000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) 07:24:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x6800000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) r1 = socket$inet(0x2, 0x5, 0x6) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r1, 0x1, 0x3, &(0x7f00000000c0)=0xf9d, 0x4) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x9d1}}, 0x18) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r4, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f1ffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) [ 903.348061] FAT-fs (loop2): bogus number of reserved sectors [ 903.383524] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 903.465645] FAT-fs (loop2): bogus number of reserved sectors [ 903.481046] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b00000ebd00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) dup(r1) 07:24:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0000003600000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x6c00000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x48, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 903.839044] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 903.887649] FAT-fs (loop2): bogus number of reserved sectors [ 903.908380] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)=r0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000"], 0x1258) 07:24:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1200, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 903.971138] FAT-fs (loop2): bogus number of reserved sectors [ 903.986817] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. [ 903.993619] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x4c, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) fstat(0xffffffffffffffff, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x7400000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x1, 0x0) write$FUSE_INTERRUPT(r4, &(0x7f0000000040)={0x10, 0xffffffffffffffda, 0x1}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r5, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) [ 904.151982] FAT-fs (loop2): bogus number of reserved sectors [ 904.178153] FAT-fs (loop2): Can't find a valid FAT filesystem [ 904.243953] FAT-fs (loop2): bogus number of reserved sectors [ 904.265368] FAT-fs (loop2): Can't find a valid FAT filesystem [ 904.508624] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266bd00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1200, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x11, &(0x7f00000002c0)={r4}, &(0x7f0000000400)=0x8) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7ffffc, 0x40010, r7, 0xffffd000) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200400, 0x0) write$FUSE_GETXATTR(r8, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x2}}, 0x18) r9 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r9, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000152f34321482a11cf0148d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/4696], 0x1258) 07:24:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x7a00000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x60, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 904.687634] FAT-fs (loop2): bogus number of reserved sectors [ 904.717087] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2200, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 904.812784] FAT-fs (loop2): bogus number of reserved sectors 07:24:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x42400, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x11, &(0x7f00000002c0)={r4}, &(0x7f0000000400)=0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0xfffffffffffffff5}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r5, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x3504000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 904.858154] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x68, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x8000000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 904.967420] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2300, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 905.037688] FAT-fs (loop3): bogus number of reserved sectors [ 905.057125] FAT-fs (loop3): Can't find a valid FAT filesystem 07:24:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000001be00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x6c, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x5c, 0xfffffffffffffffe, 0x6}, 0x10) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x11, &(0x7f00000002c0)={r4}, &(0x7f0000000400)=0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x110, r1, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r5, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0002670a00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 905.119221] FAT-fs (loop2): bogus number of reserved sectors [ 905.140904] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r4, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x25eb, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 905.267566] FAT-fs (loop2): bogus number of reserved sectors [ 905.294536] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x8a03000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101001, 0x0) read(r2, &(0x7f00000000c0)=""/65, 0x41) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000040)={0xa, {0x1, 0xff, 0xc}}, 0xa) [ 905.393168] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x74, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x260b, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x1e8, 0x0, 0x0, 0x0, 0xc0, 0xc0, 0x150, 0x150, 0x150, 0x150, 0x150, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x4}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x248) [ 905.597067] FAT-fs (loop2): bogus number of reserved sectors [ 905.628048] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) [ 905.825642] FAT-fs (loop2): bogus number of reserved sectors [ 905.835270] FAT-fs (loop2): Can't find a valid FAT filesystem [ 905.851024] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266be00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2804, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x80000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000100)=0x9) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x7, 