 0xee, {0x1, 0x5}}, {0x5, 0x20, {0x3, 0x7}}, {0x3, 0x7fff, {0x2, 0x101}}, {0xff58, 0x6, {0x2, 0xdb}}, {0x7, 0x7ff, {0x1}}, {0x2, 0xfff, {0x2, 0x800000}}, {0x80, 0x80, {0x1, 0x6}}, {0x6, 0x3, {0x1}}, {0x40, 0x800, {0x3, 0x5}}, {0xe4b, 0x81, {0x7, 0x50}}, {0x8, 0x6, {0x3}}, {0x6, 0x80, {0x1, 0x7fffffff}}, {0x4495, 0xfffb, {0x1, 0x7fff}}, {0x7ff, 0x0, {0x3, 0x5}}]}}}, {{0x254, 0x1, {{0x3, 0x3}, 0x7, 0x4, 0x3, 0x80, 0x17, 'syz0\x00', "8b80535aee71706b49a7ddf4731652b476a9417a5cf7bdce976441e65753ed4d", "2d2a75630cf08924b53273cf45f417c47203ccd6fbdd9068583272d99a131d16", [{0xfd24, 0x9, {0x0, 0x9}}, {0xff47, 0x8, {0x3, 0x5}}, {0x800, 0x5, {0x3, 0xa0}}, {0x5640, 0x8001, {0x1, 0x52}}, {0x1, 0x8000, {0x1, 0x1004}}, {0x2a, 0x101, {0x1}}, {0x7e01, 0x5, {0x0, 0xa9}}, {0x10, 0x0, {0x3, 0xff}}, {0x1f, 0x4, {0x2, 0x5}}, {0x5, 0x3, {0x3}}, {0x24, 0x3, {0x2, 0x200}}, {0x2, 0x1, {0x3, 0x1}}, {0xfff, 0x1ff, {0x3, 0x9}}, {0x0, 0x7, {0x2, 0xfffffffc}}, {0xec, 0x8, {0x0, 0x6}}, {0x3f, 0x5, {0x3, 0xffffffff}}, {0x5, 0xf801, {0x3, 0xafb5}}, {0x0, 0x3, {0x3, 0x5}}, {0x3, 0x80, {0x11c6436286d78bd2}}, {0x0, 0x2, {0x1, 0x1}}, {0x81, 0x3, {0x3, 0x9}}, {0x1, 0x7, {0x1, 0x800}}, {0xaab, 0x4}, {0x5d, 0x1, {0x3, 0x672}}, {0x7, 0x7, {0x1, 0x8001}}, {0x400, 0x3, {0x0, 0x2}}, {0xa846, 0x3, {0x3, 0x4f}}, {0x7, 0x7f, {0x1, 0x800}}, {0x101, 0x6, {0x0, 0x5}}, {0x9, 0x3, {0x0, 0x9}}, {0x5, 0x0, {0x1, 0x2eff}}, {0x6, 0x4, {0x1, 0x6}}, {0x7, 0x4, {0x0, 0x5}}, {0x5, 0x2, {0x1, 0x2}}, {0x200, 0x81, {0x3, 0x16}}, {0xb58, 0x23, {0x0, 0x5c1}}, {0x4, 0xff, {0x3, 0x6}}, {0x0, 0x9, {0x1, 0x3}}, {0xb78d, 0x800, {0x2, 0xc}}, {0xf0, 0x5000, {0x1}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @local}], 0x10) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$SOUND_MIXER_INFO(r4, 0x805c4d65, &(0x7f0000000180)) 05:09:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@private}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@private1, @in6=@local, 0x4e21, 0x7cb5, 0x4e22, 0x9, 0xa, 0x0, 0xa0, 0x8, 0x0, r8}, {0x3, 0xfffffffffffffff8, 0x80000000000000, 0x0, 0x4, 0x6, 0x5, 0xfffffffffffffffb}, {0x6, 0x8, 0xc6, 0x6}, 0xffff, 0x6e6bb3, 0x2, 0x0, 0x6, 0x2}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x2b}, 0xa, @in=@rand_addr=0x64010102, 0x3507, 0x1, 0x2, 0x8, 0x400, 0x0, 0x400}}, 0xe8) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r9}, 0x14) 05:09:20 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) [ 509.167474][ T7171] minix_free_inode: bit 1 already cleared 05:09:20 executing program 3 (fault-call:4 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) rt_sigtimedwait(&(0x7f0000000040)={[0xc9c3]}, 0x0, &(0x7f0000000100)={0x77359400}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000180)=@usbdevfs_driver={0x5, 0x3, &(0x7f0000000140)='[`'}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f00000001c0)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 509.354730][ T28] audit: type=1800 audit(1590988160.949:914): pid=29456 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16360 res=0 [ 509.380704][T29456] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:21 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x13, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:21 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x26, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f800000000010400ff5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc3a6d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="8f07a28d24cd7e1fc3461019564f35e5590009ee93feda67e7f5ed0d9a7692815ec497d24f4d456dc02460049a41a6baf19371", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={@mcast1, 0x5b, r9}) 05:09:21 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) write$P9_RWRITE(r0, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000000)={0x0, 0x0, [0x2, 0x8, 0x1f, 0x6]}) [ 509.461427][ T7171] minix_free_inode: bit 1 already cleared [ 509.470526][ T28] audit: type=1800 audit(1590988161.059:915): pid=29465 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16374 res=0 [ 509.561944][T29465] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 509.576602][T29476] FAULT_INJECTION: forcing a failure. [ 509.576602][T29476] name failslab, interval 1, probability 0, space 0, times 0 [ 509.646211][T29476] CPU: 0 PID: 29476 Comm: syz-executor.3 Not tainted 5.7.0-rc7-syzkaller #0 [ 509.654916][T29476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.664964][T29476] Call Trace: [ 509.668259][T29476] dump_stack+0x1e9/0x30e [ 509.672578][T29476] should_fail+0x433/0x5b0 [ 509.676994][T29476] ? alloc_pipe_info+0xe4/0x470 [ 509.681847][T29476] should_failslab+0x5/0x20 [ 509.686333][T29476] kmem_cache_alloc_trace+0x57/0x300 [ 509.691593][T29476] alloc_pipe_info+0xe4/0x470 [ 509.696248][T29476] splice_direct_to_actor+0x95b/0xb40 [ 509.701597][T29476] ? do_splice_direct+0x340/0x340 [ 509.706595][T29476] ? lock_acquire+0x169/0x480 [ 509.711251][T29476] ? do_sendfile+0x7dd/0xfe0 [ 509.715821][T29476] ? fsnotify_perm+0x64/0x390 [ 509.720482][T29476] do_splice_direct+0x201/0x340 [ 509.725322][T29476] do_sendfile+0x809/0xfe0 [ 509.729720][T29476] __x64_sys_sendfile64+0x164/0x1a0 [ 509.734890][T29476] ? do_syscall_64+0x19/0x1b0 [ 509.739543][T29476] do_syscall_64+0xf3/0x1b0 [ 509.744041][T29476] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 509.749922][T29476] RIP: 0033:0x45ca69 [ 509.753790][T29476] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.773364][T29476] RSP: 002b:00007f19e2984c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 509.781762][T29476] RAX: ffffffffffffffda RBX: 00000000004fc580 RCX: 000000000045ca69 [ 509.789705][T29476] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000006 [ 509.797647][T29476] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 509.805589][T29476] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000007 [ 509.813551][T29476] R13: 00000000000008dc R14: 00000000004cba56 R15: 00007f19e29856d4 [ 509.864576][ T28] audit: type=1800 audit(1590988161.449:916): pid=29491 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16366 res=0 [ 509.892481][T29491] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:21 executing program 3 (fault-call:4 fault-nth:1): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:21 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x14, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:21 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200280, 0x0) fsconfig$FSCONFIG_SET_PATH(r6, 0x3, &(0x7f0000000100)='/cpuset%-posix_acl_accessppp0\x00', &(0x7f0000000140)='./file0\x00', r8) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r9}, 0x14) [ 509.973290][ T7364] minix_free_inode: bit 1 already cleared [ 510.008949][ T7171] minix_free_inode: bit 1 already cleared 05:09:21 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x129201, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x41, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) [ 510.127403][ T28] audit: type=1800 audit(1590988161.709:917): pid=29511 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16372 res=0 [ 510.137593][T29511] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 510.185190][T29511] attempt to access beyond end of device [ 510.207526][T29511] loop3: rw=2049, want=6434, limit=52 [ 510.219842][T29511] Buffer I/O error on dev loop3, logical block 3216, lost async page write [ 510.229112][T29511] attempt to access beyond end of device [ 510.236036][T29511] loop3: rw=2049, want=6436, limit=52 [ 510.241474][T29511] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 510.266071][T29518] FAULT_INJECTION: forcing a failure. [ 510.266071][T29518] name failslab, interval 1, probability 0, space 0, times 0 05:09:21 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x15, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 510.295734][ T28] audit: type=1800 audit(1590988161.849:918): pid=29520 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16381 res=0 [ 510.301649][T29520] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 510.397094][T29518] CPU: 0 PID: 29518 Comm: syz-executor.3 Not tainted 5.7.0-rc7-syzkaller #0 [ 510.405789][T29518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.405794][T29518] Call Trace: [ 510.405811][T29518] dump_stack+0x1e9/0x30e [ 510.405826][T29518] should_fail+0x433/0x5b0 [ 510.405848][T29518] ? kcalloc+0x32/0x60 [ 510.405862][T29518] should_failslab+0x5/0x20 [ 510.405871][T29518] __kmalloc+0x74/0x330 [ 510.440784][T29518] ? kmem_cache_alloc_trace+0x24c/0x300 [ 510.446339][T29518] kcalloc+0x32/0x60 [ 510.450230][T29518] alloc_pipe_info+0x1fc/0x470 [ 510.455000][T29518] splice_direct_to_actor+0x95b/0xb40 [ 510.460381][T29518] ? do_splice_direct+0x340/0x340 [ 510.465400][T29518] ? lock_acquire+0x169/0x480 [ 510.470075][T29518] ? do_sendfile+0x7dd/0xfe0 [ 510.474656][T29518] ? fsnotify_perm+0x64/0x390 [ 510.479327][T29518] do_splice_direct+0x201/0x340 [ 510.484185][T29518] do_sendfile+0x809/0xfe0 [ 510.488616][T29518] __x64_sys_sendfile64+0x164/0x1a0 [ 510.493824][T29518] ? do_syscall_64+0x19/0x1b0 [ 510.498502][T29518] do_syscall_64+0xf3/0x1b0 [ 510.503004][T29518] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 510.508977][T29518] RIP: 0033:0x45ca69 [ 510.512872][T29518] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.534153][T29518] RSP: 002b:00007f19e2984c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 05:09:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) socket$inet6(0xa, 0xa, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) setsockopt$inet6_buf(r6, 0x29, 0x3d, &(0x7f0000000100)="116bf209d5c4cd3cf7c6a2916515bff83723be6330e7dd235e24c8d1e5f2b8235c00c0f8d39398b3bc6a2b3eb24c386c1ba67974c1e0ec0cd019367f70540616fc762e4e8fd0b67dd403762c67237171e3a267f351fc9c2b9a1a71d0ee8548ae2ba279b78ee73b9924eea8c94348c97737fa0c34ce7a83b3a9aaaafcbcf56a48b9e98a7b46998c84dcca62a62ea57fa64967a695c9341a256b044bbf8ddc", 0x9e) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) 05:09:22 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x5, @loopback, 0x2}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @private=0x7}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7fffffff}], 0x58) sendto$inet(r3, &(0x7f00003cef9f)='7', 0xfffffec2, 0x40000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRESHEX], &(0x7f0000a8a000)=0xc) r4 = socket$inet(0x2, 0x5, 0x2) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="e7060000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:22 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x16, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 510.542587][T29518] RAX: ffffffffffffffda RBX: 00000000004fc580 RCX: 000000000045ca69 [ 510.550727][T29518] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 510.558703][T29518] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 510.566674][T29518] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 510.574648][T29518] R13: 00000000000008dc R14: 00000000004cba56 R15: 00007f19e29856d4 05:09:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fstat(r0, &(0x7f0000000100)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x8001, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x9a, "52509e3c236dae7ae9fda7318b42cbdb374e76e54663d6bc891794e6f14a706cc351d5d7e18f07a4401726faf361f89f7837edd688b2ac161a3eff2223420af31b6f069caef43288ab98fd4339bb5319bf39a05f30b82b15e36d0f13de266ef777472403f907b8c009057f5deef7935b091b2d8b0afc65883d8f8853b85fe70ee8eb1fdaf7361f9b70ad0a4c7cc25c0282816badc691a367e0f2"}, &(0x7f00000001c0)=0xbe) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000180)) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000000)) write$P9_RWRITE(r1, &(0x7f0000000440)={0xb, 0x77, 0x2}, 0xb) [ 510.595380][ T7171] minix_free_inode: bit 1 already cleared 05:09:22 executing program 3 (fault-call:4 fault-nth:2): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) [ 510.726969][ T7364] minix_free_inode: bit 1 already cleared 05:09:22 executing program 4 (fault-call:5 fault-nth:0): r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 510.850883][ T28] audit: type=1800 audit(1590988162.429:919): pid=29568 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16372 res=0 [ 510.912496][T29570] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:22 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = semget$private(0x0, 0x0, 0x0) semop(r4, 0x0, 0x0) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000100)=""/84) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r9}, 0x14) 05:09:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="64348c5c00000000000000000000003afc88db780e3a42a86440cb974643ed1d63b2b3777b2b9d166e10888f59ca67c8ac7859a910b35a144924895f9c9530c2299621b506f63a6b1a6f778636331358b5252287630a9c49b5b30070fcb4fd998067598bad6c4f41914811057a9ad6428d27d9bc1d0844ad5ae0ba997fb7a847725df6252df5a73ebcb1af960bf62cd41c75c9f87bcfac9ef0a5e6e855ee5df31fa953588fcd548a79fad5f18d5d182bc30febfc08", 0xb5}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000140)='!', 0x1}, {&(0x7f0000000440)=';', 0x1}], 0x4}}], 0x1, 0x840) r4 = socket(0x1e, 0x805, 0x0) listen(r4, 0x0) sendmsg$tipc(r4, &(0x7f00000003c0)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x41}, 0xfffffffd}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8041}, 0x1) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r7}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r7, 0x8000, 0x8, 0x80000001, 0x1000, 0x1}, 0x14) [ 510.965018][ T28] audit: type=1800 audit(1590988162.469:920): pid=29570 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16384 res=0 [ 511.003647][T29570] attempt to access beyond end of device [ 511.028848][T29570] loop3: rw=2049, want=6434, limit=52 05:09:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:22 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 511.097144][T29570] attempt to access beyond end of device [ 511.118868][T29570] loop3: rw=2049, want=6436, limit=52 [ 511.152737][T29581] FAULT_INJECTION: forcing a failure. [ 511.152737][T29581] name failslab, interval 1, probability 0, space 0, times 0 [ 511.187592][T29581] CPU: 1 PID: 29581 Comm: syz-executor.3 Not tainted 5.7.0-rc7-syzkaller #0 05:09:22 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 511.196292][T29581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.206442][T29581] Call Trace: [ 511.209739][T29581] dump_stack+0x1e9/0x30e [ 511.214074][T29581] should_fail+0x433/0x5b0 [ 511.218501][T29581] ? mempool_alloc_slab+0x49/0x70 [ 511.223526][T29581] should_failslab+0x5/0x20 [ 511.228109][T29581] kmem_cache_alloc+0x53/0x2d0 [ 511.232870][T29581] mempool_alloc_slab+0x49/0x70 [ 511.237719][T29581] ? mempool_free+0x380/0x380 [ 511.242403][T29581] mempool_alloc+0xf1/0x5a0 [ 511.246909][T29581] ? finish_task_switch+0x24f/0x550 [ 511.252125][T29581] bio_alloc_bioset+0x1af/0x5d0 [ 511.256981][T29581] submit_bh_wbc+0x1c7/0x6d0 [ 511.261595][T29581] block_read_full_page+0xa31/0xcf0 [ 511.267349][T29581] ? minix_prepare_chunk+0x30/0x30 [ 511.272467][T29581] ? trace_mm_filemap_add_to_page_cache+0x280/0x280 [ 511.279058][T29581] generic_file_buffered_read+0xc12/0x2570 [ 511.284897][T29581] generic_file_splice_read+0x452/0x700 [ 511.290455][T29581] ? splice_shrink_spd+0xb0/0xb0 [ 511.295396][T29581] splice_direct_to_actor+0x3c1/0xb40 [ 511.300866][T29581] ? do_splice_direct+0x340/0x340 [ 511.305899][T29581] do_splice_direct+0x201/0x340 [ 511.310759][T29581] do_sendfile+0x809/0xfe0 [ 511.315194][T29581] __x64_sys_sendfile64+0x164/0x1a0 [ 511.320389][T29581] ? do_syscall_64+0x19/0x1b0 [ 511.325078][T29581] do_syscall_64+0xf3/0x1b0 [ 511.329588][T29581] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 511.335479][T29581] RIP: 0033:0x45ca69 [ 511.339367][T29581] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.359142][T29581] RSP: 002b:00007f19e2984c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 511.367648][T29581] RAX: ffffffffffffffda RBX: 00000000004fc580 RCX: 000000000045ca69 [ 511.375622][T29581] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 511.383592][T29581] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 511.392524][T29581] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 511.400504][T29581] R13: 00000000000008dc R14: 00000000004cba56 R15: 00007f19e29856d4 05:09:23 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) write$smackfs_cipso(r1, &(0x7f0000000100)={'poly1305-generic\x00', 0x20, 0xe9, 0x20, 0x6, 0x20, [{0x36}, {0x8e}, {0x26}, {0x6b}, {0x35}, {0xa5}]}, 0xbb) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 511.554278][ T28] audit: type=1800 audit(1590988163.140:921): pid=29601 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16375 res=0 [ 511.608282][T29581] attempt to access beyond end of device [ 511.616150][T29581] loop3: rw=0, want=6434, limit=52 [ 511.621653][T29581] attempt to access beyond end of device [ 511.641830][T29581] loop3: rw=0, want=6436, limit=52 05:09:23 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x17, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x10001, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000180)="2f3d3db364769807acce0415eed7be9516a3edfef0cc9e9f355c3a34256d765d1544a037c2c81c50c75567bd9c42347e02e413ec53e0bfa70a2b43f4e7b4125ed894e9b6504ace8413a4c4dd996b71efb4d983ee78f55a22c1", 0x59, 0x8}, {&(0x7f0000000200)="f6d2a37a39842be12d0aa47c004775789c06875876016523930dcb2619023a2c02de4e10871946156d1b13c1ab06dfe930a0782c74b0e49046e089d4129a2fd690c9dc4ed3d717731f6d2eca474fb284d61a696d37080460f31f927eb7a9e9f953327d3b7711abcc2e32d34e8f91db50c722db83f54881af1151ef8af804485e05b592263dd97af26d0ea4c30fc83e204e8142273eec901802abf25bee041be88fcf3535d08f8b06732e5d9889588a", 0xaf, 0x983}], 0x4, &(0x7f0000000300)={[{@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x6b, 0x32]}}, {@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x39, 0x3a, 0x32, 0x39, 0x2c]}}}}, {@huge_advise={'huge=advise', 0x3d, ':\\$@/'}}], [{@smackfsfloor={'smackfsfloor'}}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x26}}, {@fsname={'fsname', 0x3d, '/'}}, {@measure='measure'}]}) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:23 executing program 3 (fault-call:4 fault-nth:3): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:23 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r2, 0xc0405602, &(0x7f0000000100)={0x80000001, 0xa, 0x2, "134cc0649c0b3731b875771e41f7a9369ee42d1cf396b1b8b1f54b0d2158ad32", 0x33363248}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:23 executing program 1: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 511.706618][ T7364] minix_free_inode: bit 1 already cleared 05:09:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x600200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 511.805584][T29613] tmpfs: Bad value for 'nr_inodes' [ 511.810036][T29614] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:23 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x1000000, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 511.874250][T29614] minix_free_inode: bit 1 already cleared [ 511.889716][T29624] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 511.912020][T29624] attempt to access beyond end of device [ 511.925686][T29624] loop3: rw=2049, want=6434, limit=52 [ 511.932089][T29624] buffer_io_error: 4 callbacks suppressed [ 511.932097][T29624] Buffer I/O error on dev loop3, logical block 3216, lost async page write [ 511.948016][T29624] attempt to access beyond end of device [ 511.949940][T29630] tmpfs: Bad value for 'nr_inodes' [ 511.954707][T29624] loop3: rw=2049, want=6436, limit=52 [ 511.966376][T29624] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 511.975241][T29635] attempt to access beyond end of device [ 511.981020][T29635] loop3: rw=0, want=6434, limit=52 [ 511.989604][T29635] Buffer I/O error on dev loop3, logical block 3216, async page read [ 512.040808][T29635] FAULT_INJECTION: forcing a failure. [ 512.040808][T29635] name failslab, interval 1, probability 0, space 0, times 0 05:09:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x204080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00000001c0)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$CAPI_GET_SERIAL(r4, 0xc0044308, &(0x7f0000000180)=0x1) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x800, 0x0) lseek(r5, 0x71b, 0x4) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) 05:09:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) sendto$inet(r5, &(0x7f0000000100)="49fbccd0c139119acaeeeb148f000000009cb8", 0x13, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES64=r5, @ANYRES32=r3], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$TCSETXF(r4, 0x5434, &(0x7f0000000000)={0xcb, 0xfc, [0x3, 0xf800, 0x100, 0x68fd, 0xa8db], 0x200}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) sendmmsg$sock(r8, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)}}], 0x1, 0x0) 05:09:23 executing program 1: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:23 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x2000000, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 512.107961][T29635] CPU: 1 PID: 29635 Comm: syz-executor.3 Not tainted 5.7.0-rc7-syzkaller #0 [ 512.116660][T29635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.126713][T29635] Call Trace: [ 512.130007][T29635] dump_stack+0x1e9/0x30e [ 512.134340][T29635] should_fail+0x433/0x5b0 [ 512.138763][T29635] ? mempool_alloc_slab+0x49/0x70 [ 512.143785][T29635] should_failslab+0x5/0x20 [ 512.149502][T29635] kmem_cache_alloc+0x53/0x2d0 [ 512.155056][T29635] mempool_alloc_slab+0x49/0x70 [ 512.159906][T29635] ? mempool_free+0x380/0x380 [ 512.164575][T29635] mempool_alloc+0xf1/0x5a0 [ 512.169085][T29635] ? generic_make_request+0x102/0x980 [ 512.174460][T29635] bio_alloc_bioset+0x1af/0x5d0 [ 512.179581][T29635] submit_bh_wbc+0x1c7/0x6d0 [ 512.184174][T29635] block_read_full_page+0xa31/0xcf0 [ 512.189376][T29635] ? minix_prepare_chunk+0x30/0x30 [ 512.194505][T29635] ? trace_mm_filemap_add_to_page_cache+0x280/0x280 [ 512.201117][T29635] generic_file_buffered_read+0xc12/0x2570 [ 512.206952][T29635] generic_file_splice_read+0x452/0x700 [ 512.212516][T29635] ? splice_shrink_spd+0xb0/0xb0 [ 512.217457][T29635] splice_direct_to_actor+0x3c1/0xb40 [ 512.222844][T29635] ? do_splice_direct+0x340/0x340 [ 512.227874][T29635] do_splice_direct+0x201/0x340 [ 512.232732][T29635] do_sendfile+0x809/0xfe0 [ 512.237171][T29635] __x64_sys_sendfile64+0x164/0x1a0 [ 512.242362][T29635] ? do_syscall_64+0x19/0x1b0 [ 512.247079][T29635] do_syscall_64+0xf3/0x1b0 [ 512.251610][T29635] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 512.257591][T29635] RIP: 0033:0x45ca69 [ 512.261480][T29635] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.281080][T29635] RSP: 002b:00007f19e2984c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 512.289496][T29635] RAX: ffffffffffffffda RBX: 00000000004fc580 RCX: 000000000045ca69 [ 512.297895][T29635] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 512.306644][T29635] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 512.314699][T29635] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000005 [ 512.322668][T29635] R13: 00000000000008dc R14: 00000000004cba56 R15: 00007f19e29856d4 [ 512.417891][T29635] attempt to access beyond end of device [ 512.435576][T29635] loop3: rw=0, want=6436, limit=52 [ 512.456195][T29635] Buffer I/O error on dev loop3, logical block 3217, async page read [ 512.496713][T29651] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 512.569901][T29651] minix_free_inode: bit 1 already cleared [ 512.642495][ T7364] minix_free_inode: bit 1 already cleared 05:09:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x440200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r4, 0xe5b8, 0x0, 0x7, 0x8}, &(0x7f0000000200)=0x18) r5 = socket$alg(0x26, 0x5, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_DELDEST(r6, 0x0, 0x488, &(0x7f0000000100)={{0x2b, @multicast2, 0x4e24, 0x2, 'wrr\x00', 0x20, 0x3, 0x80}, {@broadcast, 0x4e21, 0x0, 0x5, 0x200, 0x7f}}, 0x44) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:24 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x200001c3}], 0x1}, 0x40002022) 05:09:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="00020900", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) r8 = pidfd_getfd(r6, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r8, 0x0, 0x1, &(0x7f0000000140)=0x80000000, 0x4) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r9}, 0x14) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x6000, 0x0) 05:09:24 executing program 3 (fault-call:4 fault-nth:4): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:24 executing program 1: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:24 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x18, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 512.902871][T29683] IPVS: set_ctl: invalid protocol: 43 224.0.0.2:20004 [ 512.933348][T29682] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:24 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x7ffff000}], 0x1}, 0x40002022) [ 512.945830][T29685] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 512.965032][T29683] IPVS: set_ctl: invalid protocol: 43 224.0.0.2:20004 [ 512.973369][T29682] minix_free_inode: bit 1 already cleared [ 512.996215][T29685] attempt to access beyond end of device 05:09:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000001ac0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000001b00)={0x401, 0x6, 0x4, 0x40000000, 0x100, {r2, r3/1000+10000}, {0x1, 0xc, 0x4, 0x4, 0x9, 0x9, "609aec05"}, 0x80000001, 0x2, @offset=0x4, 0x4, 0x0, r0}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)}}], 0x1, 0x4000) r6 = shmget(0x1, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_STAT(r6, 0xd, &(0x7f0000001a00)=""/79) r7 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f0000001580), &(0x7f0000001a80)=0x30) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = socket$packet(0x11, 0x3, 0x300) dup3(r10, r9, 0x0) sendmmsg(r8, &(0x7f0000001940)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x2, 0x2, 0x2, 0x1, {0xa, 0x4e24, 0xa50b, @empty, 0x13d}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="57189a5f5fef5348b1a78a36950983e3a3d8baa9288bdcdee61b170f31a4ca2d3c12286e221fd9a8a93e7a", 0x2b}, {&(0x7f0000000140)="12b22fcdc2efd6db0d27ce04f6ddd76c4ce200560da56cc8a42e19b91f3a74799603a6011945f0d3e6eb05197c13d2c7fb19e1fd6669b8b4e578ffc2ad03372cbf7eebc18e809d1a9fc4571aa51e97f03d899f4e4ace7e7e36", 0x59}], 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="68000000000000000701000008000000f0a15267b3227dac554c5e4211113985ab3f85ff904d1c7ab6dee1be35d0cf1f9260ee906b2d41cedabcbc1daa7d8f4183684025b5b4cc0a99ac3179a5b9d85cf37536f1bc12388b5fcf54aac630a7083b15000000000000"], 0x68}}, {{&(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x7, 0x1, "fd3d6d510da286cf741a204caf21bf238a6b03411acfd43e2bec6a8fa5c38e34e5a0691fbe9062fb890b8b976f37e49ba6ce3b97cf2b3086a5cdf60bb19d8c", 0x12}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000300)="7708e95e31f98e025087862f38280365838c2c20c3ec15915da2956ee0a08aa6bb2b3125668f33e7872ffccfb3f6c1cb6a7eeef73057bc8525df6ea7569dab24a9374db247aaadc3c27e", 0x4a}, {&(0x7f0000000380)="3bf1cd2930a7a950bb05dd1f6a1786b5d9fa8f281d53fe7a28127a2474685a29c548a0466dabde6445d147ee9ae08f454d65cbc1750640b5e0498ca00ca475d74915c1d8ce53a3f1ad1e4d9a66d805c06b40ed06de2c9c357245df823fa4ca7ddf4b65e8a86626e09a035799f80394a65f01de97a2d5784d4ec4694cb0357701d4558bcdc36cb33530a67dde24429d", 0x8f}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="43cdba879785e195337fa0afeb4cefeb6cd45cd142625a07e90b820a9384f18c5eff55ac5dbc1b5bd52ecd02cfc10d7fb2d776a1716130eb460045ed88b7247b69c157cca0a837e4ec463fab64002c2b54b0cbe19fd1f0f56065452c5edc4891d50aad54653ea8096a8d525445f13a76da03f732acbb3509346f8d18a987134caa429f0a047bb378c3053fe5c22775edd57669ee60109e1ea9de8228199f72431cb7b0c44856f2f090d8584399e1f319cc6c11e62ae4dd156d615c38fa83853d8a45fda70420d33c9cde9de51a5bfb8ca8e5f7846e21a9f9cd", 0xd9}], 0x4, &(0x7f0000002300)=ANY=[@ANYBLOB="28000000000000001100000080f6ffff89a5e38b9f57d75280c105cd7e51651bad58647e04a9f100101000000000000003010000ff7f00007b313fefc476ce44a4e8b1a8e3f4017ece5f53a70ae20040284d551a0ef8cda9a306097d127e27a3b188954665290538720a0b4935034d6a7f43afa7ea507fd677e58dcd173e548eacbe8a62177d5aaa434fe0d4ea55e6254a6357e9d12af619919f7fda5225753c032a12a305881c6828336d49fae64d07f6e46321ff8cbffb08c0cdce571a59c0cd46d7cc1ca4fc5e44847cf4d9fd07fa931b86ade75e2af268d899ef5ec43904a3e30b25983f6cbeed33a489613a019eec94cf5b706a5544ade40e2390d2cc0ecb1416679de8e998900b925578983271ceb0a243dab8efc694c946746c16aca204fa5d41b004dd1d9b9ba4c47d8eeefeea143fdc0bcd134ffcd76091d151453f1b4f1e44a5acdf3e28158220315db2f493ba841240a0958a29553855c98a649d96d187d11e290139405e9bb8f11d07d9e4a4972a5a30a3bec10cf5a4aa9744c2204d7929bc773f96f950285a889fd6d96f41f10a02c769a7992ebbb531bc974980524c636cdcbd7a0a1dfe7e2ffe8232575e0040710857de75a7e644c09c57ae38e22a6466ed14762084298f2624bb01f7b1331e0bc708fd8b70d92cc0bb9cd8eb897cebf214bd063bfaaea49cb32a77adac4d9878ec855df9640ea88093e6bdd3f6c83ee98914dc57f98e50c29bd648c144d81ba783ab110d7de108be67f8430fed5a80c502d28f39d7e5fd25315f0394f58b3699f49dbe11b56811d663b8d2dc0082a03943c796d53962a68f7955651357ecfde18bc73b39b5bd6818b5cbd49e8d87fa604dce5fba682c574b008507866f0a9e5ac40c8dd89836ee38b323d4583609b2d7b29521c36bfe2c73c718a10a0b61b4aeb800bac7383fedd156e37bc121ead5ff03453706edd5c69732fcc096d56c5a5c39856181149b10fd57a133baeda565697640cae881f01b480d06d6f2e88a15b5e6c38b5cae5241cd7ab267bf82144a9b66714b4c6b44c481a7e0e63c43734e16e92d4ea6bad400c912ef2da2bf5053219554ad9166ad088ecd9bdda23717c8caa9851d9c25c8e66b1b5ba48f9910f4bfa4e2ef968972bb06c6628b5e969a42dff0f53b68d3c744c25e3602e69f1b237506b28bf2b63ec94bd802a567ab5bf20b8e88747be35df2785c88217a29bf8ae5cb235747cb0b36004b269a8540d062b35014622800dd986ef8a38a02e3b0baa337e1a8297c5cb37c27b20de99713147feb0291f923fdd07eb80633f0284f06618df628cf4a59704a844b763546332a75958e6f8d3e439f50fbcf93911da68b845e72c6c01dcc8d2e043086d85117ff960d3401d7de259bb38dd027246b11468df47cbddb8509dbe0a45422a9b18c1711050e0b7a0821768019f0603889a6df2ad463386ba43904ff4c44478ca2ffc15b7873ca5578aa6ea4e57cd4bfcd9c7eb5df20a5a2c6b4ee0b271d5255c3b71cbcc8a16d606fb63376a29e4d15db828d569cf73036177764f7ecd6e3ae3338930ffa64abef005ebf5d3295d69c2fe9457c1f6be06e0a341f8e4ea549655244660d90dc30d528d4ca9ef98e3687dfc1966586e04e390efd02cacdfb377f8d194aae40f6f35d928e321735fa8e0d6b384d584782d8cb5bc98c49d31e198bdd25319129c930de8db372251658e904bd41947743f448d7b9968fa0d50355029bbc014f90ec4b5ef60b044051d988bde104efb22b2ef76dd60b9862cc2eda328520bfff8daf44f61b72da31c31f164393868c1b573c14f94fceb8a87cd98636a5e30319b036e44c07b5365ba180ff34310869379b435b4b4694f37babbc6ebd49e25164796a7c53f5088269be8fddd56a0d53832e14eed9a53337da5789db908829987684eb9eeb0b174176e61a78a3fe86592964a8f5119d09ed8df90f370eb3f7b4ef013d080537f09f3be9f234e27647040bef8072ba47e3da900085edcc2222a1875ac248210152c06100cfe1d69ab08f5061cbe8a99b5cd90b19db6139695e43dbe1bcfdbb284e41e9d1f598434b670bfcb48111fce9c3b3be4cb0dd2ad41ff4e48ca61c49b5520487435f0539b3565f38313816c8bba9882cf25fc220d0f683dab5bd271b6aa6895169001f03828b824df6b67f8f508cbd5f7d3a555c77befc22aac6c9533cef1fb478106aa4dd3068628b76f6021994e33a8c2758514c319e766c9d1b3a71e147804bdbe0dacf906f46e13746015dd0e826bde0388e62811f5891398ef6fa1bb351cab8c2643767546ddabc56432410168dbb2ea61ba3c0e1d29c2efd6dbc0baed309cdcf04aa32ad930fa7dfceb926fbc6593c48f79a9303ccac5de1e1707a5a7d2f4e9ac94eaf783e7e8bf85f996549ad37e47e150f2ec089b40dbbe9085bb90ba0f0779023afda6247c12a07ef48dc908e1b5aeb87b1759cd8e55639d0b361ac4c8238bdeb6b857ac5dae02b47b81cd2827adf9353fd05a02f2596a856eec0bd26816d2d581d4fca5c8d8983e4f7f05c6f838cfc29b31cab1726940c42c2b1d4b8663e129e0b364016f39e83e9cb8ff5b8ce120661de80f84ed7d4ec0d1ed5351415e43a553be4caa5640af145094414ae260565fb8f90fdf5262d62743802ab46d323cc15ee9d7694a633dec5b3c4302a51ee68483b8004a3bf095df85a6cb80dbb63d8230df87d16f87a4302b0875a8f788b19e7fb9727fe8cfbd4d63b8fb9553611b305ed1631e09b368615a855b1071ede22f2e626fd291d770377dadc30c7b0887d9b68572532aa1e59f3f5e8b31bd8fe2b88d89edb9f4fc662f88f84c583c3fed1338cbd651d4ba09e1dab4462323a4e5ae08df2df3c0dfbe17d07191da264517944e24e666c18ce320430f9da9988bbd68b9bf930875949b1d126e1c25108c6d76434b0d12c28237ed0f680fe859590133293f0c2e6333c54d5ee53d255bd07c55cc117b231659f9096964ac794d635b530d8169988cd7f7598ce5bae14ce2988f17ddc86b375b57dee32977fe69b309b8a1210473d5ef96fcde4673c4095f6cb99b09d0c7a9ac122f2dc95f8e0650caf09c284641a3132eb254930d32d70535aa95741795e448d58a4bf614d9a8ec573352445a86b6f9130a1c9fa2069ca6f168a465400ba80609b148e68985e6ecb2b3d7d3af4542f18db65a2c8f180eadda85d356bae827f1e7f88f355dd02ccbb9864365969c2fe2d1119772973b0cc039c0958cb716b356d9547c6b45001207960a8056c03732802d68dbe3c99ca1019df8666fe40f1b26138faadb66fddacf44e89d9d189b78362f43232a3cd80bd537c7eb80db59cc65e830cf2c0d54d34515ac3626146d7c70df57e5654714901048dd380a372261150646c882bca31a0ca523c0e29f4ad4781f840a0074fe624aecfa7c052273adce1e23b5cd91f0b539b57aa1aa9ece34f86cf40c712a90dc5a061ebed8d2ac8252378f56a5edff933d64ee93954379f8ba60290a66ba821be5adb62d29bd94e9e4d56e366f924715832b7510a4bf7bfc3de59f680467553c146ef3936fb50ecce731a8becfc586a0c03c4a4f55c6a3a7d53f5bb18adab14147fc0857a683904f88442ba6e29307d8feef6832f55f48fe239e56f23f77c00899e15c9002a9eae9281f5cc75715772c93ba1b725419e90b81459c87f733933dc7d27da463eeed457217f9f7695d508cf17330971974ac397a8db8b250f623a9e02d183690afb4c95fa12257731edf904d89029ccb12acc6fc3218a4d4a7dd3f8772e87ece0551cd0c652efc19e8ce57737e1629882395a7630b7d08e2f2edd1219f718c1ccda5183df1c658b8fa77f437ad039018716f7489abb46501872ad23bbc7cbc6c007ac55099535272651435159e4ed7219d938470e1a3b4ba33ab96824cb68ef17c59281e6d0368b7826db5f7150b2bd9a15821fba9964bcbf2ac9bd66ad1be66ebaafc8d5f8b41c654839d988b4e5ca23d4a99629260cb48e93fbeda5783dd8300f75ef7e4d73d8bc55eaccb5dc9304f47ecec66ee6979567f2424f7199d623d3c41dae379c4d1e5c7606ee74e15e34af01ed01693af7c9e945a10b6c218cd5e30380312cefa240761183b3ff569aa9163cf6607d87d16211fbfd12e35ef6270da2dd2ea8bdcf41bd2829c7460008597597d87ec4f885928f1f4939f3b599704d1effb9fa3daa91647c632f6ddc597a08a4a25f795d73b9fcd8a884d04d51dd74ad2748ac0644711b49137876f7d5f5bb6d4f2e4e4a353c760c75f22100a53f9a54b61a2a4a77156bae8d55bfcee511dcfb1518502798483486eb7bc05c3e3fe7633aa697af03c29cb95d9f0c50e7701e0e4656ca669f20c4860694b4ea8781a47173f6ed0d8c05d900ec2da4f68388d0f0d3534974cdb94e0f1731bbee128e55e04c42e1f9d394edd2fe4514168e338d0d4171a4f2b5fbc9718a85aefa5cc76eb4f9714423a821fa67d59001f051e2c972e5b9169c1399bc779b22c9c857c447c4cf785649fc43b983c439b39a8438c59e5af187703d427af005a7ef214647474aeffafe646e1a6897ee616cfd2731bb11b6a7958562baf49e1b11c5abef2248674b9c719fd5a5a6f6dc8114f91a0208411dea6a36548fefee418aa7fee4b64ad73d15813d0bd3c85c83add383992778f4cbe7d2fbd9a74449c1a64cd890b2eb2d7ef435b59327efb4c9664cfa5ec655dfacd462deff1b354add1866d817a777ca6350ebff8dc57108d85f79a25da15addb9811129592f40926810f80ce69b4d6271ba2480ff45e02a6e88826dacada4d70006db46b693beb79065f330fcfdee3cd51769580f1a43034a123a94c57f9b174b239850d837b5f5547a093ec882f23f6264068975cfefa74350fe5ccc4b43168b3d5eeede6435fbd336d28abe57fce34d928ed58f99b881df7a894d55f648354b5834f62d575f09a25b83f9d20a343b42e39638c5d8cb78521a685f54055f3fc7c8234301e6a0a408bfe00b2128a5e56fc6a8397711b818b5888baf575a4d2356020d06cf9bf2129577636df3e64678aec5247c8d3d23a7782f83a65398578d8df752a96fafff98389ab49ed7d3737d2758dba64f1a6548c353103ccdd214c7f9b19a203b04d2e7faf9601ee2f7f511f7e3cb893ec4decee728dfde1dc296627bc1e2bcc934cccca52fe5c1ad9411de7e97b6df08524c1b569cb6daa01a0b3493a07d0878d4a04998fffcc1156af10f0d39312456b137a122f8718dc79872c692abd8d443c3de07d8ff3f11ea212c8f586d373283cc363441e74c61bd4b643e54f18543d0580b42068d74e515c3ab42a78f7cdd1827be349aa44bd4db9c7c1af55980aad2814f669a1be2bf249cca2eb71e112086ba6a65ddbc5a6443e6c6ffd7f737e57cf202bdbfa5aad2f69fa43d1d55667b203732e17402758a9eaef8fd20434a863681dc3fb93dda73c99cffa22aff96274e16a6dc1a4d93cea0e0159167928f2f363f09a7d36a52f5f218aa52dc7beea6f404605694ce7cf9465becc0f8cadfa530820e9f753401709009ef1557b17795e3b8e89532f22944870373bdb3e075b6fa3d9d2934bd74cd8118e56f857e9f0bceeadd79a911a159627047aa901e628a5496449fb21b05572814fae380b72cd81a24ed4d8f5b6debbe8ef92c9633b3edc54183c69a3417495fab883a56bd4a945e135c555541223a65b1daf7653fdf5514cd1c13afa3e31456cedbdf7efce2f579c12893b79977af0b68b2566c160df084bbb63d9cb04718bb40c9149265ccc67f3473e13749f300c93ed4ef95524b93d38041d53cf7fb4895d3e93be0b77b105f02fa2f59229d2e7829dbc76a4d4210000000000000002900000007000000"], 0x1048}}, {{0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f00000015c0)}}], 0x3, 0xc000) [ 513.030397][T29685] loop3: rw=2049, want=6434, limit=52 [ 513.056968][T29685] Buffer I/O error on dev loop3, logical block 3216, lost async page write 05:09:24 executing program 1: open(0x0, 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:24 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x44000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x7, @mcast2, 0x1ff}, 0xfffffffffffffe20) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) socket$inet_sctp(0x2, 0x5, 0x84) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) [ 513.165160][T29685] attempt to access beyond end of device [ 513.199161][T29685] loop3: rw=2049, want=6436, limit=52 05:09:24 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x8}, 0x40002022) [ 513.222659][T29685] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 513.259680][T29707] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 513.279350][T29698] attempt to access beyond end of device [ 513.287728][T29698] loop3: rw=0, want=6434, limit=52 [ 513.298320][T29707] minix_free_inode: bit 1 already cleared [ 513.325457][T29698] Buffer I/O error on dev loop3, logical block 3216, async page read 05:09:25 executing program 1: open(0x0, 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 513.434608][T29698] attempt to access beyond end of device [ 513.440275][T29698] loop3: rw=0, want=6436, limit=52 05:09:25 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x83}, 0x40002022) 05:09:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x140, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r6, 0xae03, 0x3) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000100)={0x10000000, 0x0, 0x3a}) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) [ 513.498067][T29724] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 513.525077][T29724] minix_free_inode: bit 1 already cleared [ 513.531133][T29698] Buffer I/O error on dev loop3, logical block 3217, async page read 05:09:25 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:25 executing program 1: open(0x0, 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 513.645155][ T7364] minix_free_inode: bit 1 already cleared 05:09:25 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x19, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:25 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x20000141}, 0x40002022) 05:09:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000100)='veth0_to_bridge\x00') r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x202) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x10) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r4}, 0x87e9b1a5bf03cec0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) connect(0xffffffffffffffff, &(0x7f0000000100)=@rc={0x1f, @none, 0x3f}, 0x80) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000300)=r5) r6 = getpgid(r5) getpriority(0x0, r6) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) [ 513.791083][T29754] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 513.800290][T29754] minix_free_inode: bit 1 already cleared [ 513.811050][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 513.811057][ T28] audit: type=1800 audit(1590988165.400:924): pid=29756 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16370 res=0 05:09:25 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 513.884631][T29756] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:25 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 513.929358][T29770] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 513.949521][T29770] minix_free_inode: bit 1 already cleared [ 513.970353][T29756] attempt to access beyond end of device 05:09:25 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0xffffff1f}, 0x40002022) 05:09:25 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 514.005547][T29756] loop3: rw=2049, want=6434, limit=52 [ 514.028317][T29756] Buffer I/O error on dev loop3, logical block 3216, lost async page write 05:09:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f0000000140)="37d0174c3b6553c19d41ca11b4574e4715401d295b2c5be33be5efa43e9b80c3eb05ac308e64c3f45a84e49b2329d8aee9ac3678c5ba5c1b574a472efbe3d54644ecbeba4ed96408199f35a853bc0458e810b1e0e4338d1dff1f4bb853f2c0f61a0c781c3cf3ec3a250b3a43008928e48e2934b02978e4b91f", 0x79, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="049d71006c38e3df4f9a9623d72da7a70a7a5e35029e1cc5a89e90fef31a538795d341b13797b8c99cc50058c630b1c99aa5", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) sendmsg$IPSET_CMD_FLUSH(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x78, 0x4, 0x6, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x8050}, 0x24000081) [ 514.094229][T29756] attempt to access beyond end of device [ 514.106778][T29756] loop3: rw=2049, want=6436, limit=52 05:09:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200)=ANY=[], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="00ede4b3", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000001c0)) getpeername$tipc(r4, &(0x7f0000000140)=@name, &(0x7f0000000180)=0x10) r6 = socket$alg(0x26, 0x5, 0x0) getpeername$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) bind$alg(r6, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000200)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 514.155296][T29756] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 514.159967][T29787] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 514.177779][T29787] minix_free_inode: bit 1 already cleared [ 514.195548][T29769] attempt to access beyond end of device [ 514.210465][T29769] loop3: rw=0, want=6434, limit=52 [ 514.229216][T29769] attempt to access beyond end of device [ 514.239055][T29769] loop3: rw=0, want=6436, limit=52 05:09:25 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x2}, 0x40002022) 05:09:25 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:25 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:25 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0x7ffff000) [ 514.293076][ T7364] minix_free_inode: bit 1 already cleared 05:09:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) r5 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r5, 0xc0945662, &(0x7f0000000100)={0xfffff001, 0x0, [], {0x0, @bt={0xfff, 0xe5, 0x0, 0x1, 0x1, 0x1, 0x800, 0x0, 0x1000, 0x4, 0x7fffffff, 0x1e47, 0x800, 0x8000, 0x0, 0x9, {0x800, 0x5}, 0x4, 0x6}}}) 05:09:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000180)={'veth1\x00', {0x2, 0x4e21, @multicast1}}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0xffffff2a, 0x0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="3501d4d0", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000100)="271c8ffc7eddb804cfb7e9f41a7fa09de69c637d1ae6f62c44aeca5aa12bc471b5a768f0dccc7f40ea34319a2414073f505dad311b1c77547df7546d5239449d28392707b63f91815b8e798f8eec88e7b27c9440530ff24c08df201fc0c229da2d3b23de", 0x64}, {&(0x7f0000000000)="90", 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:25 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x1000000}, 0x40002022) [ 514.388706][ T28] audit: type=1800 audit(1590988165.970:925): pid=29809 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16370 res=0 [ 514.430776][T29809] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 514.446645][T29804] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 514.455921][T29809] attempt to access beyond end of device [ 514.474112][T29809] loop3: rw=2049, want=6434, limit=52 [ 514.476969][T29804] minix_free_inode: bit 1 already cleared [ 514.481431][T29809] attempt to access beyond end of device [ 514.499949][T29809] loop3: rw=2049, want=6436, limit=52 05:09:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 514.531178][T29822] attempt to access beyond end of device [ 514.548193][T29822] loop3: rw=0, want=6434, limit=52 [ 514.570996][T29822] attempt to access beyond end of device 05:09:26 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x2000000}, 0x40002022) 05:09:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xfffffffffffffe9c) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) [ 514.580610][T29822] loop3: rw=0, want=6436, limit=52 05:09:26 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 514.614976][T29822] attempt to access beyond end of device [ 514.638139][T29822] loop3: rw=0, want=6434, limit=52 [ 514.657124][T29822] attempt to access beyond end of device [ 514.682777][T29822] loop3: rw=0, want=6436, limit=52 [ 514.693462][ T28] audit: type=1800 audit(1590988166.280:926): pid=29822 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=1 res=0 05:09:26 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendto$unix(r4, &(0x7f00000001c0)="003349fd1f7f0a6cc914d45c6c9a92190b86ea2d2897d63f59d59c8360b1baa933ead4dc1b663d20ae8b85faa23babbe45d45d1324c90d87ebdc0106df832b21e818eeccf6edf8d9f3b3890d85a58596c85667c987ddb24f3d623a164cbea3413820e61413ade82d0081d949d933e9242cbe220eb650496ee9e24427bb60d4b5c2ecf1a0b6d9a987672da26beab38524b82c6d4f558de67d3d92d9e5c64a3c9d9d1b74bd1d83b84bb164fd77bc2af2a1afb96df7aa9cc055eb5112f1a6d71813", 0xc0, 0x50, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x49e) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000100)={0x1, 0xffff}) sendfile(r1, r1, 0x0, 0xa198) 05:09:26 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x777f6b840e37}, 0x40002022) [ 514.718083][ T28] audit: type=1800 audit(1590988166.300:927): pid=29837 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16372 res=0 05:09:26 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1c, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)=@generic={0x10, "2be673e4297735a050740d56c413400ebd92210f689c06aa728a50c8b4c483bb1a19bc5127884592a10c86996361a63abb99f1d34c689e58127c0cde93984fbaef56ece536510f45d86e18539a23525358e2f178ba84e991f47570befcbade9782ab5e34c2111fbbf4d0583baa6f41000244540161e35b87936f2d330353"}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000380)="7942acc64e65b7207b8ba9a65b4f4a9b0257ddb4117a53d4d783e7bf3d685e2b21e7a24200da1010d9338554e38b68bf99b3c9ce806a7275ac7220a1de8ee0d098d2ac05a08cb24912e2dd5a6903ae94089415d1a0e40c8455ff33df001f71bc794b03c733100cced49f002546cce65f9cc7bf29a48d4a7e59869cac94536f473ba548969dc61b8af029aa3250e94a592d2a0c480ba22c9700a547b7742c5446e7f56b518cd3", 0xa6}, {&(0x7f00000001c0)="959b79ee393d62344041a8bb664b35fe29aaade56b6f2c7987e33778fe36bc9ce369cacbe0bd0f328c4c3c9a6d49f8bf54599081fc916b36a42ee1ebde52fcb291fd41b9b0d8", 0x46}, {&(0x7f0000000480)="d9f17e255a7613009f99968c0de2231b53b33d82d67eb7796b1fa576ffe5ac67f4046018025287f09c906219c047f254d6bd75b9adcb18b249dcff877949ce45cd400d600f5052df0ae8976222714f825937db662c84a794f33edc6d5d30e57a2a50c4dcababff2678f425dc4a94b0cd90acb2cc9c9f8b63fe165b70d0db1d0700e213d56a1d7965a295ef9860313ca5351b110df6e49efb7c3239bee3a3996cf26a6aba0c66b19d6d6edf096c9a20fc", 0xb0}], 0x3, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x2f4}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0xad69}}], 0x78}, 0x800) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r7, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) [ 514.796489][ T7364] minix_free_inode: bit 1 already cleared 05:09:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="0f4d3c5af32554b8000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB=':\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00022dbd700001dcdfabc4391127b206c9e95ee7037c65050000000800050006060000080005345b78d9df329272071e390e2415c332661a9657e90eaccf419e618a07a1ba171ed6f572662eb76369508acef080247327"], 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0x40080) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$HIDIOCGFIELDINFO(r7, 0xc038480a, &(0x7f0000000140)={0x1, 0x100, 0x8, 0xf2cf, 0x6, 0x0, 0x8, 0x1f, 0x0, 0x2, 0x5, 0x660, 0x9, 0x7}) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) 05:09:26 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x100000000000000}, 0x40002022) 05:09:26 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 514.985452][ T28] audit: type=1800 audit(1590988166.570:928): pid=29866 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16378 res=0 [ 515.016306][T29866] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 515.045967][T29866] attempt to access beyond end of device [ 515.058576][T29866] loop3: rw=2049, want=6434, limit=52 [ 515.077465][T29866] attempt to access beyond end of device [ 515.078537][T29867] QAT: Invalid ioctl [ 515.090135][T29866] loop3: rw=2049, want=6436, limit=52 05:09:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000100)={{0x33, @multicast1, 0x4e21, 0x2, 'sed\x00', 0x18, 0x6, 0x6d}, {@multicast1, 0x4e24, 0x1, 0x0, 0x6, 0x10001}}, 0x44) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) fcntl$setflags(r6, 0x2, 0x1) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 515.110115][ T28] audit: type=1800 audit(1590988166.690:929): pid=29877 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16381 res=0 [ 515.112764][T29866] attempt to access beyond end of device 05:09:26 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x200000000000000}, 0x40002022) [ 515.189651][T29866] loop3: rw=0, want=6434, limit=52 [ 515.195488][T29866] attempt to access beyond end of device [ 515.201290][T29866] loop3: rw=0, want=6436, limit=52 [ 515.210784][T29876] attempt to access beyond end of device [ 515.219003][T29876] loop3: rw=0, want=6434, limit=52 [ 515.226223][T29873] QAT: Invalid ioctl [ 515.254368][T29876] attempt to access beyond end of device 05:09:26 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000840)={0xa, 0xffff, 0x0, @empty, 0x2}, 0x1c) r3 = socket(0x6, 0x2, 0x6301) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000880)=ANY=[@ANYBLOB="0400000041c17a0336658306fb9f907790cbff01660ed7ab1e387edf456bb18f3b0b06629ce63c528de1294f4b6529f55bcb2f88003f348e1d1882e4814b152a8375cb158cc0b580c995534e", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_mreq(r6, 0x0, 0x27, &(0x7f0000000100)={@remote, @empty}, &(0x7f0000000140)=0x8) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000007c0)={0x12c, 0x0, &(0x7f00000005c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000180)=ANY=[@ANYBLOB="8561646600000000000000000000000001000000000000000b00000000000000852a627300100000000000000000000000000000000000008561646600000000030000000000000000000000000000002b0000000000280f"], &(0x7f0000000200)={0x0, 0x20, 0x38}}}, @register_looper, @decrefs={0x40046307, 0x2}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000300)={@flat=@weak_binder={0x77622a85, 0xa, 0x1}, @ptr={0x70742a85, 0x1, &(0x7f0000000280)=""/110, 0x6e, 0x0, 0x38}, @fd={0x66642a85, 0x0, r0}}, &(0x7f0000000380)={0x0, 0x18, 0x40}}}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000440)={@flat=@weak_binder={0x77622a85, 0xa, 0x2}, @ptr={0x70742a85, 0x1, &(0x7f00000003c0)=""/109, 0x6d, 0x1, 0x2}, @flat=@handle={0x73682a85, 0x1}}, &(0x7f00000004c0)={0x0, 0x18, 0x40}}}, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000500)={@fd, @flat=@handle={0x73682a85, 0xa, 0x3}, @fda={0x66646185, 0xa, 0x2, 0x30}}, &(0x7f0000000580)={0x0, 0x18, 0x30}}}, @acquire={0x40046305, 0x1}], 0xa7, 0x0, &(0x7f0000000700)="72b6e1fd623c7e9a435a10ab39a1612714986a3145580321cc3758b62238294d013544f1897ca1aef9d4e261cc0ce1d9a773d3c99c45cc557cdeda668a9dbdf3cdfb8b963a313960b1261c2c2398d2e091f667ed3b68a6e50412786cf641ff3fee95328a423bb2fd8c04e3a848a2f7d48a517df7a5e3bcf246dd9853bebee7679cdca0c80a19b47a344f1396f5f81148330baa29a95eac7817371111bbe29e7a0cbdf4aef8ac48"}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000900)={'syz0', "26a555929c15e9af5e8a100a9714b7604d527a130a9521a8878435bfee23c1105b397c57b213674921f5f59510e6de33c9953dca015a465438e2db86fd0725403ac75492359c77c839c1a4ec2ded895b0a0ae5d5e9cfad72c0aaadea7e70ef14e0ffa680914b55385958e5665881e6a9a18b28649616de8df66dccd65ccc8bc293a9aa6ceefbc8adf7f23935995e1f9bf452629a87b8b45e6b79f9335a7486e8c09b941b405d34610a6d0f97f8263a0292"}, 0xb5) [ 515.382277][T29876] loop3: rw=0, want=6436, limit=52 05:09:27 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1d, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:27 executing program 3: open(&(0x7f0000000100)='./file1\x00', 0x404000, 0x60) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x40000, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@empty, r3}, 0x14) connect(r0, &(0x7f00000001c0)=@ll={0x11, 0x15, r3, 0x1, 0x9, 0x6, @random="c63b47e4e1a5"}, 0x80) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r4, r4, 0x0, 0xa198) [ 515.419474][ T28] audit: type=1800 audit(1590988167.000:930): pid=29903 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16379 res=0 05:09:27 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x370e846b7f770000}, 0x40002022) 05:09:27 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 515.474133][ T7364] minix_free_inode: bit 1 already cleared [ 515.483781][ T28] audit: type=1800 audit(1590988167.030:931): pid=29876 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=1 res=0 05:09:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) accept4$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14, 0x800) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) 05:09:27 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x8000000000000000}, 0x40002022) 05:09:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 515.615200][ T28] audit: type=1800 audit(1590988167.200:932): pid=29919 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16377 res=0 [ 515.712076][T29921] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 515.739225][T29921] minix_free_inode: bit 1 already cleared 05:09:27 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:27 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0xffffffff00000000}, 0x40002022) 05:09:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000140)={0xd, 0x6}) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="7ba58bdb4d6d7e51ebb7e8", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) socket$inet(0x2, 0x4000000805, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x17) [ 515.862707][T29921] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 515.871494][T29921] minix_free_inode: bit 1 already cleared 05:09:27 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1e, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 515.907471][ T28] audit: type=1800 audit(1590988167.490:933): pid=29949 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16384 res=0 05:09:27 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x132) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x58, 0x3, 0x3, 0x0, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x200}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0xffffb093}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xba8}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x639}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x9}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x5}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x8808) 05:09:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) connect$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1, 0x2}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:27 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:27 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x21, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:27 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) sendmmsg$sock(r1, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)}}], 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200001, 0x0) 05:09:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) connect$phonet_pipe(r6, &(0x7f0000000040)={0x23, 0x5, 0x1, 0x3}, 0x10) 05:09:27 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x0, 0x2}, 0x40002022) [ 516.221852][T29970] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 516.275726][T29987] attempt to access beyond end of device [ 516.281576][T29987] loop3: rw=2049, want=6434, limit=52 [ 516.294660][T29987] attempt to access beyond end of device [ 516.300796][T29987] loop3: rw=2049, want=6436, limit=52 05:09:27 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 516.345570][T29991] attempt to access beyond end of device [ 516.353886][T29991] loop3: rw=0, want=6434, limit=52 05:09:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r1, 0x40184152, &(0x7f00000003c0)={0x0, &(0x7f0000000380)=[&(0x7f0000000180)="9c64f04b5c16673080458660697ad78f8ff6d8fbca73ecd75428fced83bbd11a8f3ed23e50c9c76206b890d0f3d4360a8f9cb024b8082c0e8197a81c9a31990512596a87521bb6ea6225b814ce29d8bfd12fc8f98e3c600d704672a3319a84bc27ee9dc281d1501eb26823d5b0853782d9bbe045b6380d7e770359b2ee2df8c35b32a9e4b9efc1b369c8a6dafdf1bef6b7ca87e46b5eac8657b51e7bd6ae46474e3e88a54c7bc98a59152aad530f45f46f4bbfea0930d1129217c5110b8b0ccf55f5fe21eb1022f9417a74548514496530beb4", &(0x7f0000000280)="bd8f6c60cc94b0fe77fd3b23eec97eb672bd6a6f7022a4b03b30401eace41717d3f6bc38bd3825437dc490e190644fec457b8142604e9966bd6866115c84118ff1d14418c01307b6782df9a645804f671349f09d205abf2695ed146fddfa2d33a51a0682e7c0d73cf9884a9aa53c955b34a9b64ef3d805f9d42cee3e6ac8fc9e3a120d3d8717d99f638e5fefbd010f5099fa4d7324aea6ded58d2c94da542ee46247935953ae9af680f3cdf623aca4fdea9d903ba58bbd6af591c288729dec01a1da89fe34fa44"], 0x10001}) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(0xffffffffffffffff, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="0cd90000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) read$snddsp(r5, &(0x7f0000000400)=""/214, 0xd6) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000140)={0x31, 0x3, 0x0, {0x4, 0x10, 0x0, 'wlan1cgroup--*$\\'}}, 0x31) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100)=0x7df, 0x4) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) [ 516.387222][T29991] attempt to access beyond end of device [ 516.396010][T29991] loop3: rw=0, want=6436, limit=52 [ 516.407088][T29987] attempt to access beyond end of device 05:09:28 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x0, 0x1000000}, 0x40002022) [ 516.439895][T29987] loop3: rw=0, want=6434, limit=52 [ 516.467412][T29987] attempt to access beyond end of device [ 516.485717][T29987] loop3: rw=0, want=6436, limit=52 [ 516.497640][T30001] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$int_out(r5, 0x0, &(0x7f0000000040)) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x7fffffff, &(0x7f0000000180)={[0x5]}, 0x8) r7 = accept4(r4, 0x0, 0x0, 0x800) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000000)='#', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:28 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x22, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:28 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 516.554530][ T7364] minix_free_inode: bit 1 already cleared 05:09:28 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x0, 0x0, 0x2000000}, 0x40002022) 05:09:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket(0x1e, 0x805, 0x0) listen(r5, 0x0) sendmsg$tipc(r5, &(0x7f00000003c0)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000101}, 0x4000000) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f00000002c0)={r8}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r8}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r8, 0x6}, 0xc) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r9}, 0x14) 05:09:28 executing program 4: socket$inet(0x2, 0x4000000805, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x288, 0xf8, 0xf8, 0x0, 0xf8, 0x0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0xffffffffffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}}}, {{@ip={@remote, @loopback, 0x0, 0x0, '\x00', 'rose0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = dup3(r4, r3, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) fsconfig$FSCONFIG_SET_FLAG(r5, 0x0, &(0x7f0000000000)='lazytime\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 516.730098][T30023] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$afs(&(0x7f0000000100)='afs\x00', &(0x7f0000000140)='./file0\x00', 0x302d, 0x7, &(0x7f0000000480)=[{&(0x7f0000000180)="2b57d420fd6fd5bf66dc1ba14d592e6f759f18c78ceeb4a03be9a807bb8767bb1264787ce44a30fe7428000a06e5690f2b57658100c1cc4a82d692e3d658d4add3b16e95994bb2", 0x47, 0x3}, {&(0x7f00000002c0)="16e2f32f8a7474787fd750bc9c5e19ecacf86f2bab1f4695b304fe40104585c632b6b2ea8d397ec58b04ebccfe7bdd95f1c7368920538c1501f9209bb71629bf3de6785cadbcc0bf1cdff534cdb3bff0f681f01047c9eddcf57ade9f8bb55beaebc561c3b0aa5387edd0b4a4b340a8baf177ae5e97929555755be677132458", 0x7f, 