0x36a00) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x2804000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x8cffffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x7a, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2c00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 906.128156] FAT-fs (loop2): bogus number of reserved sectors [ 906.157190] FAT-fs (loop3): bogus number of reserved sectors [ 906.164691] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) [ 906.183965] FAT-fs (loop3): Can't find a valid FAT filesystem [ 906.284031] FAT-fs (loop2): bogus number of reserved sectors [ 906.297876] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x2ba40200, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r1, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) [ 906.384912] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xec25000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2e04, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 906.606778] FAT-fs (loop2): bogus number of reserved sectors [ 906.628570] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266bf00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) read$FUSE(r3, &(0x7f0000001a40), 0x1000) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r4, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xf0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0002670700000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2f04, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 906.717737] FAT-fs (loop2): bogus number of reserved sectors [ 906.745622] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xf0ffffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 906.790510] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3004, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffff5, 0xfffffffffffffffe}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) [ 906.931943] FAT-fs (loop2): bogus number of reserved sectors [ 906.957727] FAT-fs (loop2): Can't find a valid FAT filesystem [ 907.053148] FAT-fs (loop2): bogus number of reserved sectors [ 907.068175] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xf5ffffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 907.144658] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xf6, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x11, &(0x7f00000002c0)={r7}, &(0x7f0000000400)=0x8) r8 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r8) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x11, &(0x7f00000002c0)={r11}, &(0x7f0000000400)=0x8) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x7b}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000000)={r11, 0x4, 0x20, 0x80000001, 0x1ff}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r12, 0x6}, 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r13 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r13, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3104, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 907.269110] FAT-fs (loop2): bogus number of reserved sectors [ 907.294827] FAT-fs (loop2): Can't find a valid FAT filesystem [ 907.502458] FAT-fs (loop2): bogus number of reserved sectors [ 907.515379] FAT-fs (loop2): Can't find a valid FAT filesystem [ 907.934769] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xf6ffffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:33 executing program 0: openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x10, r0, 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000100)={r4, &(0x7f0000000240)=""/141}) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000180)={0x7, 0x0, [{0x80000000, 0x400, 0x10001, 0x0, 0x19d}, {0x40000000, 0x5, 0x9, 0x3f, 0xfff}, {0x1, 0x1, 0x7ff, 0xc72, 0x1000000}, {0x2, 0xff, 0x0, 0x0, 0x8}, {0x40000000, 0x6, 0x0, 0x6, 0x1ff}, {0x0, 0x6, 0x3, 0x8001, 0x8}, {0xa, 0x0, 0x4, 0x4, 0x8}]}) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) recvfrom$x25(r7, &(0x7f0000000300)=""/99, 0x63, 0x40000022, &(0x7f0000000380)={0x9, @null=' \x00'}, 0x12) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r8, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x2a447, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:33 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3204, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x156, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 908.095189] FAT-fs (loop2): bogus number of reserved sectors [ 908.133673] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xfffffffffffffe09) [ 908.227127] FAT-fs (loop2): bogus number of reserved sectors [ 908.236735] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:33 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3304, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4100, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xffffffffffffffda}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x60, &(0x7f0000001a40)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x220, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xfcfdffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c100000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x2a43b, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 908.472276] FAT-fs (loop2): bogus number of reserved sectors [ 908.502236] FAT-fs (loop2): Can't find a valid FAT filesystem [ 908.578037] FAT-fs (loop2): bogus number of reserved sectors [ 908.583918] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x11, &(0x7f00000002c0)={r5}, &(0x7f0000000400)=0x8) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000180)) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r6) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x11, &(0x7f00000002c0)={r9}, &(0x7f0000000400)=0x8) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', r10}) 07:24:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3404, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xfdfdffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x300, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c200000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x2a412, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 908.807803] FAT-fs (loop2): bogus number of reserved sectors [ 908.816420] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3504, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:34 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x5, @local}], 0x1c) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e24, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x11, &(0x7f00000002c0)={r3}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r4, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x7fffff, 