0x9}, {&(0x7f0000000700)="d24055aa4febf9a247e2830c36a2de820a7a3ddac2c69244cc413ccf42ccff799912b81c667ccdbbff4700c205679d1641ed79204abcd19130822a6f14b093ceb38be314196d18fc354f6fd293ce3bb29b2fcb320034eda06f66cd6b5bdd9a17fbe81c7235824e0d37832192b2a1d9cb5b1d02a6a6e732a62a4261d2dcdaef8f3e496172ae9a3679beac0684c7e28ed3e59d623594dbfb35095a888e63aa78b542b5db59bb571c737c51d37a0c2506dd87de4b948c8b02b7120b49e7033fdd944656d560b4a5d273076c8b91fa06c9ae55e0b607f9fe3f986ff02ee48360286c30ab92f49275500eca1b821e06549c1bff31bd90940f42daa13b523f7fff343eeca09c89b028b6bbc54f0d2fc9abd779145d12507db4a5fac153980320a59b3b35d64679ae6467c164d74f92168ba050005c164cff633823c04d4bc12e23664e0dda8e3a055e739dbdc4f913f2a930f08e7e7e4aeeb398ca5510ebd974e8f34d50211e0d038527cb8945b8e7f05f7afe0e3674a68857798c179b5e8555ac1153a46274742d8588bf4988898d2ab1faedfe1408c84eca3c84d3ec1b7b24e0a91bc19a3d9d1f3ce2b7bd70159bf2db275dff73b45081bb612258e661fed172a7069f5329ce6b1f6ed80fe6b91c9972d476dff9bfea69957e3af31e4f7ec0857a3d27d4b807c4965d58851be89d102f7f6f02e4af9134a3bad6d5fdd13408938e1ae18a36a85d938a206f930289c9a053c153ee9abd24683fdf7b0236858c77689838303d08844a6764ebb8d48913676e88172b5025183919c3ab509db056c736f3d7ee2ccaf1b2a4e1deb1c4fa20c6b6fba4833574b11882cb589adf15c0195d0330e429cd36e756dfacd91d217c536bfec78dfce1d396caf30cc614fab3efd81410c653da23551378d3175d64edf3c353401d83bf30fe17b94173f89e3dbe7fae78e228223567c772d342bfaf4a5f93454a8ccc3ed20ddd521d8adc71788cf323451ce5ead2d0c999a57978139fab3d0324a1facfb59dc5991b71b896f7890213bf406c6d859f0e3ce6f9a317614f5860db890a4ce2c0cc66b30daa4c4788e5c225dd3d6be951163727a877de590f7115f82d1fc3345f4b9c2bb87b06c8a6349917294e4f63f6dc474c0693308b5526bd78ee383706c4e3d754199c58e93cd49f34aa1fe39b6847e4de2d6ea305f2e23524947fc0da348d451c31f144f95504a39c400ce69d68d3471b66caa9c1979271614334a681dbe2173245dc3ec7178fa0d40e06aa453a572ecb5b592b865340d9702713523e5c79d3c51fd98c875341d12dcf58891da49cd47d3b87ea486eae0e2cf62c16d5ce311d83be1c34973eace3676899cfc4f9d86697d571ccd0f38b0159b9c36d414b5ce03404ffcec0b1fee265991527553e5d0f21a4ffe347f2760127c808ba38c224e2290275c7f80b6a19fa19272989c47789d7c9a99d286fe5e435da2dbf274a746e1d88a749500116106921fb8be2a2385a82e4d514799d1d1393d613b7e4e130cf659b8554b606934d9131f5fdce631c68f23db6ad8869acd684e43c5486563e1ce1af627737940dc3bf5a3ddc546454fcd81fbabae54d16579136fe314edc474f4a51eb56212930caa29e4bb9f1e93fcdd007cef0a636a0a7cb25341ee35ffd037f680caff2bc4717c79df10505e23d58858a19fa523e4ee55463440aa19f70f56f5d514703a572def255c462fe2badddf6a1e09887023c737063496c658eede52dacd024bca9079cc8ad94e6c355c330f79268edc184053fffe95846266cf79f8219433da1c7a0eee350ea3e210035f824e8b1bf268b50b5a6c657f93666179513b33a222a1b922b001bc4ff8ff0e419e8969c47f48e043bb163f1b028a73c53cc3b7bcd9e7bb0dd54ff449857f31e17c909b3e6a40f666ed69b7ed8bd9ac9d0769d89fe356d2cd1b3c14f26a59d8d66c5588ebb87a8aa06f0df1e713c9f0180b5542583611ae62d80df8561282b249355de8277ac47e6a9b9dbd6517dd4c094e66d60b82d7ad6d551eb08cf862b44dc31ee0b12a2d4f16cac475ecb399228598977cf134f57e1ea266149e17275e78b5b3a0612df9517d32126fc453ee143e023d3dfa7b016a31082760d8fa7bdbdb84186d75678fd8278c3dbffd2423d298950d11ff0400355320f587375eac34174da09048bac4fd5cde50f67bf0c521db8b6411c49fdd36eb71d3f961bf30ecdae6b85800b15b51cece4c388064aecd0181ee8645cf8f3706ad4c78a46ef86b75ef8cb1fc2bf147cd8a55dba7d5b7cd5481a3fd0abf10f286087fdc4079d3424a0991f3ab16d1b5161abe1807771190cabef6da2dfbc9eb81328ec6a001474fa84658b699f217f2e7a0494976a4359fb8a2fda33387d409478daafd8a4b59a3db3d19d1ae821d9505ab98e3f8f26c548258c936543a6b098b1c7e923b2308e8e01784432b56065ae7220259298bebac432dc4791283c0f60b9726de0ed2f7eae13e8f1c485dd50bd6e35b695f1efa5c03c214d36c912bf144a15b4e005b57f95ae146acb712f8ee9a996536314155ab8b1d22c5107311e2ec723a97265ebba30145997daa44b3a47df1a67acfca9e1f4fa5b3ba93cb41d51e49979aa4c5b0e1cc8ab87d526e1fe3370532d0eb1b3e62539773b09c189600360288f9bdc7d9074fa30ccfef63742c4cf27dff7fb6eb4ca3754d34164cd0047527d70e010675533f5418bb4976dc0d96a771a9d93a850c7c6c0e058071ad15c837a492def5d6270c493e3c1d748e3ae6b135887953e7e6ab3505b9b4f554dab041b09b4e52db32b0e7e1a4fedeb50b68890e55a5f51320e44559ec793d047922f52a686bac3e24e1a105ebe3d6f23b8199548bf5dc1f012958048a9f1ffb3250f5a3e851c1c3381f12a2c60d89e042bc19174801a97ddd91f26e47d1ac910790f0ae035d68afde614ebd93f309d48f150ee1fefb1462f9a53e8393f8abbee4bc95628f753b9669a358132922239369514c0994ced8984986d99ca781629363042c8c6a3f974f45b00437bc7b5115e2de96f8f4fa82f9b492a3c4d15fccaa6f9e20ebefaeb0a3c6235bcd4de571ae9ec2c1605762bfc376d52dda6e8ad8ade2aae3201608c195faebf92e0a2181b97aa02e034c6886b33aa8b03638eb3e671443669d86024ca621f03d38b0d086ba7af57e59c8025fe395f1a7b21fa0c8ba464df75fae56fd34cb674cfbe3de812fec297c3ea10ca13be6c7df443973b7d049b93c96dec74f8ffa3e4339b31cbcb500ddf9e99ceabe165590d84906f068836b5f2aab426b0a826de52645899de7f77839a349d78f3904e2fc25b7c017b3ffd0263bdce0c1e2ff5438345acbe1cdb785d817feb19e6f97aa3bb83b7fca4e24e80abc9a19e016c1f33add7653ca7a412dfc7952cdbb8542da62d2c9483f9d33f265092e2f53b6260afa2c216f1603611851449bbbba4cdfe36bd71661192746bce86a5c152d23a190019d9b3ccc9abbe4f7edb41b314733f9926fb9ca12c781ff7d2927b114419df2edb57025ac6f5aa406c1661d3cfd8949a74d715f0da09b2f92cc7c6ace87a322ea1a62fb868cc650fdbf9128d8ebf9b13775528c558ba6f813ce0f0d96e2d84830061b61bdf1f2c70afeb50022af363b3f440ceea8619765429e9537efb5f0d73d728d47d5b573fbf45d8051478e2b76b34f02bec6a2612a7d540bb583cd6de68402119ba719ff81797ac7c2cce0e428bc4ccef9dbed00188b7bf050736197a6ccde8e38f9aa80d0f121f49bb36df463f5992558005b81e22eaa7ca0265b53a4191076bc52041c58f146f82933c6afdb497dc01a0ac4f82dadc3c400e750b6833b8f003884bc90a7f8e1ff2aedc56d3879ae352c9f6ffdc0018457e3a2709ce3fdda2c251b28aa6086762e12440df620a6a286cff246cef8c4e2b114ddd0b3bc95748b66c0ac3f5de10323ef2a920e8840c478edd4346f71342dc5a9ea7ed6e5aa657f840e1ef64716271a77844a2d70f8763f06901506463d9874b75cc8d136686804dd7562dc8cd39c66a787d35bf28eef922e00900bb1f3440be74e8c4992c3af22e14ff68e8aa6abf51866bfb435c5d84b85538753a8be00498f024cdb227bf5ffdba680edee027518eb0e99b7288f15e58ea18d15d00bac746fa645dbd98a3b12b34ff7d3bb857881fbe92b4e4fd9c0e08e7051d44294de27ca1c332ad81f9439b1e7c25ac0359c7562708efae24b76feca76a994ab5482fbef31bfc8a815eff1ff96e09dfa3964421378e54affc6b7225bb25f2b0f69b4a571c86a18f05cc811acd3635f203d609e6b51adb42f93abd5948e175927b84d184102dc320025ec0145889019576ef838f6e11e687955542f824b900e73704de82eb9124d0b3678abeb65eac90d0793b5a1a4e6127873e9c7028e00927f594ff7352f3af6460ce1eb18aad6e0f961847ce4c3484d7108162b786cf6eea258b5a99bfb3f07e43bd139f987464e5e9773107c3e48881a7678d4983d4df6308c97ad08a10f70e4ab1c5dbb4425891a3d9c0dbbfdc1cc8f189cf9e965a122411f812e05c94711d251eb6c97986fd35dcd5c90f4bb005be714de9e159ee7dae64c25ecf8c40835c7c0c9bff875078a95cd592ebf5d3613be313b47f25b18c2bca4a614687ecc9954104d73746fdea82c5661ddd9386845527e1ce22c61cb810ce4017185bc1830ffaea3d46a412ebf5209b76806167004abae5b0890b586502adbc6ebdb778e02564371893abaf5f094e99e502c3cbf42e3bdbd389e3234d39dffb8a8838268a2a7ecff4087aebd6e73828d2f21c72dc3470a85dfbf4d1a482517372e5753aa3de7d6779a2997634e04c9632d3dd628b0006a7ad7da1e9d8c8bf71c2a6d450f7ef0727b565a0b19cac9cce33f34dbfcf1ffd43d3a5e5b4fd77c6e39735c483764803e4b8e49dfe43bd8ed04a994c57d7cd7aa9d70b01efc08915e16dba3419622c7dd04aa34a68cd5dd5b5510fb927b30b4dda65851859ae7964231b8c4f5391fadf953fe87fa2ed4482526a1fd93bd1c632500cbe3c644214cfa8e3bfa0c534054e6a7cec9eecc9bb6996963e204a70a7c769d7e5b03e5ca03e50596a9b5df181a9ba05aaf814370898f1dea54c0b27dd91d65dd4b89d6055a498f00289645af9fbbdf5a0bf1915510fe9e240a3146883653c293deaf07e516c0aade31fe092df9230bcb684f5671b71d403e1f75cc13834c0609d5c9a5d6be42a191e6501333e67906564dc4d79a942facbddf535787e2da497dd45a9d992419c4186e7fd2330ee1bf45e5254c493900db1e36a485b86c9659c3eb30ce96848e9690a4c3cd61a8b8e486f7f66d4aa0046e8319ebc9a0a940a1ace7729cbd5274f86db20b036fdbc12b619c770ea515224ffda686b1b8283ae33d54392c6fe3d9533c6b44a59f6e4e81986443a991ee999b72e6fa683a552384cd5db1b9a2d7ec866227ea3a7ecb462685f3629e8b975d03b4f3dfd98d5945d3a2b5c84400253fa38659216a168e1680da4d2a31f25bcc27684890db981dac9dfbcbd7729e49127023d022623626ea382ce4fd5e59eede28a0e4a1f2a4dc442bac80eeaf714d8df92ba59d88125704d530b4dbba3ac04ca2ddce959306f1a3a1a48872a8759a5cc8204037f60f74e22ad12c91b9112bb148e5ef8c43194d84b17e82ff7d6150703f2271d0d27d9ee430835b5e8ed36fe7bbc476cd83cdcc2390cea58582e931bc3edbc8196aba231496fba8014d668a35b42d49bf0d0334090b79bcec5e8b035e9", 0x1000, 0x20}, {&(0x7f0000002300)="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", 0x1000, 0x8000}, {&(0x7f0000000200), 0x0, 0x2a2a}, {&(0x7f0000000380)="a07453c216386589d375e1bffe9a3f50593d0994b79d5710eb3af8fa743e3118e9b366", 0x23, 0xffffffffffffff7f}, {&(0x7f00000003c0)="ee948fb7f257", 0x6, 0x7}], 0x12, &(0x7f0000000540)={[{@autocell='autocell'}, {@flock_write='flock=write'}, {@flock_write='flock=write'}, {@dyn='dyn'}, {@flock_strict='flock=strict'}], [{@euid_lt={'euid<', r3}}]}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}], 0x2c) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x76, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000040)) 05:09:28 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) renameat(r1, &(0x7f0000000100)='./file0\x00', r5, &(0x7f0000000140)='./file0\x00') r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) [ 516.833910][T30034] SET target dimension over the limit! 05:09:28 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="0000a5870bd5893a22de99db1c7821fd7b6d6826ba2725df7c03c0d9128208f8ed9976ea6d492a", @ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r0, @ANYRESDEC=r1], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x248200, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r7 = accept4(r6, 0x0, 0x0, 0x800) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:28 executing program 4: r0 = socket$inet(0x2, 0x4, 0x5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_buf(r3, 0x0, 0x27, &(0x7f0000000000)="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", 0xfe) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 517.000922][T30054] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:28 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 517.255891][T30076] MINIX-fs: bad superblock or unable to read bitmaps 05:09:29 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x23, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:29 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0xfffffffd) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet(0x2, 0x4000000805, 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000004c40)={0x2, 0xf000, 0x14ab, 0x101, 0x94e2}) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) recvmmsg(r5, &(0x7f0000004b80)=[{{&(0x7f0000000000)=@ll, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/138, 0x8a}, {&(0x7f0000000300)=""/142, 0x8e}, {&(0x7f0000000200)=""/31, 0x1f}], 0x3, &(0x7f00000003c0)=""/229, 0xe5}, 0x81}, {{&(0x7f00000004c0)=@ax25={{0x3, @bcast}, [@bcast, @remote, @default, @null, @rose, @default, @bcast, @netrom]}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000540)=""/255, 0xff}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/29, 0x1d}, {&(0x7f00000016c0)=""/218, 0xda}, {&(0x7f00000017c0)=""/61, 0x3d}], 0x5, &(0x7f0000001880)=""/216, 0xd8}, 0x3}, {{&(0x7f0000001980)=@in={0x2, 0x0, @private}, 0x80, &(0x7f0000003b00)=[{&(0x7f0000001a00)=""/88, 0x58}, {&(0x7f0000001a80)=""/53, 0x35}, {&(0x7f0000001ac0)=""/21, 0x15}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x5, &(0x7f0000003b80)=""/4096, 0x1000}, 0xffffffff}], 0x3, 0x12022, 0x0) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r7) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000180), &(0x7f0000000140)) setresgid(r5, r7, r8) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r9}, 0x14) 05:09:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r5) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000400)='/dev/md0\x00', 0x12a00, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000700)="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", 0x16e}, {&(0x7f0000000180)="e45e7ab5c0c2d8c96947bf6dbe069cd0f25a5145fd47f578cdf7ef1b5797908a0a30d996aadc7e21f24d9fe0eb07c755e51d2450272b806510fab5c7bbe7978d3e08a93bad36496d128be67033764d1bfc5f9b", 0x53}, {&(0x7f0000000580)="8ba84412862dfc20ef380f6e0be75d8dffdf24ca4de51a18bcdf118664ed54dcd25e7fb3336916099b3601f54f1a9d53b82696f36504a9e02a822cebfc615f9f7a65f96dbabc9d1cef0ddde6733a60ab3eb37cf7146f2b7fb77c7c09ca2518d5c15a4f42222da46d05a60d7026d7c1e425e9d3644805a981e172794319665af345ed3ed5c0afc86f6c81ede6d2eca191d5e94106c2f8406dd006297fa96c9444c6c35e9ac45727106cf90efe5b0caf61cfa6ca16fc7f78469d3e4789f91fc7df9db25e6634dd619cd392", 0xca}], 0x3, &(0x7f0000000480)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3, r5}}}, @rights={{0x1c, 0x1, 0x1, [r0, r6, r9]}}, @rights={{0x10}}], 0xb8, 0x4}, 0x200000c0) r10 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r10, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) 05:09:29 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 517.807501][T30094] MINIX-fs: bad superblock or unable to read bitmaps 05:09:29 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:29 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="bdcba5e9f63c31c94b4000000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = socket(0x1e, 0x805, 0x0) listen(r4, 0x0) sendmsg$tipc(r4, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r7}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r7, 0x1, 0x2d66}, 0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x10, 0x2, 0x3) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f0000000100)={0x8001, 0x38}) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) r7 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r7}, 0x87e9b1a5bf03cec0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_SIOCSPGRP(r7, 0x8902, &(0x7f0000000300)=r8) ioprio_set$pid(0x0, r8, 0x3d5) [ 518.092681][T30112] MINIX-fs: bad superblock or unable to read bitmaps 05:09:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000100)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 05:09:29 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {0x0, 0x0, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:29 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x60, r4, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x20}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x94b0715342fe73a4, 0x30}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x40}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xc}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20040080}, 0x20000881) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r6, 0x8982, &(0x7f0000000100)) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x5000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x3, @private0={0xfc, 0x0, [], 0x1}, 0x9}, @in={0x2, 0x4e21, @broadcast}], 0x2c) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="c86e852fb7eefe0d8c9d5b9306a6a41fa9c735b5a1ae123b3cd2bea1a46d0ec6796de452b92cabf7242e4f87c806e84a533a650b907710022de982f25cdd7326abe6743b3b7a5cc35561d727bef968e355d85572bb6214347513fb7bfd2411966181926f83d0acd61be33c40d506d10fa700cc6f6f53364e9dda075b39236e7b087cc018908be3f2c7925ae6532c68e82414d2fb2acc7b03fb14d54314eea1af51f7d4c1ee2bb116c846e12ccffad2402f185389904b7fd61681c42cfc67c0933db69fe499e71bd0cab11f501c78a4c8cf056483f03442e61aa5762b70e35c", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r6, 0xc01864b0, &(0x7f0000000200)={0x1, 0x8, 0x5, 0x0, 0x1ff}) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000140)={0x0, &(0x7f0000000100)="b5f17419e6a3b2f8eb743fc8ddd245af49e79774af7a5b0e05b8b7e698613c5f494f2e748a8a8c0371e20100004f", 0x2e}) [ 518.387568][T30137] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 518.516057][ T7171] minix_free_inode: bit 1 already cleared [ 518.524689][T30144] IPVS: Error joining to the multicast group 05:09:31 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x24, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r8, &(0x7f00000002c0)={0x0, 0xf00, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r9, 0x301}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r9, 0x400, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4004095}, 0x10) 05:09:31 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {0x0, 0x0, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{0x20, '%!!vboxnet0eth1'}, {0x20, '\x96em0wlan0wlan1proc\'+vboxnet0)/[}[keyringppp0'}], 0xa, "4d38bd7ab6f55eebd32c2ac735be112ff26cb6429764d71bd9ffc873b650595e00dd1c2b74a623ebd02abfa6900ab5"}, 0x77) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) getsockname$packet(r10, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r11}, 0x14) [ 519.491435][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 519.491443][ T28] audit: type=1800 audit(1590988171.071:944): pid=30160 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16372 res=0 [ 519.544915][T30165] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:31 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {0x0, 0x0, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 519.626129][ T7171] minix_free_inode: bit 1 already cleared 05:09:31 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x25, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:31 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000000), 0x2) [ 519.687975][T30179] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 519.718656][ T28] audit: type=1800 audit(1590988171.271:945): pid=30179 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16369 res=0 05:09:31 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) [ 519.743754][ T7171] minix_free_inode: bit 1 already cleared 05:09:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r2}, 0x87e9b1a5bf03cec0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000300)=r3) syz_open_procfs$namespace(r3, &(0x7f0000000100)='ns/user\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) 05:09:31 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast1}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 519.899276][ T28] audit: type=1800 audit(1590988171.481:946): pid=30192 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15736 res=0 [ 519.945905][T30194] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:31 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x101500, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000000)={0x3, 0x40, 0xfafc, {{0x19000000, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000140), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0xc}}, 0x10) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549", 0xf}, {&(0x7f0000000340)='\'', 0x600}, {&(0x7f0000000000)='!', 0x1}, {&(0x7f0000000440)="bb", 0x1}], 0x4}}], 0x1, 0x0) [ 520.016958][ T7171] minix_free_inode: bit 1 already cleared [ 520.219778][ T28] audit: type=1800 audit(1590988171.801:947): pid=30207 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16379 res=0 [ 520.256748][T30207] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:31 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000000000)) r6 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10) recvmsg$can_j1939(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:31 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640), 0x0, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:32 executing program 0: r0 = dup(0xffffffffffffffff) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)="c87c2335cd45b4b36739338d7fa59aedc024cb6c411ce953cde0bb0926bdb8b7ee34fc309cf8f00566395c831109dc753fc3576dfd2355bb04c21951a09f6760230d85492370a0ca19ddec0d257887730265fd8fe10138", 0x57}, {&(0x7f0000000180)="2f53b3848789b1ddcda3a0a5dafb222b2bd7e42907976b4a5d166e53fda5a9a0260866979acb108bc8fcc4c1d8c6db5e2456e5753162e3963c6a1cde2964e98e3df28ab9f8e08a3b65d661135852ac4d6897e25581efeb593d27f691e474a69607b4c0a06e46ecb5f34b4a6eb935a407ef4c5ec2bf0ae899d98e5184c3bf007f77d6d7f5e20c64390d5e2b1af93e4532c04e54ecbc9b95c9e6b60fefc7b33d44139d056c58f27cf35b850ea714d054dfd10d2a8fb76786575bebd7", 0xbb}, {&(0x7f0000000380)="4dc5f08a43e62b700ff764a7fb3ff6b03b3e8507e579f0e4c385cb0859ae9fc3df42f893b24f6c647fe438c12ef38d90575f9078a1cc4ae01cee489dca3650d3720e9ea9cb3753ac58fa9cb35a5170e6bdb5c2ddb80121a4405380094182be2f2213a8b5edf839d227bb72bad147c0b2f9c6fe257b06292c51bd7ddf6bb709fcd6338ee6a7aedc86e05776b7f6ab7a07f6052e497cc69240cc0e9623932a180d5f14", 0xa2}, {&(0x7f0000000040)="cbc6fb9256fdc9ffd176c61fc3", 0xd}, {&(0x7f0000000480)="a81cca2f43c9ef128ad4fafdeac9db88df7a2732b0a39f9321898094a34d2c49b5eaac36a5ae9da4a56f6fe80763b2cc99b18163b962c699d8453d0925b500b4db26db6a376239d4f917d8689620c72a1e8cce8c292616007558178804cc199fff777cac96ee1646b7b6b31296dd170c7eb347da973f77b94da9d0f5ecfc7010e5a536b42a823e72bb01017d8261cd460623125c402316e37ee9b80da59c1e4e662513d02467ddd043a43dc778be", 0xae}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\b', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)="64f4fc1422c96c274ce0348c5ca549babfc908000000286fdd2703c57413179ec4e2664c39d606a14f0c8123d9c340b45f2f22dfecdee757b92ff234c22558e1cd034f43c14f843fc96d253b388b", 0x4e}, {&(0x7f0000000000)='\'', 0x1}, {&(0x7f0000000680)="da8dbee62382da4fb94ca44d85ab64048ea7ef84c44259d72f0871da4cba9232bfb55c0cac7b3902767a2bee46ebf4089c501fd9b961b3c5f3f8bd90df0200485063d77d42e40db57a8bec19ecb7d7fba6ee8e488b15ee2af731dfa3713a3621aec562f721c88ead7f82180e06002bfb8f2e6f75055423ddca62f8ca91c1680000000000000000000000005d2f82ee5b16d048d4985d5e", 0x1}, {&(0x7f0000000440)="bb", 0xffffffffffffff54}], 0x4}}], 0x0, 0x4000000) [ 520.393941][ T7171] minix_free_inode: bit 1 already cleared [ 520.532100][ T28] audit: type=1800 audit(1590988172.121:948): pid=30225 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16382 res=0 [ 520.564145][T30225] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:32 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x185, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 520.643986][ T7171] minix_free_inode: bit 1 already cleared [ 520.850961][ T28] audit: type=1800 audit(1590988172.431:949): pid=30238 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16376 res=0 05:09:32 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x66, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:32 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000000)) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) socket$caif_stream(0x25, 0x1, 0x4) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) [ 520.908324][T30238] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:32 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x6c, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:32 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x185, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 521.107402][ T7171] minix_free_inode: bit 1 already cleared 05:09:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) 05:09:32 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f0000000000)='7', 0xfffffffffffffe18, 0x8004, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 521.180110][ T28] audit: type=1800 audit(1590988172.761:950): pid=30256 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15858 res=0 [ 521.208811][T30256] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:32 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x185, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 521.259440][ T7171] minix_free_inode: bit 1 already cleared 05:09:32 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 521.374677][ T28] audit: type=1800 audit(1590988172.961:951): pid=30269 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15858 res=0 [ 521.422382][T30272] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 521.499097][ T7171] minix_free_inode: bit 1 already cleared 05:09:33 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x6d, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:33 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e24, 0x2, @private2, 0x6}], 0x2c) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000380)=[@in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e21, 0x2, @mcast2}, @in={0x2, 0x4e24, @rand_addr=0x64010100}, @in={0x2, 0x4e21, @multicast1}], 