0x10, r4, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) sendto$inet(r11, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$KVM_SET_GUEST_DEBUG(r11, 0x4048ae9b, &(0x7f0000000180)={0x10001, 0x0, [0x3ff, 0xfffffffffffffffd, 0x780f, 0x9, 0x7, 0x95, 0x1, 0x4]}) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x3) r12 = socket$inet(0x2, 0x4000000805, 0x0) r13 = socket$inet_sctp(0x2, 0x5, 0x84) r14 = dup3(r12, r13, 0x0) sendto$inet(r14, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$TIOCCONS(r14, 0x541d) ioctl$NBD_CLEAR_QUE(r14, 0xab05) setsockopt$IPT_SO_SET_REPLACE(r5, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f0a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000320d686da0f3d0e109000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/4696], 0x1258) [ 908.935668] FAT-fs (loop2): bogus number of reserved sectors [ 908.948959] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xfeffffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 909.005431] nla_parse: 2 callbacks suppressed [ 909.005443] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x3aa, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x5601, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 909.120941] FAT-fs (loop2): bogus number of reserved sectors [ 909.133622] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c300000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3604, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:34 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r1, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) [ 909.217730] FAT-fs (loop2): bogus number of reserved sectors [ 909.241936] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x500, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 909.270976] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x3f00, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xff07040000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:34 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x2400, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000240)={0x12, &(0x7f0000000200)="c70bb3f8dc4ea14f3de9a275803515832576"}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180)=0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0xffffffffffffffda}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r1, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0xd03200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000002c0)={0x24a0, 0x0, 0x10001, 0x8001}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000300)={0x5, r3}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f0000000000)={0x9, 0xc, 0x4, 0x42404004, 0x562, {0x0, 0x2710}, {0x4, 0xc, 0x12, 0x9, 0x8, 0x84, "ef515bdc"}, 0xffffffff, 0x4, @offset=0x7fffffff}) setsockopt$IPT_SO_SET_REPLACE(r4, 0x104000000000000, 0x60, &(0x7f0000001a40)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d5a9e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000167aebdbbd453bb4e47019b200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000313bf5f78cc2c20000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf8a1c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000026d69dde0de0bd0500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7f8d65f57f59ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/4699], 0x1258) 07:24:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3704, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bc266020000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 909.446581] FAT-fs (loop2): bogus number of reserved sectors [ 909.472090] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x103, 0x4, {0x7, 0x100, 0xffff5c2a, 0x10001}}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x7fffff, 0x2010, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bffffffc300000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x600, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 909.568791] FAT-fs (loop2): bogus number of reserved sectors [ 909.574640] FAT-fs (loop2): Can't find a valid FAT filesystem [ 909.576362] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xff0f000000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x11, &(0x7f00000002c0)={r4}, &(0x7f0000000400)=0x8) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f0000001a40)=@raw={'raw\x00', 0x2, 0x3, 0x1238, 0x10c8, 0x0, 0x10c8, 0x10c8, 0x10c8, 0x11a0, 0x11a0, 0x11a0, 0x11a0, 0x11a0, 0x3, 0x0, {[{{@ip={@empty, @local, 0xffffff00, 0xffffffff, 'veth0_macvtap\x00', 'bridge_slave_0\x00', {}, {0xff}, 0x29, 0x3, 0x50}, 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x1, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x2, 0x7ff, 0x8a5, 0x69, 'syz1\x00', 'syz0\x00', {0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1298) 07:24:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3804, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 909.784789] FAT-fs (loop2): bogus number of reserved sectors [ 909.818207] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x11, &(0x7f00000002c0)={r5}, &(0x7f0000000400)=0x8) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x6) [ 909.867197] FAT-fs (loop2): bogus number of reserved sectors [ 909.875534] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xffff1f0000000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x27fffff, 0x10, r0, 0xffffe000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) [ 910.135752] FAT-fs (loop2): bogus number of reserved sectors [ 910.158345] FAT-fs (loop2): Can't find a valid FAT filesystem [ 910.173435] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3904, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 910.240162] FAT-fs (loop2): bogus number of reserved sectors [ 910.255817] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xffffff7f00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 910.457187] FAT-fs (loop2): bogus number of reserved sectors [ 910.488114] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bc266020000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r6, 0x1, 0x0, 0x0, {{}, {0x0, 0x4c}, {0x3, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8220}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x30, r6, 0x8, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x400, @bearer=@udp='udp:syz1\x00'}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r7) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x11, &(0x7f00000002c0)={r10}, &(0x7f0000000400)=0x8) r11 = socket$inet(0x2, 0x4000000805, 0x0) r12 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r11, r12, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r11, 0x84, 0x3, &(0x7f0000000200)=0x5, 0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r7, 0x84, 0x7, &(0x7f0000000000)={0x41}, 0x4) [ 910.576865] FAT-fs (loop2): bogus number of reserved sectors [ 910.593110] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c400000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3f00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x700, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 910.625059] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xffffffff00000000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x11, &(0x7f00000002c0)={r6}, &(0x7f0000000400)=0x8) ioctl$USBDEVFS_SETINTERFACE(r2, 0x80085504, &(0x7f0000000040)={0xfffffff2, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f0000001bc0)=ANY=[@ANYRESDEC=r5], 0x1) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0xfffc, 0x1ff, 0x0, 0x6, 0x1, 0x27, 0x17, "a15db1c199c38f3703df19b9fd2909f2d7c69a97", "a0f23f367a997c8dff341899506ead33e4f4467f"}) [ 910.819381] FAT-fs (loop2): bogus number of reserved sectors [ 910.833780] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 910.931254] FAT-fs (loop2): bogus number of reserved sectors [ 910.949618] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1e1400, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x104000000000000, 0x60, &(0x7f0000001b00)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000004aa83a287362eadfe503564d5024fdd49d68dd437128031e08bb0d511a7e35b7371b461d5e85c51edffbdde2a3ea04651bf34d6c562ee901d471427cca8ae5df61757a3015801c7195001c5efaac727f33193060dae829c7d3209831f1e34352ecb054d64a7b2db68289a61f79b41633ff25af07470a4fe155cb8a7771b02455ac53edf4f2e29f664efb8386fde4276f4428d4"], 0x1258) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r9 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r9) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r13 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r13) r14 = socket$inet(0x2, 0x4000000805, 0x0) r15 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r14, r15, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r15, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r15, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r13, 0x84, 0x11, &(0x7f00000002c0)={r16}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r13, 0x84, 0x11, &(0x7f00000003c0)={r12}, &(0x7f0000000400)=0x8) r17 = getpid() sched_setscheduler(r17, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r17, 0xba, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000180)={0x5, 0x2, {r17}, {0xee01}, 0x76f, 0x7}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@empty, @in=@multicast1}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000300)=0xe8) fstat(r3, &(0x7f0000000340)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1820061, &(0x7f0000001a40)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@uname={'uname', 0x3d, 'security]-'}}, {@version_u='version=9p2000.u'}, {@privport='privport'}, {@dfltuid={'dfltuid', 0x3d, r18}}, {@mmap='mmap'}]}}) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x11, &(0x7f00000002c0)={r19}, &(0x7f0000000400)=0x8) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x1a) 07:24:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xffffffffa0008000}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4001, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 911.160917] FAT-fs (loop2): bogus number of reserved sectors [ 911.182116] FAT-fs (loop2): Can't find a valid FAT filesystem [ 911.188176] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x900, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 911.266824] FAT-fs (loop2): bogus number of reserved sectors [ 911.276716] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x2002, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c500000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x80a, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x11, &(0x7f00000002c0)={r6}, &(0x7f0000000400)=0x8) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x1d) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0xffffffffffffffff}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4800, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 911.487243] FAT-fs (loop2): bogus number of reserved sectors 07:24:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x11, &(0x7f00000002c0)={r4}, &(0x7f0000000400)=0x8) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x41, 0x400) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x40000000011, r0, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r6) r7 = socket$inet(0x2, 0x4000000805, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}]}, &(0x7f00000001c0)=0x10) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) dup3(r7, r6, 0x80000) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x11, &(0x7f00000002c0)={r9}, &(0x7f0000000400)=0x8) ioctl$IOC_PR_PREEMPT_ABORT(r6, 0x401870cc, &(0x7f0000000040)={0x400, 0x1000, 0x9, 0x101}) setsockopt$IPT_SO_SET_REPLACE(r5, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) [ 911.551701] FAT-fs (loop2): Can't find a valid FAT filesystem 07:24:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4c00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 911.671784] FAT-fs (loop2): bogus number of reserved sectors [ 911.692763] FAT-fs (loop2): Can't find a valid FAT filesystem [ 911.702400] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xa00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x700, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x3, &(0x7f00000002c0)=[{&(0x7f00000000c0)="f8896d58bb919fc0950e7e655b8e63ff332a8f1c7e91c6150018fca5362b71c035e270eac5aeb07967e772d9bf64d0c8e54fac6899686716f7aa1c194849a2ecb80c774f809af6ec3b35c551d8575b093db7fe", 0x53, 0x101}, {&(0x7f0000000180)="9ab694ffcc2224e0a465d09b821417ff4e8a4af13d7d5da44f50f598ef6d044d1c38ef7a94b0eb8a5370c6a04d282ec5d1a9742e869a600d811da6c259fc1ee4c4502d74616c4cafa7b1f7547d54dcd583e62252cf1eb82e9f3a17e6089e8b910c2e91fc9459457fff2474497cbb1882a87af4785935f29c287980158c15fd0692b4f2fa46d5730ebae410237faa64de0ead30d6f9c84f4b7a078aa026fdcd0722f64aff0234ff94ce47212e83c0975ba21a278d19ef29120832cc3ac747d2b665d1d5cc4acde166", 0xc8, 0x5}, {&(0x7f0000000280)="83963fc638de86", 0x7, 0x5}], 0x400, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000340)={@dev={0xac, 0x14, 0x14, 0x36}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x2, [@rand_addr=0xffff8c57, @rand_addr=0x10001]}, 0x18) 07:24:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6800, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 912.185118] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c600000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xb00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) arch_prctl$ARCH_GET_CPUID(0x1011) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x10010, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f0000001a40)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000be577f9ba7ef3caf5f4ac3e9d070a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000052bec89b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d905c50694cbdf580000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/4708], 0x1258) finit_module(r0, &(0x7f0000000000)='wlan1\x00', 0x2) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/46) io_setup(0x9, &(0x7f00000000c0)=0x0) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r5) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x11, &(0x7f00000002c0)={r8}, &(0x7f0000000400)=0x8) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x200, 0x0) r12 = socket$inet(0x2, 0x4000000805, 0x0) r13 = socket$inet_sctp(0x2, 0x5, 0x84) r14 = dup3(r12, r13, 0x0) sendto$inet(r14, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) io_submit(r4, 0x5, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x4, r5, &(0x7f0000000100)="217526655c260d2bc1b51581f08ef9fb7ddcd3e595e56cd5bb2a3cc4af70bc121e98450b1b447986602a7eba175a5a0eb78e64a663b3e37bee", 0x39, 0x81, 0x0, 0x3, r0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x9, r10, &(0x7f00000001c0)="8923de98048b4e2d3e08970eed2bea945bcd36d5bb5f83c710350ba2586fbd2127b60af3943841e0ab628afbf359523e7640bcaf489b99d2e314399a6f7739fe3f00e8ee79a88c2fa5c94f01f79db27c6ceb53b4d8669cc7b7a317c4d875a4a754d986dcb12c8c3d6ad69e3d95c2e92448848b14a604184aa8c017e6c232429279af296bfa4d981c1577d40fdcbaeece5114fd11bf40251e6b619dab4e73c1f601d33c848861c6263bcd4537d82a59a265441f2bd753cd53d87e44106dc3199358673f44cc7469bfdfa09771b7e4c3e1f5136ffb6b8a29cedb9e5d26197f9ddff9cbc4c08d89bbc9332ef767d44039c625a59724736a8c03", 0xf8, 0x7, 0x0, 0x3, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x1ff, r0, &(0x7f0000000300)="4e457c877f0e14611f7036eaec5b6fc3d4128a34730430fef8dc887c7dd2998d1510e7c843f93853864011832923791cace2a28888eeb7d62c06b8e9a2091f33c06bb521d9388735e9e4e7dac578e23a78705c7601d10a9e4ac98c4ee445297dcc1fa780ba67090e36aa6dda5064be7547", 0x71, 0x9, 0x0, 0x2, r11}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x81, r2, &(0x7f0000000400)="687af8d0373c6e5e28dfcf0c8dc9885230f0ded5bab9167e060232150bf2ff5a", 0x20, 0x3, 0x0, 0x3, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0xdb, r14, &(0x7f0000000480)="aa18e467f52897918118c5e6e5be3065525c0d689791920b4255e7f58303", 0x1e, 0xfffffffffffffffc, 0x0, 0x0, r0}]) r15 = dup3(r2, r3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r15, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$DRM_IOCTL_GET_STATS(r15, 0x80f86406, &(0x7f0000000000)) 07:24:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0081000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6c00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 912.337052] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xc00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7400, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x5, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x103002, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x44, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFACCT_PKTS={0xc}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x800}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3ff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1000}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000096dc7a509c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x1258) 07:24:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7701, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f0000001a40)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000492f680000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ccbc900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000095dd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055cdc3929c923cdb14ad031f03694d7300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003d3947d4d806a9ab000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/4699], 0x1258) [ 912.887438] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c700000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004aa05f4cbf31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feff"], 0x1258) 07:24:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7a00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0081000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xe00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x0, 0x1c, 0x0, "c7c7480fe2283f0bf8fc3225c5b833c5b8dd102dbe3be828461e3bcf0bb032aaab37eea5af2e2c7db753bff68c296cc62032ad567d0ea434e76a9028408b60756732b98e5f0682b32fa3bf4e66c1037c"}, 0xd8) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x11, &(0x7f00000002c0)={r5}, &(0x7f0000000400)=0x8) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f00000001c0)={{0x1, @name="60d13cc8a5d8d9d0155bdfb89a7fe5a8f4203ca421911e2178413f2c2b442f25"}, "52de9468937d465bdb8ee1e7604dc17f518d78a44f6070fe8f6597241c6c21ea", 0x4}) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x7f, 0x2, 0x400}) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r6) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x11, &(0x7f00000002c0)={r9}, &(0x7f0000000400)=0x8) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f0000000300)) 07:24:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8a03, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="02fcff00", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x11, &(0x7f00000002c0)={r4}, &(0x7f0000000400)=0x8) getsockname(r1, &(0x7f0000003ec0)=@can={0x1d, 0x0}, &(0x7f0000003f40)=0x80) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000003f80)=r5) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400080, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r6, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) 07:24:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x9, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xeb25, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 