0x4c) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000240), &(0x7f0000000280)=0x4) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000100)=""/222, &(0x7f0000000200)=0xde) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) accept4$ax25(0xffffffffffffffff, &(0x7f00000002c0)={{0x3, @rose}, [@netrom, @bcast, @null, @null, @netrom, @netrom, @default, @rose]}, &(0x7f0000000340)=0x48, 0x0) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) 05:09:33 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x247, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:33 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000300)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in6={0xa, 0x4e20, 0x8001, @mcast2, 0x2120}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e21, @local}], 0x98) dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x3f}, 0x8) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @local}, &(0x7f0000000100)=0xc) r5 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @remote}, 0x10) recvmsg$can_j1939(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 521.655331][ T28] audit: type=1800 audit(1590988173.241:952): pid=30288 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16018 res=0 [ 521.691112][T30288] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:33 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x247, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 521.858232][ T7171] minix_free_inode: bit 1 already cleared 05:09:33 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:33 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@empty, r2}, 0x14) [ 521.965335][ T28] audit: type=1800 audit(1590988173.551:953): pid=30301 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15969 res=0 05:09:33 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) readlinkat(r4, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/73, 0x49) r6 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) recvmsg$can_j1939(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 522.037652][T30307] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x4001, &(0x7f00006f7000)={0x2, 0x7, @empty}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="0000c400", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$CAPI_INSTALLED(r6, 0x80024322) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r8}, 0x14) 05:09:33 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f4172", 0x247, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:33 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x202, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket(0x5, 0x5, 0x5) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x58, r5, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x25}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1d}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010100}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, 'overlay\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x64, r5, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr=' \x01\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_DOMAIN={0x13, 0x1, '/dev/dlm_plock\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x851) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000240)) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f00000001c0)={0x0, 0xf000}) [ 522.207310][ T7171] minix_free_inode: bit 1 already cleared [ 522.299061][T30320] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 522.317158][T30322] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 522.347804][T30322] attempt to access beyond end of device [ 522.366124][T30322] loop3: rw=2049, want=6434, limit=52 [ 522.399689][ T7171] minix_free_inode: bit 1 already cleared [ 522.439592][T30322] buffer_io_error: 20 callbacks suppressed [ 522.439602][T30322] Buffer I/O error on dev loop3, logical block 3216, lost async page write [ 522.465270][T30322] attempt to access beyond end of device [ 522.473994][T30322] loop3: rw=2049, want=6436, limit=52 [ 522.486157][T30322] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 522.519816][T30328] attempt to access beyond end of device [ 522.528230][T30328] loop3: rw=0, want=6434, limit=52 [ 522.539853][T30328] Buffer I/O error on dev loop3, logical block 3216, async page read [ 522.560873][T30328] attempt to access beyond end of device [ 522.569846][T30328] loop3: rw=0, want=6436, limit=52 [ 522.581059][T30328] Buffer I/O error on dev loop3, logical block 3217, async page read [ 522.620147][T30328] attempt to access beyond end of device [ 522.626708][T30328] loop3: rw=0, want=6434, limit=52 [ 522.656107][T30328] Buffer I/O error on dev loop3, logical block 3216, async page read [ 522.671004][T30328] attempt to access beyond end of device [ 522.687460][T30328] loop3: rw=0, want=6436, limit=52 [ 522.695268][T30328] Buffer I/O error on dev loop3, logical block 3217, async page read 05:09:34 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x6f, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:34 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) membarrier(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000000)={0x92, 0x2, {0x1, 0x1, 0x100, 0x0, 0x41}, 0x1000}) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:34 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2a8, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', &(0x7f0000000280)=""/160, 0xa0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) r4 = socket$inet(0x2, 0x800, 0x5) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="000000003e45d742a92908d8de7272693ba14ae48dd155c34ebd21ad76338378546ea0b84e4787c8d54c9c185cff6766882f76c05aa63826c1c52c81a15f01922ea66172c3b0368a7b5980a8ba6e654cc0904ebf815e75ee83c576cd0d08cb7e0c72047a316cc35b390b8d24bff65de99d3035a2c07eb05d87ea1ff2e48677cdc6dbf68a6828e4b0169a4e853f8b7f272111", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000140), 0x4) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000100)=0xfffffffc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) 05:09:34 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900c0040ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) [ 522.748506][ T7364] minix_free_inode: bit 1 already cleared 05:09:34 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$netlink(r0, 0x10e, 0xa, 0x0, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000100)={0x1c, 0x0, &(0x7f0000000000)=[@decrefs={0x40046307, 0x1}, @acquire_done], 0x57, 0x0, &(0x7f0000000080)="8cba8ea17993c7879a791aa27b70ad540209645dcc1774cc6e26c61ebc41c62b3d55438378a5a1f2bb9f71cb01e0419935bc5f4d66262978ef107ccfef0fdf2c90631b12fb7965a6f9ecfcad03fced2f4d2ce03eaa9256"}) r7 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) write$nbd(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="674466980100000001050000000000000090b1a10cfe50f908cd2de8fb37033e208f7006df3fbceb4acad74ae511196f90b1eb9b68a1fc86ea6de6a17e97da7b31913aa2dfeca21d993e1139aef6d06978d27778df7456222a262670234847585f9d525a667c50ef1134381d334b1a4c5387ee11ce954de3e25e166074317e8682e5688a4db772f013570ea4e389df661f4030d9c7001921aa00"/164], 0xa4) [ 522.920171][T30361] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 522.933268][T30361] attempt to access beyond end of device [ 522.939150][T30361] loop3: rw=2049, want=6434, limit=52 [ 522.946251][T30361] Buffer I/O error on dev loop3, logical block 3216, lost async page write [ 522.959897][T30361] attempt to access beyond end of device [ 522.966784][T30361] loop3: rw=2049, want=6436, limit=52 [ 522.974174][T30361] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 522.987120][T30372] attempt to access beyond end of device [ 522.993670][T30372] loop3: rw=0, want=6434, limit=52 [ 523.003991][T30372] Buffer I/O error on dev loop3, logical block 3216, async page read [ 523.018234][T30372] attempt to access beyond end of device [ 523.022348][T30351] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 523.025346][T30372] loop3: rw=0, want=6436, limit=52 [ 523.041183][T30372] Buffer I/O error on dev loop3, logical block 3217, async page read [ 523.054902][T30372] attempt to access beyond end of device [ 523.062039][T30372] loop3: rw=0, want=6434, limit=52 05:09:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) [ 523.067495][T30372] attempt to access beyond end of device [ 523.075762][T30372] loop3: rw=0, want=6436, limit=52 [ 523.083807][T30361] attempt to access beyond end of device [ 523.089955][T30361] loop3: rw=0, want=6436, limit=52 [ 523.097727][T30372] attempt to access beyond end of device [ 523.104893][T30372] loop3: rw=0, want=6434, limit=52 [ 523.110400][T30372] attempt to access beyond end of device [ 523.125447][T30372] loop3: rw=0, want=6436, limit=52 05:09:34 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426103010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a217eec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x3}], 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x4400, 0x100) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:34 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2a8, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:34 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x70, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:34 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240), 0x0) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000400)=""/141, 0x8d}], 0x1}, 0x62) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="35430516baa1fdaecddd950c14fdb6ddc2dfc5cb8e9bca54935faf6b6c2570fa9401843ffe9a4b4734c1cd28188c6f9a7a605f92ec28ae2b45ec4b02b96862a3b8a494bfa38c76e6e5fc15a039067b0110342b5fb62087c2e304ee7b0e24d35dcebd7b3a733435354ea5ae92b3307817cdd66693af2c24c680952d79b56271edbe6588840000000000000000e31ea20e8acb742a51e769af91655a79a39a3aab3187edfee8a26563cb2cf792f6f32253ab6c8edaee040000000000000047955b4be9883db57f31bd98a9f00000000000000000000000000200"/231, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000000100)={&(0x7f0000ff9000/0x4000)=nil, 0xe5, 0x2, 0x89, &(0x7f0000ffc000/0x1000)=nil, 0x5}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0xfffffff, 0x8, 0x7ff, r6, 0x0, &(0x7f0000000000)={0x990a64, 0x10001, [], @ptr=0x3f}}) getsockname$netlink(r7, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 523.169304][ T7364] minix_free_inode: bit 1 already cleared [ 523.203613][ T7171] minix_free_inode: bit 1 already cleared [ 523.311144][T30385] MINIX-fs: bad superblock or unable to read bitmaps 05:09:34 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f0000000180)={0x3}) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r5 = socket(0x11, 0x2, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xff, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) [ 523.463083][T30391] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:35 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0xfffe, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$RNDGETENTCNT(r5, 0x80045200, &(0x7f0000000000)) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) 05:09:35 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2a8, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 523.605205][ T7171] minix_free_inode: bit 1 already cleared 05:09:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x2800000004, 0x10900) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x40000, @private2={0xfc, 0x2, [], 0x1}, 0x2}, 0x1c) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0xa8c3b740ae0daafe) socket$inet6(0xa, 0x804, 0x7) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r6}, 0x14) 05:09:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@ipv4={[], [], @broadcast}, 0x8000, 0x0, 0x2, 0x6, 0x3, 0x200}, 0x20) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000100)={0xfff8, 0x0, 0xab7d, 0x0, 0x0, "93dd8865647fa7cc"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@empty, r4}, 0x14) [ 523.967374][T30425] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 523.978198][T30426] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:35 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ppoll(&(0x7f0000000000)=[{r3, 0x1002}], 0x1, &(0x7f0000000040), &(0x7f0000000080)={[0x2]}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}, @in6={0xa, 0x4e20, 0x40, @local, 0x3}], 0x2c) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$VHOST_SET_LOG_BASE(r6, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) [ 524.063724][T30425] attempt to access beyond end of device 05:09:35 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2d9, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 524.141295][T30425] loop3: rw=2049, want=6434, limit=52 [ 524.149735][T30425] attempt to access beyond end of device [ 524.157280][ T7171] minix_free_inode: bit 1 already cleared [ 524.164140][T30425] loop3: rw=2049, want=6436, limit=52 [ 524.180675][T30432] attempt to access beyond end of device 05:09:35 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 524.187221][T30432] loop3: rw=0, want=6434, limit=52 [ 524.208527][T30432] attempt to access beyond end of device [ 524.278630][T30432] loop3: rw=0, want=6436, limit=52 [ 524.316265][T30432] attempt to access beyond end of device [ 524.329193][T30452] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:35 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76", 0x2d9, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 524.364667][T30432] loop3: rw=0, want=6434, limit=52 [ 524.377051][ T7171] minix_free_inode: bit 1 already cleared [ 524.395597][T30432] attempt to access beyond end of device [ 524.401553][T30432] loop3: rw=0, want=6436, limit=52 [ 524.426557][T30432] attempt to access beyond end of device [ 524.433446][T30432] loop3: rw=0, want=6436, limit=52 [ 524.533290][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 524.533297][ T28] audit: type=1800 audit(1590988176.121:971): pid=30460 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16130 res=0 [ 524.580962][T30462] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 524.591134][ T7364] minix_free_inode: bit 1 already cleared 05:09:36 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x71, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:36 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000080)=@get={0x1, &(0x7f0000000300)=""/194, 0x3f}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000000)={0x2, 0x2f, "1d7fbecf7ab9ce27138788061f2ea2cf59167f2c5a6602ef244e6235293b79779b922956a16923fe41f841ee0f8722"}) 05:09:36 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:36 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000100)={0x72, 0x2, 0xb, 0x1, 0x2}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r1, r1, 0x0, 0xa198) 05:09:36 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2d9, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 524.670959][ T7171] minix_free_inode: bit 1 already cleared [ 524.764790][ T28] audit: type=1800 audit(1590988176.351:972): pid=30476 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16258 res=0 [ 524.811951][ T28] audit: type=1800 audit(1590988176.381:973): pid=30477 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16274 res=0 [ 524.834720][T30478] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 524.849217][T30478] minix_free_inode: bit 1 already cleared [ 524.855116][T30476] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 524.868161][T30477] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:36 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2f1, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 524.943381][ T7171] minix_free_inode: bit 1 already cleared 05:09:36 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) openat$audio1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio1\x00', 0x40001, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) [ 525.010146][ T7364] minix_free_inode: bit 1 already cleared 05:09:36 executing program 2 (fault-call:6 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 525.087430][ T28] audit: type=1800 audit(1590988176.671:974): pid=30500 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15763 res=0 05:09:36 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = socket(0x1e, 0x805, 0x0) listen(r4, 0x0) sendmsg$tipc(r4, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r7}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)={r7, 0x1000, "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"}, &(0x7f0000000000)=0x1008) [ 525.136265][T30504] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 525.162254][ T28] audit: type=1800 audit(1590988176.731:975): pid=30508 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16179 res=0 05:09:36 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2f1, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 525.214560][T30508] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 525.223307][T30511] FAULT_INJECTION: forcing a failure. [ 525.223307][T30511] name failslab, interval 1, probability 0, space 0, times 0 [ 525.244299][T30511] CPU: 1 PID: 30511 Comm: syz-executor.2 Not tainted 5.7.0-rc7-syzkaller #0 [ 525.253017][T30511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.263066][T30511] Call Trace: [ 525.266364][T30511] dump_stack+0x1e9/0x30e [ 525.270694][T30511] should_fail+0x433/0x5b0 [ 525.275124][T30511] ? sock_kmalloc+0x98/0x100 [ 525.279809][T30511] should_failslab+0x5/0x20 [ 525.284308][T30511] __kmalloc+0x74/0x330 [ 525.288473][T30511] sock_kmalloc+0x98/0x100 [ 525.292889][T30511] hash_sendmsg+0x757/0xb40 [ 525.297396][T30511] ? hash_accept+0x4a0/0x4a0 [ 525.297440][T30508] attempt to access beyond end of device [ 525.302011][T30511] ____sys_sendmsg+0x4f9/0x7c0 [ 525.302026][T30511] ? import_iovec+0x12a/0x2c0 [ 525.302044][T30511] __sys_sendmmsg+0x45b/0x690 [ 525.302093][T30511] ? ksys_write+0x1b1/0x220 [ 525.302103][T30511] ? ksys_write+0x1b1/0x220 [ 525.302118][T30511] ? check_preemption_disabled+0xb0/0x240 [ 525.302126][T30511] ? debug_smp_processor_id+0x5/0x20 [ 525.302139][T30511] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 525.302151][T30511] __x64_sys_sendmmsg+0x9c/0xb0 [ 525.302169][T30511] do_syscall_64+0xf3/0x1b0 [ 525.338860][T30508] loop3: rw=2049, want=6434, limit=52 [ 525.341884][T30511] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 525.341896][T30511] RIP: 0033:0x45ca69 [ 525.341906][T30511] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.341911][T30511] RSP: 002b:00007f2370756c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 525.341919][T30511] RAX: ffffffffffffffda RBX: 00000000004fc740 RCX: 000000000045ca69 [ 525.341925][T30511] RDX: 0000000000000001 RSI: 00000000200022c0 RDI: 0000000000000006 [ 525.341930][T30511] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 525.341936][T30511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 525.341941][T30511] R13: 00000000000008e3 R14: 00000000004cbab7 R15: 00007f23707576d4 [ 525.441932][T30508] attempt to access beyond end of device [ 525.447660][T30508] loop3: rw=2049, want=6436, limit=52 [ 525.456686][T30515] attempt to access beyond end of device [ 525.465780][T30515] loop3: rw=0, want=6434, limit=52 [ 525.485643][T30515] attempt to access beyond end of device 05:09:37 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote={{}, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @queue={0x80, {0x0, 0x8000}}}}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg$can_j1939(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/131, 0x83}, {&(0x7f0000000400)=""/267, 0x10b}], 0x2}, 0x0) [ 525.518939][T30515] loop3: rw=0, want=6436, limit=52 [ 525.528242][ T7171] minix_free_inode: bit 1 already cleared [ 525.578605][T30515] attempt to access beyond end of device [ 525.587822][T30515] loop3: rw=0, want=6434, limit=52 [ 525.609874][T30515] attempt to access beyond end of device [ 525.634262][T30515] loop3: rw=0, want=6436, limit=52 [ 525.647364][ T28] audit: type=1800 audit(1590988177.231:976): pid=30530 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16362 res=0 [ 525.679581][T30530] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:37 executing program 2 (fault-call:6 fault-nth:1): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 525.742563][ T28] audit: type=1800 audit(1590988177.301:977): pid=30515 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=1 res=0 [ 525.901173][ T7171] minix_free_inode: bit 1 already cleared [ 525.907954][ T7364] minix_free_inode: bit 1 already cleared 05:09:38 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x72, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:38 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2f1, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:38 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x6, &(0x7f0000001480)=[{&(0x7f0000001540)="d7c584aba4b573f5a5a970d924c1d6a9ba66545bc0a92140d75314161a7d4bb1260484b39ce81ead9f02c1b1c02443a99bd3de8a6e39d42f713c42", 0x3b, 0x2}, {&(0x7f0000000100)="35bcb0c379e106200c32b57de56e4b94d3ee70e4faf9db2944984ce7cf6443150c25e91cec8d1f4746341fff43a9e0d4c49dcce88d61277cff1ac6b461b8dc5b0f0066e3783156bee683fd4a0d72eb80d24c33328058bdf6c1fcf983b73ab01824140ee6e5aa456cca28641bc91799968f329124", 0x74, 