914.060121] nla_parse: 2 callbacks suppressed [ 914.060130] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c800000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) inotify_rm_watch(r0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x8, 0x2) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x11, &(0x7f00000002c0)={r5}, &(0x7f0000000400)=0x8) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000180)=ANY=[@ANYBLOB="0600005c48472c3c921c00000000000600000003000000000000000000000001000000000000001f0000000000000000020000000000000101000004000000000000000100000000000000000000000300000009000000000000000000000000000000000000000000000000000000000000800100000000000000000000000700000029040000020000000300000000000000000000000000000000000000fbffffff0300000000fc000000000000050000008100000000000000000000000000000000000000000000000000000005000000020000000000000000000000fcffffff20000000000000000000000000000000000000000000000000000000030000000300000000000000000000008fa30000000000000500000000000000030000000000000001"]) 07:24:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xedc0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0081000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xf53, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 914.252648] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 914.296915] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xff0f, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x8, 0x5, [0x3, 0x2, 0xa6, 0x3, 0x583], 0xfffa}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x11, &(0x7f00000002c0)={r4}, &(0x7f0000000400)=0x8) getpeername(r1, &(0x7f0000000000)=@ax25={{0x3, @null}, [@null, @remote, @remote, @netrom, @default, @netrom, @netrom, @rose]}, &(0x7f00000000c0)=0x80) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r5, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x20000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266c900000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eead00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1258) 07:24:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1800, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:40 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x101}, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10}, 0x10) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$FIONREAD(r7, 0x541b, &(0x7f0000000180)) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="90100000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x11, &(0x7f00000002c0)={r9}, &(0x7f0000000400)=0x8) ioctl$KVM_NMI(r3, 0xae9a) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={{r2}, 0x0, 0x8}) r10 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r10, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) [ 915.267340] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f8ef", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x407ff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x12, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ca00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2002, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 915.494178] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0003000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40800, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x22, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x8, 0x7, 0x81, 0x7f, 0x5, "02a2b0549037aa757692faa2a518ca74aaf53a", 0x2, 0x7}) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') setsockopt$IPT_SO_SET_REPLACE(r2, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x80400, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000000)={0xe, {0x4, 0x1, 0x2, 0x38, "fb2b3b929ee2b37a677cf9f67606bd644f4bafcb6b0ba4f7f853cff4576b516958ca6ae62e035cb71a30eb54202908efc205de274437c102"}}, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r4, 0x104000000000000, 0x60, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000080000000000000000000000000000000000000000200000003000000f81100003011000030110000000000003011000030110000c8110000c8110000c8110000c8110000c811000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000350000000000000000000000000000000000000000000000000000000000000000000600000000000000a010c810000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702e6370752f73797a300000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280053594e50524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000000000"], 0x1258) 07:24:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x3f00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x23, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 915.881915] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xb, 0x1}, 0xe) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r4, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r5) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x11, &(0x7f00000002c0)={r8}, &(0x7f0000000400)=0x8) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x8c, r9, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffc}]}, 0x8c}, 0x1, 0x0, 0x0, 0x200448d9}, 0x4004000) [ 916.483350] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266cb00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2c, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1fffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) write$FUSE_INIT(r7, &(0x7f0000000180)={0xc, 0xfffffffffffffff5, 0x5, {0x7, 0x1f, 0x3, 0x89000, 0x3ff, 0x100, 0x5, 0x3fd27931}}, 0x50) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r9, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="00042cbd7000fbdbdf2504000000050004001f00000400002100010000000500060009000000d95fd649685cf4"], 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x4000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0003000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 916.854698] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000000)={{0x3, 0xff}, {0x6, 0x4}, 0x800, 0x1, 0x2}) socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r6, 0x104000000000000, 0x60, &(0x7f0000001a40)=@raw={'raw\x00', 0x2, 0x3, 0x11f8, 0x1130, 0x1130, 0x0, 0x1130, 0x1130, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x11c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x10a0, 0x10c8, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1258) 