0x6}, {&(0x7f00000001c0)="7b9aaf37da43ba786c83c06a3610d683e55117d92197b04dd7fc662dc1cbc90858b15bbd6b915420c6c4eb355cf7c888d94b79c025911d29c65908473a8e0cee8ab61f18610bb020bf7d6d681d9b500883e9a466b60f764756ff186b152eec95077f86df6e7ce37ea3cc95e6816f0096b7c9845f2be1c37c7d4a1b8e2f1185de91b7023320cc5dd35f7235ba392ec4baf92b4d7e52620e050de2f77e07d23c609cbabf93e138b1b195341dc5f631a6471c12c1aa4b7e0f8c408b44ca487fa13ff136509abc4ce2637cdb4ef554869169d5e02ff12a9e32767886ca5f3990642c", 0xe0, 0x401}, {&(0x7f00000002c0)="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", 0x1000, 0xff}, {&(0x7f00000012c0)="92b75b34116d223319c6818e7e105f9539398fae28f37df613254bd3c9522444ee5575d7c25a6d86aa83d08c1342484e87c52c6b96d473ac7f62db6670ba027ac9645c34220990c04253a72633c94996d033ecb921b68905f4dc877a45a2f39b13bd93b0e4283d1cc6915aff4bc3349e039dc91aaeaf149b562f53bc550bef16761525514123d05cbb1e2e2d81c407c959b9792f", 0x94, 0x13d}, {&(0x7f0000001380)="9fca0484502d759e5f8ae9b4978f7cbaa581bc665a589b7a332047a7cad37b60195a8abc93e8605469c7d7243eeec91685e08cc085508f624c65499f4c1f68081ed6b22590c356ba7480d63a9c2080660cbee4956e727d587567449003c8827fa8a353e710fae51064701d0213bdd44a7da899075d3db88fb9dbaadef2d84af22bf878a7b56401c7bf09e42069996888f083edb6ed2ba6d4aa0410f425c405bc64e18680261f3547f6dc5344c09a0bd56355a241a5feb01b96eda82f05cd968ef977f890fd08e6b3efa7aecf0e378134af83178db27122970e0f40b2af7e42f0ef066bcb", 0xe4}], 0x20, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000017c0)=ANY=[@ANYBLOB="325bc00b1f24660000160f56b5dd9fb1b4014a2715ffcb82d87cbbe9e4456aad5ac6d643096ea474926d0500195fff47b004f0bff7d24352927f19348f15623c46b7aeafecf0d3bfbff5bc7b000000007f987233535fe7a84798a5e08c0c31fb403eb7a6bad008a88664e247ab26a59d0452d0e3b2314a7c37606893724294732a55d38cfd7101ad76893319ad87958f04fb7c2747fdf869fd2cdb7bb564a90e39c4f643b73583", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000001580)='9p\x00', 0x80, &(0x7f00000015c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@access_client='access=client'}, {@access_client='access=client'}], [{@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@appraise='appraise'}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@uid_lt={'uid<', r8}}, {@obj_type={'obj_type', 0x3d, 'minix\x00'}}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role'}}]}}) sendfile(r0, r0, 0x0, 0xa198) 05:09:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 526.595415][ T28] audit: type=1800 audit(1590988178.182:978): pid=30549 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15790 res=0 05:09:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 526.675539][ T28] audit: type=1800 audit(1590988178.182:979): pid=30550 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15791 res=0 [ 526.698925][T30549] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:38 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0xf, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:38 executing program 3: getpeername(0xffffffffffffffff, &(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000a00)=0x80) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket(0x1c, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@empty, r3}, 0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000a40)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000980)=ANY=[], 0x49e) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x140f, 0x20, 0x70bd28, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'issm\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'umad\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x300040c5}, 0x48d0) sendfile(r4, r4, 0x0, 0xa198) [ 526.835876][ T7171] minix_free_inode: bit 1 already cleared [ 526.954200][ T28] audit: type=1800 audit(1590988178.542:980): pid=30569 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15784 res=0 [ 526.982813][T30569] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0xf00, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 527.002362][T30569] attempt to access beyond end of device 05:09:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x1000000, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 527.095363][T30569] loop3: rw=2049, want=6434, limit=52 [ 527.105481][T30578] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 527.163476][T30569] attempt to access beyond end of device [ 527.191719][T30569] loop3: rw=2049, want=6436, limit=52 [ 527.204594][T30573] attempt to access beyond end of device [ 527.210329][T30573] loop3: rw=0, want=6434, limit=52 [ 527.229210][T30573] attempt to access beyond end of device [ 527.261980][T30573] loop3: rw=0, want=6436, limit=52 [ 527.268842][ T7171] minix_free_inode: bit 1 already cleared [ 527.323171][T30569] attempt to access beyond end of device [ 527.335548][T30569] loop3: rw=0, want=6434, limit=52 [ 527.345706][T30569] attempt to access beyond end of device [ 527.356637][T30569] loop3: rw=0, want=6436, limit=52 [ 527.394782][ T7364] minix_free_inode: bit 1 already cleared 05:09:40 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000000)={0xffffffff, "06f3e898ee76b672d8da7e696f5c8c661f1d49974b7a5f72d8c9095ddb1985b0", 0x1}) recvmsg$can_j1939(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1}, 0x40002022) 05:09:40 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0xf000000, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:40 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x73, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:40 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@ng={0x4, 0xd, "544a20330b90694d74ea9c11a7296108b788f6"}, 0x15, 0x0) 05:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x8dffffff, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 528.641764][T30601] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 528.652757][T30603] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 528.691450][T30603] attempt to access beyond end of device [ 528.709556][T30603] loop3: rw=2049, want=6434, limit=52 [ 528.728356][T30603] buffer_io_error: 22 callbacks suppressed [ 528.728365][T30603] Buffer I/O error on dev loop3, logical block 3216, lost async page write 05:09:40 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2fd, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 528.782850][T30603] attempt to access beyond end of device [ 528.819050][T30603] loop3: rw=2049, want=6436, limit=52 [ 528.825108][ T7171] minix_free_inode: bit 1 already cleared [ 528.849368][T30603] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 528.869772][T30615] attempt to access beyond end of device [ 528.876202][T30615] loop3: rw=0, want=6434, limit=52 05:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0xf0ffffff, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 528.906163][T30615] Buffer I/O error on dev loop3, logical block 3216, async page read [ 528.928260][T30615] attempt to access beyond end of device [ 528.950777][T30615] loop3: rw=0, want=6436, limit=52 [ 528.964908][T30615] Buffer I/O error on dev loop3, logical block 3217, async page read [ 528.986106][T30625] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0xffffff7f, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 529.094706][T30615] attempt to access beyond end of device 05:09:40 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x303, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 529.138540][T30615] loop3: rw=0, want=6434, limit=52 [ 529.156266][T30615] Buffer I/O error on dev loop3, logical block 3216, async page read [ 529.164992][ T7171] minix_free_inode: bit 1 already cleared [ 529.202043][T30615] attempt to access beyond end of device 05:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0xffffff8d, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:40 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x303, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 529.244466][T30615] loop3: rw=0, want=6436, limit=52 [ 529.258236][T30637] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 529.262341][T30615] Buffer I/O error on dev loop3, logical block 3217, async page read [ 529.283957][ T7171] minix_free_inode: bit 1 already cleared 05:09:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0xfffffff0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 529.385681][T30647] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 529.421038][ T7364] minix_free_inode: bit 1 already cleared 05:09:41 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x303, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:41 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x74, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 529.447063][ T7171] minix_free_inode: bit 1 already cleared 05:09:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0xf}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 529.553062][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 529.553071][ T28] audit: type=1800 audit(1590988181.142:989): pid=30659 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15796 res=0 [ 529.580859][T30659] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:41 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x306, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 529.631509][ T7171] minix_free_inode: bit 1 already cleared 05:09:41 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x75, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x11}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 529.728640][ T28] audit: type=1800 audit(1590988181.312:990): pid=30670 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15796 res=0 [ 529.766777][T30670] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0xd80}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:41 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c03", 0x306, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 529.854388][ T7171] minix_free_inode: bit 1 already cleared [ 529.957661][ T28] audit: type=1800 audit(1590988181.542:991): pid=30682 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15799 res=0 [ 529.987008][T30682] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x5000}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:41 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c03", 0x306, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:41 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x76, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 530.100659][ T7171] minix_free_inode: bit 1 already cleared [ 530.151616][ T28] audit: type=1800 audit(1590988181.742:992): pid=30697 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15797 res=0 [ 530.184229][T30697] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x20000290}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:41 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 530.275025][ T7171] minix_free_inode: bit 1 already cleared [ 530.343493][ T28] audit: type=1800 audit(1590988181.932:993): pid=30706 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15813 res=0 [ 530.406923][T30706] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:42 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x7ffff000}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 530.499979][ T7171] minix_free_inode: bit 1 already cleared 05:09:42 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7a, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) [ 530.619538][ T28] audit: type=1800 audit(1590988182.202:994): pid=30718 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15799 res=0 [ 530.647212][T30718] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:42 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x308, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 530.750033][ T7171] minix_free_inode: bit 1 already cleared 05:09:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0xf}], 0x2}}], 0x1, 0x0) [ 530.882135][ T28] audit: type=1800 audit(1590988182.472:995): pid=30726 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15796 res=0 [ 530.969619][T30729] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:42 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7c, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x10}], 0x2}}], 0x1, 0x0) 05:09:42 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 531.072270][ T7171] minix_free_inode: bit 1 already cleared 05:09:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x600}], 0x2}}], 0x1, 0x0) [ 531.210387][ T28] audit: type=1800 audit(1590988182.782:996): pid=30743 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15799 res=0 [ 531.241775][T30743] MINIX-fs: bad superblock or unable to read bitmaps 05:09:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0xcc0}], 0x2}}], 0x1, 0x0) 05:09:43 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 531.458010][ T28] audit: type=1800 audit(1590988183.042:997): pid=30754 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15820 res=0 [ 531.500913][T30754] MINIX-fs: bad superblock or unable to read bitmaps 05:09:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x20000341}], 0x2}}], 0x1, 0x0) 05:09:43 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 531.685499][ T28] audit: type=1800 audit(1590988183.272:998): pid=30763 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15820 res=0 [ 531.722583][T30763] MINIX-fs: bad superblock or unable to read bitmaps 05:09:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x7fffeff0}], 0x2}}], 0x1, 0x0) 05:09:43 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 531.978912][T30776] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:43 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x8}}], 0x1, 0x0) [ 532.238823][T30787] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:45 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7d, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xf}}], 0x1, 0x0) 05:09:45 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xf00}}], 0x1, 0x0) [ 533.554073][T30803] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:45 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 533.793634][T30813] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x1000000}}], 0x1, 0x0) 05:09:45 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xf000000}}], 0x1, 0x0) [ 533.983907][T30825] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:45 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x8dffffff}}], 0x1, 0x0) [ 534.245817][T30835] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:46 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xf0ffffff}}], 0x1, 0x0) [ 534.454029][T30847] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:46 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x82, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:46 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xffffff7f}}], 0x1, 0x0) [ 535.011579][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 535.011587][ T28] audit: type=1800 audit(1590988186.603:1006): pid=30863 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15821 res=0 05:09:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xffffff8d}}], 0x1, 0x0) [ 535.073773][T30866] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:46 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 535.205581][ T28] audit: type=1800 audit(1590988186.793:1007): pid=30874 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15830 res=0 [ 535.287052][T30874] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xfffffff0}}], 0x1, 0x0) 05:09:46 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 535.432969][ T28] audit: type=1800 audit(1590988187.023:1008): pid=30883 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15837 res=0 [ 535.456825][T30883] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x100000000000000}}], 0x1, 0x0) 05:09:47 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 535.640807][ T28] audit: type=1800 audit(1590988187.233:1009): pid=30895 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15744 res=0 [ 535.671468][T30895] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:47 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a0090", 0x9, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xf00000000000000}}], 0x1, 0x0) [ 535.841055][ T28] audit: type=1800 audit(1590988187.433:1010): pid=30903 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15837 res=0 [ 535.849447][T30903] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x8000000000000000}}], 0x1, 0x0) 05:09:48 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x83, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:48 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x8dffffff00000000}}], 0x1, 0x0) [ 536.889361][ T28] audit: type=1800 audit(1590988188.473:1011): pid=30921 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15867 res=0 [ 536.914892][T30921] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:48 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:48 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0) [ 537.081186][ T28] audit: type=1800 audit(1590988188.673:1012): pid=30932 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15867 res=0 [ 537.116534][T30932] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xffffff7f00000000}}], 0x1, 0x0) 05:09:48 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1a", 0xe, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0xffffffff00000000}}], 0x1, 0x0) [ 537.285680][ T28] audit: type=1800 audit(1590988188.873:1013): pid=30946 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15856 res=0 [ 537.317298][T30946] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:49 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x2}, &(0x7f0000000040)=0x8) 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:49 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0xf}}], 0x1, 0x0) [ 537.533623][ T28] audit: type=1800 audit(1590988189.123:1014): pid=30963 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15856 res=0 [ 537.554022][T30963] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:49 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0xf00}}], 0x1, 0x0) [ 537.678061][ T28] audit: type=1800 audit(1590988189.263:1015): pid=30976 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15856 res=0 [ 537.713441][T30976] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0x1000000}}], 0x1, 0x0) 05:09:49 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c9", 0x10, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0xf000000}}], 0x1, 0x0) [ 537.948837][T30988] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0x8dffffff}}], 0x1, 0x0) 05:09:49 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:49 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x2000000}, &(0x7f0000000040)=0x8) 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0xf0ffffff}}], 0x1, 0x0) [ 538.155971][T30998] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:49 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0xffffff7f}}], 0x1, 0x0) [ 538.357724][T31016] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0xffffff8d}}], 0x1, 0x0) 05:09:50 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f", 0x11, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 538.551844][T31028] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2, 0x0, 0x0, 0xfffffff0}}], 0x1, 0x0) 05:09:50 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 538.783101][T31039] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:50 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0xf}], 0x1, 0x0) 05:09:50 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x20000108) [ 538.951252][T31048] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0xf00}], 0x1, 0x0) 05:09:50 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0x1000000}], 0x1, 0x0) [ 539.170211][T31062] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:09:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0xf000000}], 0x1, 0x0) 05:09:50 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 539.393068][T31074] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0x8dffffff}], 0x1, 0x0) 05:09:51 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 539.584924][ T7171] minix_free_inode: bit 1 already cleared 05:09:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0xf0ffffff}], 0x1, 0x0) [ 539.708619][T31086] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:51 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r1, r1, 0x0, 0xa198) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) connect$can_bcm(0xffffffffffffffff, &(0x7f00000001c0), 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="80000000", @ANYRES16=0x0, @ANYBLOB="00002bbd7000fddbdf25020000000c00030080000000000000005400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="0c0006000200000000000000"], 0x80}, 0x1, 0x0, 0x0, 0x240c4055}, 0x8080) 05:09:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0xffffff7f}], 0x1, 0x0) 05:09:51 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 539.887634][ T7171] minix_free_inode: bit 1 already cleared [ 539.912716][T31097] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 540.014774][T31097] attempt to access beyond end of device [ 540.020707][T31097] loop3: rw=2049, want=6434, limit=52 05:09:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0xffffff8d}], 0x1, 0x0) [ 540.055440][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 540.055448][ T28] audit: type=1800 audit(1590988191.643:1026): pid=31109 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15856 res=0 [ 540.056230][T31097] Buffer I/O error on dev loop3, logical block 3216, lost async page write [ 540.119780][T31109] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 540.186730][T31097] attempt to access beyond end of device [ 540.211810][T31097] loop3: rw=2049, want=6436, limit=52 [ 540.227427][T31097] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 540.239251][T31105] attempt to access beyond end of device [ 540.247577][T31105] loop3: rw=0, want=6434, limit=52 [ 540.259402][ T7171] minix_free_inode: bit 1 already cleared [ 540.274778][T31105] Buffer I/O error on dev loop3, logical block 3216, async page read 05:09:51 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 540.298194][T31105] attempt to access beyond end of device [ 540.312566][T31105] loop3: rw=0, want=6436, limit=52 [ 540.324203][T31105] Buffer I/O error on dev loop3, logical block 3217, async page read 05:09:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}, 0xfffffff0}], 0x1, 0x0) [ 540.346115][T31105] attempt to access beyond end of device 05:09:51 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="e6ffffff3c1981ee0a23cc4b9b59e62d037a037dd87d1bc3ddba962ac13402be5335e8961276c26af255569bad3b119d18bd110400000000000000a54532f8a040132bcb24b41bec8d2f98ad81f9fc2888643ce261141e4e024941f2e050a6d70964980f2fe32f475637f4dd0300"/120, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYBLOB], &(0x7f0000000040)=0x8) r6 = socket(0x1e, 0x805, 0x0) listen(r6, 0x0) sendmsg$tipc(r6, &(0x7f00000003c0)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x2}}, 0x10, 0x0}, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f00000002c0)={r8}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x7, 0xca, 0xfffff8fc, 0x5, r8}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={r8, 0x699c}, 0x8) [ 540.369235][T31105] loop3: rw=0, want=6434, limit=52 [ 540.414889][ T28] audit: type=1800 audit(1590988192.003:1027): pid=31131 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15863 res=0 [ 540.425319][T31131] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0xf, 0x0) [ 540.477220][T31105] Buffer I/O error on dev loop3, logical block 3216, async page read [ 540.522275][T31105] attempt to access beyond end of device [ 540.554134][T31105] loop3: rw=0, want=6436, limit=52 [ 540.565364][T31105] Buffer I/O error on dev loop3, logical block 3217, async page read [ 540.574741][ T28] audit: type=1800 audit(1590988192.163:1028): pid=31105 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=1 res=0 [ 540.596044][ T7364] minix_free_inode: bit 1 already cleared 05:09:52 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x2ff, 0x3}], 0x1d11014, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x49e) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) r2 = socket$caif_seqpacket(0x25, 0x5, 0x3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x8c1, 0x3}) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendfile(r4, r2, 0x0, 0xa198) 05:09:52 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 540.621678][ T7171] minix_free_inode: bit 1 already cleared 05:09:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x10, 0x0) [ 540.713023][ T28] audit: type=1800 audit(1590988192.303:1029): pid=31144 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15878 res=0 [ 540.818841][ T28] audit: type=1800 audit(1590988192.383:1030): pid=31151 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15880 res=0 05:09:52 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000140)=ANY=[@ANYRES32=r4, @ANYBLOB="00cd03c0c4f53691bd3c70b201a67482041cc18fe01523e1e29b1969aff6491c"], &(0x7f0000000040)=0x8) r6 = socket(0x1e, 0x805, 0x0) listen(r6, 0x0) sendmsg$tipc(r6, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f00000002c0)={r9}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r9}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={r9, 0x6, 0x0, 0x10001}, &(0x7f00000000c0)=0x10) 05:09:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x600, 0x0) [ 540.900748][T31151] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 540.963421][ T28] audit: type=1804 audit(1590988192.483:1031): pid=31158 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir095808877/syzkaller.K32w6C/943/file0" dev="sda1" ino=15880 res=1 05:09:52 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 541.043768][ T7171] minix_free_inode: bit 1 already cleared 05:09:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0xcc0, 0x0) 05:09:52 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x80080, 0x140) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa194) [ 541.192767][ T28] audit: type=1804 audit(1590988192.783:1032): pid=31178 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir878233163/syzkaller.stvTRo/1037/file0" dev="sda1" ino=15863 res=1 05:09:52 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) [ 541.247280][T31182] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:52 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x49e) r2 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/change-rule\x00', 0x2, 0x0) sendfile(r2, r0, 0x0, 0x8000000a198) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) close(r7) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r7, 0x29, 0x37, &(0x7f0000000300), 0x8) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) [ 541.286226][ T28] audit: type=1800 audit(1590988192.813:1033): pid=31182 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15881 res=0 [ 541.309394][ T7171] minix_free_inode: bit 1 already cleared 05:09:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x20000341, 0x0) [ 541.407308][T31195] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 541.421406][ T28] audit: type=1800 audit(1590988192.983:1034): pid=31195 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15872 res=0 [ 541.455850][T31198] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 541.467410][T31190] attempt to access beyond end of device [ 541.483319][T31190] loop3: rw=2049, want=6434, limit=52 05:09:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x7fffeff0, 0x0) [ 541.567159][T31190] Buffer I/O error on dev loop3, logical block 3216, lost async page write 05:09:53 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xf) [ 541.644911][T31190] attempt to access beyond end of device [ 541.651986][ T28] audit: type=1800 audit(1590988193.003:1035): pid=31190 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15887 res=0 [ 541.677007][T31190] loop3: rw=2049, want=6436, limit=52 [ 541.684165][T31190] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 541.703947][T31198] attempt to access beyond end of device [ 541.715172][T31198] loop3: rw=0, want=6434, limit=52 [ 541.724694][ T7171] minix_free_inode: bit 1 already cleared [ 541.730914][T31198] Buffer I/O error on dev loop3, logical block 3216, async page read 05:09:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xf00) [ 541.759698][T31198] attempt to access beyond end of device [ 541.801407][T31198] loop3: rw=0, want=6436, limit=52 [ 541.828836][T31198] Buffer I/O error on dev loop3, logical block 3217, async page read [ 541.856808][T31220] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 541.922767][ T7364] minix_free_inode: bit 1 already cleared [ 541.988689][ T7171] minix_free_inode: bit 1 already cleared 05:09:54 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setuid(r4) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x7b, &(0x7f0000000100)={r6}, &(0x7f0000000040)=0x8) 05:09:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x1000000) 05:09:54 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r6) ioctl$TUNSETGROUP(r3, 0x400454ce, r6) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r0, r0, 0x0, 0xa198) 05:09:54 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xf000000) [ 542.705095][T31236] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 542.718383][T31237] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:54 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x49e) 05:09:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x8dffffff) [ 542.803300][ T7171] minix_free_inode: bit 1 already cleared [ 542.839572][T31236] attempt to access beyond end of device [ 542.845706][T31236] loop3: rw=2049, want=6434, limit=52 [ 542.882738][T31236] attempt to access beyond end of device [ 542.902577][T31236] loop3: rw=2049, want=6436, limit=52 05:09:54 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000500)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}, {&(0x7f00000001c0)="952ec8c8286ef6c5e056fadc128220321e8bd49d39677a1f6d5493c8af6b117cd3f0d968d2e8c5f9a0a6620e8c536f240e777d7fd7a3d61f6a3322c90ce9998b13665657b987641a1e058e02e9e397724a8eaf99ddd0747e3dd147491d323635e8b50e1cde8aa1e424bcd8e99c9149052f388fa76fa89c44d424bdefe8eb1e5ea8bea1d4", 0x84, 0x23}], 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x98, r4, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x400}]}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_RULES={0x44, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x165fdda}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xff}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7fffffff}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xa4c7}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x9}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x3}]}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xed}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x4f}]}, 0x98}, 0x1, 0x0, 0x0, 0x80000}, 0x4000) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r5, r5, 0x0, 0xa198) 05:09:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xf0ffffff) [ 542.952875][T31260] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 543.084753][ T7364] minix_free_inode: bit 1 already cleared 05:09:54 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x49e) 05:09:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xffffff7f) [ 543.129422][ T7171] minix_free_inode: bit 1 already cleared [ 543.363759][T31275] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 543.406480][T31279] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 543.452328][T31279] attempt to access beyond end of device [ 543.458069][T31279] loop3: rw=2049, want=6434, limit=52 [ 543.463678][T31279] attempt to access beyond end of device [ 543.469785][T31279] loop3: rw=2049, want=6436, limit=52 [ 543.476398][T31279] attempt to access beyond end of device 05:09:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xffffff8d) 05:09:55 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) fanotify_mark(r2, 0x0, 0x18, r5, &(0x7f0000000000)='./file0\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) r9 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r9, 0x84, 0x7b, &(0x7f0000000100)={r8}, &(0x7f0000000040)=0x8) 05:09:55 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, 0x0, 0x49e) 05:09:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xfffffff0) [ 543.521239][T31279] loop3: rw=0, want=6434, limit=52 [ 543.538485][ T7171] minix_free_inode: bit 1 already cleared [ 543.560019][T31279] attempt to access beyond end of device [ 543.604910][T31279] loop3: rw=0, want=6436, limit=52 [ 543.670050][T31300] attempt to access beyond end of device [ 543.675950][T31297] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 543.718335][T31300] loop3: rw=0, want=6434, limit=52 05:09:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x100000000000000) [ 543.780617][T31300] attempt to access beyond end of device [ 543.809638][T31300] loop3: rw=0, want=6436, limit=52 05:09:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xf00000000000000) [ 543.848168][ T7171] minix_free_inode: bit 1 already cleared [ 543.864838][ T7364] minix_free_inode: bit 1 already cleared 05:09:55 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x84c790cfb86d400d, 0xa) sendmmsg$nfc_llcp(r0, &(0x7f0000000b80)=[{&(0x7f00000002c0)={0x27, 0x1, 0x0, 0x4, 0xa8, 0x8, "4d1818f2e3aac0c423163a1e17ac3ee82d66fbba52c0278c4ca0280adb9dd2e2ad12aeab0c7d0b83c8a802536589b0ab8290e69afa956d19aae7e806e5681d", 0x16}, 0x60, &(0x7f0000000400)=[{&(0x7f0000000340)="39a1c38d5b5db83c238e4df40a1033fabda8825c632fdb0ad71906bf59270c0657c8d8438400e1ccb39da41cb1af75baa21fa8cf502b93d21be1babcfae66329efb15f37c71e0c37d306a99264eb3841dc34c6ff69792ad39cc84286f0a25079f41d5bf3", 0x64}, {&(0x7f00000003c0)="3282e5c85d2e844a223b5734ab83c0cca466558ad8d0355124b47401f8664e12010fc9f0f7d16cd7b29170fe72054b3fc451", 0x32}], 0x2, &(0x7f0000000440)={0xb0, 0x29, 0x7fffffff, "c1d1c00eeeeff5a24e3e7df89a341a22c1ba885450c9fdc960a6faf5fc4a975a9a3317b38702bfb4e6b5be3cd11bfbb846ca17c43210fcd5ed7a619cb99a256caf7ff9db3884433bce70065d9107844139faa8114c46caccbab3ce9976db9ff8f79a2259a6a8af7b44ec73e129120d7688114148ed79993a81b0d37e38b6ed70861284c50ace71df5ab0d33c06bf8254d64d1124f83a4cc32bd80f9f62d27864"}, 0xb0, 0xc000}, {&(0x7f0000000500)={0x27, 0x1, 0x0, 0x5, 0x0, 0x0, "09e746b0006886c93a91ecdb3100ba14bef27f7ad1469f77a579aa1dee531dec26176a08fb78d9e16ad3cc09b0fa7e48e8e5694d9aef3b77958083c890247a", 0x8}, 0x60, &(0x7f00000005c0)=[{&(0x7f0000000980)="94dcda667bd13033c7382d262073ae5ce30681814be066b663fe778b5546a2739491e007795dc6a4b88fe922a0f4a1f7e4c276999a5dd176fdac484c2938b428fdfa32a25b3cdc06ac2c1e55b516cf2df04def3f69ae17e9f2e78ff391dca15be77cbce2cd93f12a5b0f8f0dc8c84839cd948da1a3151f83b52b4b64997d041e078db2d0c545e4607fbf96a61c4e6bbb2bcee02253a894f56ac03b4b43ea8b0493a46b5534b33f0338787e59e826f4a7513c1a9e3f1ee344372cb78d1db94e253a5757245b981ce12bcab1e1353967dfae9e8aa6bb5d3466c1d0", 0xda}, {&(0x7f0000000580)="ba586036a504517c0d9e854e322708afade7136631f4e93b", 0x18}], 0x2, &(0x7f0000000a80)={0xf0, 0x115, 0xa0e, "9e6ed327590ca17d54651eb037c2612488b72864df4af8facb87c83834b33bd3a6005568afca4c898c6410936a66feb8ba0acdc416bdda28e6f19a15297938066b0c55e469ea32e80dfbf9c216ecf0d5f19ab9d5a0e14641176f9f237db94bb8a010a80ce63d7ee98ec5f355e2e93b71c982512dfb770b485492e00c6cde91638f1e76bc3c4f51b8141877df568cd0ed9f354b41f18643d8e017f67d087198addd06772d6c45603443de0ce4aa3c53e79a2026212d4b86f4e1fa683c95cbd65520f0f1617ded192814303d133009c8377e0b6c58e8eb4d05b8824a8bd8e8eb4e"}, 0xf0, 0x80}], 0x2, 0x10000) r1 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000000)={0x0, 0xa, 0x2}) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000600)) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x49e) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x640) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@gettclass={0x24, 0x2a, 0x2, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x4, 0xc}, {0xffe0, 0x2}, {0x8, 0x1}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000044) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$UI_SET_RELBIT(r6, 0x40045566, 0x3) sendfile(r2, r2, 0x0, 0xa198) 05:09:55 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x71, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x8000000000000000) 05:09:55 executing program 1 (fault-call:3 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 544.086709][T31323] MINIX-fs: mounting unchecked file system, running fsck is recommended 05:09:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x8dffffff00000000) [ 544.134101][T31323] minix_free_inode: bit 1 already cleared [ 544.173628][T31329] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 544.235762][T31329] FAULT_INJECTION: forcing a failure. [ 544.235762][T31329] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 544.250426][T31329] CPU: 0 PID: 31329 Comm: syz-executor.1 Not tainted 5.7.0-rc7-syzkaller #0 [ 544.260066][T31329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.270556][T31329] Call Trace: [ 544.273855][T31329] dump_stack+0x1e9/0x30e [ 544.278199][T31329] should_fail+0x433/0x5b0 [ 544.282623][T31329] prepare_alloc_pages+0x28c/0x4a0 [ 544.287738][T31329] __alloc_pages_nodemask+0xbc/0x5e0 [ 544.293733][T31329] pagecache_get_page+0x621/0xd00 [ 544.298849][T31329] ? minix_prepare_chunk+0x30/0x30 [ 544.303979][T31329] grab_cache_page_write_begin+0x50/0x90 [ 544.309614][T31329] block_write_begin+0x33/0x280 [ 544.315086][T31329] minix_write_begin+0x38/0x1f0 [ 544.319939][T31329] generic_perform_write+0x23b/0x4e0 [ 544.325244][T31329] __generic_file_write_iter+0x22b/0x4e0 [ 544.330904][T31329] ? down_write+0xcd/0x130 [ 544.335354][T31329] generic_file_write_iter+0x4a6/0x650 [ 544.340823][T31329] __vfs_write+0x54c/0x710 [ 544.345256][T31329] vfs_write+0x274/0x580 [ 544.349510][T31329] ksys_write+0x11b/0x220 [ 544.353849][T31329] do_syscall_64+0xf3/0x1b0 [ 544.358353][T31329] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 544.364244][T31329] RIP: 0033:0x45ca69 05:09:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xf0ffffff00000000) [ 544.368305][T31329] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 544.387993][T31329] RSP: 002b:00007f7af1f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 544.396401][T31329] RAX: ffffffffffffffda RBX: 000000000050c900 RCX: 000000000045ca69 [ 544.404485][T31329] RDX: 000000000000049e RSI: 0000000020000980 RDI: 0000000000000004 [ 544.412476][T31329] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 544.420441][T31329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 544.428432][T31329] R13: 0000000000000cea R14: 00000000004cf3af R15: 00007f7af1f8f6d4 05:09:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xffffff7f00000000) [ 544.502118][T31323] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 544.539089][T31323] minix_free_inode: bit 1 already cleared [ 544.854998][ T7171] minix_free_inode: bit 1 already cleared 05:09:56 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}], 0x1c) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="00574614c701fb67ba6b16e6000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x7b, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0x8) 05:09:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0xffffffff00000000) 05:09:56 executing program 1 (fault-call:3 fault-nth:1): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) 05:09:56 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r5) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x7, 0xfff}, {0x10001, 0x4}], r5}, 0x18, 0x1) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r6, r6, 0x0, 0xa198) [ 544.977500][T31360] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 544.992195][T31360] FAULT_INJECTION: forcing a failure. [ 544.992195][T31360] name failslab, interval 1, probability 0, space 0, times 0 [ 545.012664][T31360] CPU: 1 PID: 31360 Comm: syz-executor.1 Not tainted 5.7.0-rc7-syzkaller #0 [ 545.021558][T31360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.031970][T31360] Call Trace: [ 545.035294][T31360] dump_stack+0x1e9/0x30e [ 545.039631][T31360] should_fail+0x433/0x5b0 [ 545.044362][T31360] ? mempool_alloc_slab+0x49/0x70 [ 545.049380][T31360] should_failslab+0x5/0x20 [ 545.053894][T31360] kmem_cache_alloc+0x53/0x2d0 [ 545.058767][T31360] mempool_alloc_slab+0x49/0x70 [ 545.063613][T31360] ? mempool_free+0x380/0x380 [ 545.068323][T31360] mempool_alloc+0xf1/0x5a0 [ 545.072925][T31360] bio_alloc_bioset+0x1af/0x5d0 [ 545.077785][T31360] ? __test_set_page_writeback+0x9c6/0xba0 [ 545.083702][T31360] submit_bh_wbc+0x1c7/0x6d0 [ 545.088557][T31360] __block_write_full_page+0x8bb/0xfb0 [ 545.094044][T31360] ? mark_buffer_write_io_error+0x160/0x160 [ 545.100041][T31360] ? minix_prepare_chunk+0x30/0x30 [ 545.105238][T31360] __writepage+0x60/0xd0 [ 545.109565][T31360] write_cache_pages+0x8bb/0xda0 [ 545.114506][T31360] ? generic_writepages+0xd0/0xd0 [ 545.119721][T31360] do_writepages+0x127/0x1f0 [ 545.124407][T31360] __filemap_fdatawrite_range+0x2a5/0x350 [ 545.130151][T31360] file_write_and_wait_range+0xed/0x1a0 [ 545.135703][T31360] __generic_file_fsync+0x6e/0x190 [ 545.140829][T31360] generic_file_fsync+0x6f/0xf0 [ 545.145683][T31360] generic_file_write_iter+0x599/0x650 [ 545.151276][T31360] __vfs_write+0x54c/0x710 [ 545.155831][T31360] vfs_write+0x274/0x580 [ 545.161060][T31360] ksys_write+0x11b/0x220 [ 545.165401][T31360] do_syscall_64+0xf3/0x1b0 [ 545.169910][T31360] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 545.175992][T31360] RIP: 0033:0x45ca69 [ 545.180086][T31360] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.199885][T31360] RSP: 002b:00007f7af1f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 545.208305][T31360] RAX: ffffffffffffffda RBX: 000000000050c900 RCX: 000000000045ca69 [ 545.216280][T31360] RDX: 000000000000049e RSI: 0000000020000980 RDI: 0000000000000004 [ 545.224281][T31360] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 545.232259][T31360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 545.240355][T31360] R13: 0000000000000cea R14: 00000000004cf3af R15: 00007f7af1f8f6d4 05:09:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) socket$l2tp6(0xa, 0x2, 0x73) accept4(r2, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 545.278346][T31360] attempt to access beyond end of device [ 545.284248][T31360] loop1: rw=2049, want=6434, limit=52 [ 545.291586][T31360] buffer_io_error: 8 callbacks