07:24:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6b6b6b, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x48, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 917.002972] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x4800, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4c, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266cc00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x60, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1258) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000000000)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x11, &(0x7f00000002c0)={r5}, &(0x7f0000000400)=0x8) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1c) 07:24:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x68, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x4c00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0003000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48a40200, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 917.864799] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266cd00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6c, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x74, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x30a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x530f, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x140, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266cc00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3ea40200, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x300, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ce00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x5601, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x5000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x30a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x50a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x38a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 919.355919] nla_parse: 3 callbacks suppressed [ 919.355931] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x60a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266cc00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e009200150000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x428, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266cf00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x5865, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 919.849666] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x42c, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x70a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x42d, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x42e, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 920.467599] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x80a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 920.523999] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x42f, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266cc00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e009200150000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x9000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x430, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x6000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 921.200475] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x90a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x431, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 921.263902] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x432, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 921.692178] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x433, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092740b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e009200150000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x434, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xb260000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x6558, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 922.347285] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 922.674906] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d100000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x435, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x6800, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2a441, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 923.257526] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x436, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092740b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x437, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x12000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x6c00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d200000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092100b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x500, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x20000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x50a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x22000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x600, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x23000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 924.640359] nla_parse: 1 callbacks suppressed [ 924.640370] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 924.677270] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092740b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x60a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x28040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x7400, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 925.143659] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x700, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092100b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d300000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2c000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x70a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2e040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2a42e, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x7a00, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 926.087425] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 926.172850] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2f040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x80a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x30040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x900, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x31040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092100b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x90a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x8100, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x32040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2a42e, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d400000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 