suppressed [ 545.291595][T31360] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 545.312177][T31363] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 545.313265][T31360] attempt to access beyond end of device [ 545.327762][T31360] loop1: rw=2049, want=6436, limit=52 [ 545.334211][T31360] Buffer I/O error on dev loop1, logical block 3217, lost async page write [ 545.363428][ T7171] minix_free_inode: bit 1 already cleared [ 545.374504][T31369] attempt to access beyond end of device [ 545.381823][T31369] loop3: rw=2049, want=6434, limit=52 [ 545.387234][T31369] Buffer I/O error on dev loop3, logical block 3216, lost async page write 05:09:57 executing program 1 (fault-call:3 fault-nth:2): open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 545.501297][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 545.501305][ T28] audit: type=1800 audit(1590988197.094:1048): pid=31384 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15903 res=0 [ 545.538595][T31369] attempt to access beyond end of device 05:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r3, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@empty}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xe9c9dc5166c41437}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'lo\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x9}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'bridge_slave_1\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'wg0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c4a6f89ec5495d587800", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) r9 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r9, 0x84, 0x7b, &(0x7f0000000100)={r8}, &(0x7f0000000040)=0x8) 05:09:57 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1a5) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffd) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) ioctl$SNDCTL_DSP_GETODELAY(r1, 0x80045017, &(0x7f0000000040)) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}, {&(0x7f0000000100)="c5eb219e7271eef51c03b215e4f41650a4486d8eaf", 0x15}, {&(0x7f0000000140)="d60a", 0x2}], 0x4}}], 0x1, 0x0) [ 545.556252][T31369] loop3: rw=2049, want=6436, limit=52 [ 545.563758][T31384] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 545.583475][T31369] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 545.600187][T31384] attempt to access beyond end of device [ 545.663184][T31384] loop1: rw=2049, want=6434, limit=52 [ 545.685705][T31384] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 545.703359][T31384] FAULT_INJECTION: forcing a failure. [ 545.703359][T31384] name failslab, interval 1, probability 0, space 0, times 0 [ 545.740755][T31384] CPU: 0 PID: 31384 Comm: syz-executor.1 Not tainted 5.7.0-rc7-syzkaller #0 [ 545.749464][T31384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.759516][T31384] Call Trace: [ 545.762805][T31384] dump_stack+0x1e9/0x30e [ 545.767138][T31384] should_fail+0x433/0x5b0 [ 545.771554][T31384] ? mempool_alloc_slab+0x49/0x70 [ 545.776567][T31384] should_failslab+0x5/0x20 [ 545.781087][T31384] kmem_cache_alloc+0x53/0x2d0 [ 545.785852][T31384] mempool_alloc_slab+0x49/0x70 05:09:57 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="000092d0dbc8befb0000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000300)=r4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000340)=r4, 0x12) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) statx(r2, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000240)) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000980)=ANY=[], 0x49e) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r5, 0x40505330, &(0x7f00000001c0)={{0x4, 0x4}, {0xf8, 0x91}, 0x5, 0x1, 0x5}) sendfile(r5, r5, 0x0, 0xa198) [ 545.790697][T31384] ? mempool_free+0x380/0x380 [ 545.795368][T31384] mempool_alloc+0xf1/0x5a0 [ 545.799883][T31384] ? generic_make_request+0x102/0x980 [ 545.805253][T31384] bio_alloc_bioset+0x1af/0x5d0 [ 545.810099][T31384] ? wbc_account_cgroup_owner+0xb4/0x310 [ 545.815726][T31384] submit_bh_wbc+0x1c7/0x6d0 [ 545.820319][T31384] __block_write_full_page+0x8bb/0xfb0 [ 545.825775][T31384] ? mark_buffer_write_io_error+0x160/0x160 [ 545.831659][T31384] ? minix_prepare_chunk+0x30/0x30 [ 545.836770][T31384] __writepage+0x60/0xd0 05:09:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x40008, 0x513402) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x1, 0x1000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x2, r5, 0x1c, 0x1, @in={0x2, 0x4e24, @loopback}}}, 0xa0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = accept4(r2, 0x0, 0x0, 0x0) connect$phonet_pipe(r1, &(0x7f0000000140)={0x23, 0x7, 0xbb, 0x9}, 0x10) sendmmsg$sock(r6, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 545.841006][T31384] write_cache_pages+0x8bb/0xda0 [ 545.845945][T31384] ? generic_writepages+0xd0/0xd0 [ 545.850981][T31384] do_writepages+0x127/0x1f0 [ 545.855573][T31384] __filemap_fdatawrite_range+0x2a5/0x350 [ 545.861297][T31384] file_write_and_wait_range+0xed/0x1a0 [ 545.866837][T31384] __generic_file_fsync+0x6e/0x190 [ 545.871949][T31384] generic_file_fsync+0x6f/0xf0 [ 545.876796][T31384] generic_file_write_iter+0x599/0x650 [ 545.882259][T31384] __vfs_write+0x54c/0x710 [ 545.886683][T31384] vfs_write+0x274/0x580 05:09:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000040)=0x9) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-arm64-ce\x00'}, 0x95) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000180)=0x101, 0x4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) fsetxattr(r5, &(0x7f0000000100)=@random={'user.', 'posix_acl_access\x00'}, &(0x7f0000000140)='vmnet0mime_typeGPL\\\x00', 0x14, 0x2) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r6 = socket$pptp(0x18, 0x1, 0x2) r7 = accept4(r6, 0x0, 0x0, 0x800) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000000)="a53aea82809f228814dc833bc56a734ab2706288160258bde5f3e2da05", 0x1d}], 0x2}}], 0x1, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x4) [ 545.891013][T31384] ksys_write+0x11b/0x220 [ 545.895344][T31384] do_syscall_64+0xf3/0x1b0 [ 545.899845][T31384] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 545.905727][T31384] RIP: 0033:0x45ca69 [ 545.909616][T31384] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.930432][T31384] RSP: 002b:00007f7af1f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 545.938849][T31384] RAX: ffffffffffffffda RBX: 000000000050c900 RCX: 000000000045ca69 [ 545.946845][T31384] RDX: 000000000000049e RSI: 0000000020000980 RDI: 0000000000000004 [ 545.954813][T31384] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 545.963025][T31384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 545.971992][T31384] R13: 0000000000000cea R14: 00000000004cf3af R15: 00007f7af1f8f6d4 [ 545.983390][ T7364] minix_free_inode: bit 1 already cleared 05:09:57 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 546.115446][ T28] audit: type=1800 audit(1590988197.704:1049): pid=31407 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15899 res=0 [ 546.210153][T31407] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 546.251599][T31407] attempt to access beyond end of device [ 546.301070][T31407] loop3: rw=2049, want=6434, limit=52 [ 546.315719][T31384] attempt to access beyond end of device [ 546.322451][T31384] loop1: rw=2049, want=6436, limit=52 [ 546.333587][T31384] Buffer I/O error on dev loop1, logical block 3217, lost async page write [ 546.339268][T31407] Buffer I/O error on dev loop3, logical block 3216, lost async page write 05:09:57 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:57 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) [ 546.367939][ T7171] minix_free_inode: bit 1 already cleared [ 546.414884][T31407] attempt to access beyond end of device [ 546.433307][T31407] loop3: rw=2049, want=6436, limit=52 [ 546.474123][T31407] Buffer I/O error on dev loop3, logical block 3217, lost async page write [ 546.507056][ T28] audit: type=1800 audit(1590988198.094:1050): pid=31426 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15910 res=0 [ 546.548421][T31413] attempt to access beyond end of device [ 546.554098][T31413] loop3: rw=0, want=6434, limit=52 [ 546.574790][T31413] Buffer I/O error on dev loop3, logical block 3216, async page read 05:09:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r6, 0x2) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, &(0x7f0000000000)) [ 546.594112][T31426] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 546.624504][T31413] attempt to access beyond end of device [ 546.698412][T31413] loop3: rw=0, want=6436, limit=52 [ 546.703591][T31413] Buffer I/O error on dev loop3, logical block 3217, async page read [ 546.731124][T31438] attempt to access beyond end of device [ 546.736791][T31438] loop3: rw=0, want=6434, limit=52 05:09:58 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x1001) [ 546.773746][ T7171] minix_free_inode: bit 1 already cleared [ 546.775729][T31438] attempt to access beyond end of device 05:09:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r4, 0x200, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20048881) 05:09:58 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x0, &(0x7f0000000600), 0x16ee2b7b08552527, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0x49e) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) tee(0xffffffffffffffff, r0, 0x8820000, 0x8) setuid(r4) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000300), 0x802024, &(0x7f0000000340)={[{@usrquota='usrquota'}, {@bsdgroups='bsdgroups'}], [{@obj_type={'obj_type', 0x3d, 'vboxnet0}}security\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@fsmagic={'fsmagic', 0x3d, 0x20}}, {@fowner_gt={'fowner>', r4}}]}) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r2, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=@random={'trusted.', 'vboxnet0}}security\x00'}, &(0x7f0000000200)='minix\x00', 0x6, 0x1) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x76, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000100)={{0x2, 0x4e24, @private=0xa010102}, {0x6, @multicast}, 0xe, {0x2, 0x4e23, @rand_addr=0x64010100}, 'veth0_virt_wifi\x00'}) sendfile(r1, r1, 0x0, 0xa198) [ 546.828145][T31438] loop3: rw=0, want=6436, limit=52 [ 546.838631][ T28] audit: type=1800 audit(1590988198.434:1051): pid=31438 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=1 res=0 [ 546.928231][ T7364] minix_free_inode: bit 1 already cleared [ 546.974521][ T28] audit: type=1800 audit(1590988198.564:1052): pid=31455 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15859 res=0 [ 547.008226][T31455] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 547.014296][ T28] audit: type=1800 audit(1590988198.594:1053): pid=31459 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15899 res=0 [ 547.076998][T31465] attempt to access beyond end of device [ 547.100474][T31465] loop1: rw=2049, want=6434, limit=52 [ 547.119924][T31465] attempt to access beyond end of device [ 547.141006][T31465] loop1: rw=2049, want=6436, limit=52 [ 547.178507][T31465] attempt to access beyond end of device [ 547.184321][T31465] loop1: rw=2049, want=6438, limit=52 [ 547.234640][T31465] attempt to access beyond end of device [ 547.261826][T31465] loop1: rw=2049, want=6440, limit=52 [ 547.278049][T31465] attempt to access beyond end of device [ 547.296332][T31465] loop1: rw=2049, want=6442, limit=52 [ 547.321079][T31465] attempt to access beyond end of device [ 547.338391][T31465] loop1: rw=0, want=6442, limit=52 [ 547.343758][ T28] audit: type=1800 audit(1590988198.934:1054): pid=31465 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=1 res=0 [ 547.425813][ T7171] minix_free_inode: bit 1 already cleared 05:09:59 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0xfdef) 05:09:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) 05:09:59 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x49e) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x76, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00') r5 = socket$inet6(0xa, 0x800000000000002, 0x0) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@empty, r7}, 0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r4, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xef3d3b6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x4c}}, 0x20008804) sendfile(r0, r0, 0x0, 0xa198) 05:09:59 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvme-fabrics\x00', 0x8c440, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000001c0)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="8d0b11ceba6682dbf8fac112f8b5af942fec62526b96f9fffffff7b54e9a63a0b6d0c6628d04a86f1a11369f94ba", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x76, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, r8, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x5, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x194, r8, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x134, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffff7f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x41d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x40, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}]}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x400c014}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="000a14f2bf850000c0337896c7474f82f72066a96ddedcda9c84e0ac452abc97952f60b57b253a329930d9793bd3485b818d2ca62c7a38d549e3e907d7b84971a93faac7aab28bd30000000000000000000000000000000000dd", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) ioctl$HIDIOCSFEATURE(0xffffffffffffffff, 0xc0404806, &(0x7f0000000500)="35641642690f6b868a1ee375c23e8b635a77d141c9285544af00e72b538ea91ab20f0b0ee809e42ee4cf14f68145ff34bd0e0281ccddd2d3a5ab2bb18d8601ba396ded6d2ebd6c38fd942735491f317aa37503d5584a66d2dae89ed129d8dae802e8e49e172b9c2c204716cc96e0308ba86902effc62d981f60dbe43903f2050e427321f773be032b813ffb2f816320d93167ee2a370308d84733725ae06185bf4874daf595ba4ce3a5b7a1d22d2ddecd5adadba8f50d7af5d5fb60131a8b140c1fc2434866fd3a0186c9e0348adbfa39bd65696e618860a") getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x7b, &(0x7f0000000100)={r5}, &(0x7f0000000040)=0x8) [ 547.663371][ T28] audit: type=1800 audit(1590988199.254:1055): pid=31476 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15925 res=0 05:09:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000000)=""/97) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_GET_SREGS(r7, 0x8138ae83, &(0x7f0000000100)) [ 547.707578][T31476] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 547.726485][T31478] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 547.759544][T31476] ================================================================== [ 547.767924][T31476] BUG: KASAN: null-ptr-deref in get_block+0x916/0x1600 [ 547.774772][T31476] Write of size 8 at addr 0000000000000000 by task syz-executor.1/31476 [ 547.783082][T31476] [ 547.785413][T31476] CPU: 0 PID: 31476 Comm: syz-executor.1 Not tainted 5.7.0-rc7-syzkaller #0 [ 547.794072][T31476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.804120][T31476] Call Trace: [ 547.807410][T31476] dump_stack+0x1e9/0x30e [ 547.811738][T31476] __kasan_report+0x122/0x1a0 [ 547.816408][T31476] ? get_block+0x916/0x1600 [ 547.820905][T31476] ? get_block+0x916/0x1600 [ 547.825404][T31476] kasan_report+0x4d/0x80 [ 547.829733][T31476] ? check_memory_region+0x2b5/0x2f0 [ 547.835011][T31476] ? get_block+0x916/0x1600 [ 547.839529][T31476] ? minix_get_block+0x90/0xf0 [ 547.844288][T31476] ? __block_write_begin_int+0x708/0x1a00 [ 547.850018][T31476] ? minix_prepare_chunk+0x30/0x30 [ 547.855121][T31476] ? wait_for_stable_page+0x10f/0x150 [ 547.860487][T31476] ? minix_prepare_chunk+0x30/0x30 [ 547.865590][T31476] ? block_write_begin+0x59/0x280 [ 547.870608][T31476] ? minix_write_begin+0x38/0x1f0 [ 547.875628][T31476] ? generic_perform_write+0x23b/0x4e0 [ 547.881095][T31476] ? __generic_file_write_iter+0x22b/0x4e0 [ 547.886893][T31476] ? down_write+0xcd/0x130 [ 547.891313][T31476] ? generic_file_write_iter+0x4a6/0x650 [ 547.896951][T31476] ? __vfs_write+0x54c/0x710 [ 547.901552][T31476] ? vfs_write+0x274/0x580 [ 547.905973][T31476] ? ksys_write+0x11b/0x220 [ 547.910477][T31476] ? do_syscall_64+0xf3/0x1b0 [ 547.915272][T31476] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 547.921342][T31476] ================================================================== [ 547.929423][T31476] Disabling lock debugging due to kernel taint [ 547.959646][T31478] attempt to access beyond end of device [ 547.972819][ T28] audit: type=1800 audit(1590988199.294:1056): pid=31478 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15926 res=0 [ 547.982999][T31478] loop3: rw=2049, want=6434, limit=52 [ 548.043132][T31478] attempt to access beyond end of device [ 548.050495][T31478] loop3: rw=2049, want=6436, limit=52 [ 548.056011][T31491] attempt to access beyond end of device [ 548.064942][T31491] loop3: rw=0, want=6434, limit=52 [ 548.071041][T31491] attempt to access beyond end of device [ 548.082206][T31491] loop3: rw=0, want=6436, limit=52 [ 548.118933][T31491] attempt to access beyond end of device [ 548.125276][T31491] loop3: rw=0, want=6434, limit=52 [ 548.138342][T31491] attempt to access beyond end of device [ 548.143986][T31491] loop3: rw=0, want=6436, limit=52 05:09:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\x00', 0x0, 0x4000000, &(0x7f00006f7000)={0x2, 0xfffe, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x76, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000100)="7b301c14b7be91ec6d35498152806aaa9c65b3a40ea3d8d6fe33cfd788d30c045d84f9260c04a97b003e835acc3a9c9d6abd129beddc0ed32e7b4f9937caa390d5d12f3b20ae16703acb34f5482d956580efe3bab7ec389e554123b7b402a9a193ea313571814ca5429219aa261b12fa3bd61bb72610a7a82a0abccb54c4caf46656e6a22f3c3d4d623bcd2dbaa6b732c9d88b1bd0c0a91a61c804218fe62ffeab0b191aadb813c25ad579bb44bc42c7d9741b2ae9d54f0ae598c19623d15ace244815b3ce34798875d1128fc0bc6147239e2b80b3ab0b2275d336917fabc5e25038", 0xe2) r7 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x18f140, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@empty}, 0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x1, 0x6, @multicast}, 0x10) getsockopt$bt_sco_SCO_CONNINFO(r8, 0x11, 0x2, &(0x7f0000000040)=""/23, &(0x7f0000000200)=0x17) [ 548.161193][ T28] audit: type=1800 audit(1590988199.754:1057): pid=31491 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=1 res=0 [ 548.161227][T31478] attempt to access beyond end of device [ 548.230188][T31478] loop3: rw=0, want=6436, limit=52 05:09:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 548.264754][T31508] attempt to access beyond end of device [ 548.271970][T31508] loop3: rw=0, want=6434, limit=52 [ 548.291486][T31508] attempt to access beyond end of device [ 548.311010][T31508] loop3: rw=0, want=6436, limit=52 05:10:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="58173032727fdcbebe9f8ff3ed", 0xd) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="64f4fc1422c96c274ce0348c5ca549a0", 0x10}, {&(0x7f0000000340)='\'', 0x1}], 0x2}}], 0x1, 0x0) [ 548.362562][ T7364] minix_free_inode: bit 1 already cleared [ 548.401173][T31476] Kernel panic - not syncing: panic_on_warn set ... 05:10:00 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x76, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x8) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0x49e) sendfile(r2, r2, 0x0, 0xa198) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000980)=""/4096) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) getsockopt$inet_opts(r6, 0x0, 0x0, &(0x7f00000001c0)=""/126, &(0x7f0000000100)=0x7e) [ 548.407799][T31476] CPU: 0 PID: 31476 Comm: syz-executor.1 Tainted: G B 5.7.0-rc7-syzkaller #0 [ 548.417849][T31476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.427907][T31476] Call Trace: [ 548.431218][T31476] dump_stack+0x1e9/0x30e [ 548.435542][T31476] panic+0x264/0x7a0 [ 548.439425][T31476] ? trace_hardirqs_on+0x30/0x70 [ 548.444359][T31476] __kasan_report+0x191/0x1a0 [ 548.449019][T31476] ? get_block+0x916/0x1600 [ 548.453493][T31476] ? get_block+0x916/0x1600 [ 548.457965][T31476] kasan_report+0x4d/0x80 [ 548.462276][T31476] ? check_memory_region+0x2b5/0x2f0 [ 548.467529][T31476] ? get_block+0x916/0x1600 [ 548.472022][T31476] ? minix_get_block+0x90/0xf0 [ 548.476766][T31476] ? __block_write_begin_int+0x708/0x1a00 [ 548.482468][T31476] ? minix_prepare_chunk+0x30/0x30 [ 548.487565][T31476] ? wait_for_stable_page+0x10f/0x150 [ 548.492907][T31476] ? minix_prepare_chunk+0x30/0x30 [ 548.497986][T31476] ? block_write_begin+0x59/0x280 [ 548.502978][T31476] ? minix_write_begin+0x38/0x1f0 [ 548.507972][T31476] ? generic_perform_write+0x23b/0x4e0 [ 548.513927][T31476] ? __generic_file_write_iter+0x22b/0x4e0 [ 548.520324][T31476] ? down_write+0xcd/0x130 [ 548.524730][T31476] ? generic_file_write_iter+0x4a6/0x650 [ 548.530342][T31476] ? __vfs_write+0x54c/0x710 [ 548.534924][T31476] ? vfs_write+0x274/0x580 [ 548.539325][T31476] ? ksys_write+0x11b/0x220 [ 548.543803][T31476] ? do_syscall_64+0xf3/0x1b0 [ 548.548456][T31476] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 548.555902][T31476] Kernel Offset: disabled [ 548.560258][T31476] Rebooting in 86400 seconds..