927.100527] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x33040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x34040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa03, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 927.479787] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2a427, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x35040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e9892000b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa04, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x36040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xa087, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa03, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d500000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 928.246559] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x37040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa05, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c00, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:54 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x38040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa06, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 928.679044] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xaa03, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 929.187445] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e9892000b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:54 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x39040000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa07, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc00, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xf000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000001d600000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:54 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3f000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa08, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xf600, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb00, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:55 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa09, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 929.869197] nla_parse: 1 callbacks suppressed [ 929.869207] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e9892000b0000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:55 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40010000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xfeff, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 930.379703] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d600000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x48000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0b, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xff0f, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf6, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 930.890826] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0c, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4c000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0d, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xff7f, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x68000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d700000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6b6b6b00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0e, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xfffe, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6c000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0f, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 931.679072] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a411, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d800000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x74000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa10, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x77010000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa11, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7a000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a412, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 932.280563] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:57 executing program 0 (fault-call:7 fault-nth:0): pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x0) 07:24:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa12, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:24:58 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8a030000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 932.662579] FAULT_INJECTION: forcing a failure. [ 932.662579] name failslab, interval 1, probability 0, space 0, times 0 [ 932.678892] CPU: 1 PID: 15987 Comm: syz-executor.0 Not tainted 4.19.100-syzkaller #0 [ 932.686803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.696274] Call Trace: [ 932.698880] dump_stack+0x197/0x210 [ 932.702639] should_fail.cold+0xa/0x1b [ 932.706547] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 932.711666] ? lock_downgrade+0x880/0x880 [ 932.715845] __should_failslab+0x121/0x190 [ 932.720096] should_failslab+0x9/0x14 [ 932.723912] kmem_cache_alloc_node_trace+0x274/0x720 [ 932.729028] ? _raw_spin_unlock_bh+0x31/0x40 [ 932.733448] ? release_sock+0x156/0x1c0 [ 932.737438] __get_vm_area_node+0x12b/0x3a0 [ 932.741780] __vmalloc_node_range+0xc7/0x790 [ 932.746313] ? netlink_sendmsg+0x640/0xd70 [ 932.750576] ? netlink_sendmsg+0x640/0xd70 [ 932.754925] vmalloc+0x6b/0x90 [ 932.758123] ? netlink_sendmsg+0x640/0xd70 [ 932.762407] netlink_sendmsg+0x640/0xd70 [ 932.766483] ? netlink_unicast+0x730/0x730 [ 932.770717] ? selinux_socket_sendmsg+0x36/0x40 [ 932.775387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.780928] ? security_socket_sendmsg+0x8d/0xc0 [ 932.785696] ? netlink_unicast+0x730/0x730 [ 932.789927] sock_sendmsg+0xd7/0x130 [ 932.793657] kernel_sendmsg+0x44/0x50 [ 932.797460] sock_no_sendpage+0x116/0x150 [ 932.801612] ? sock_kzfree_s+0x70/0x70 [ 932.805494] ? avc_has_perm+0x379/0x610 [ 932.809483] ? lock_acquire+0x16f/0x3f0 [ 932.813452] ? pipe_lock+0x6e/0x80 [ 932.816997] kernel_sendpage+0x92/0xf0 [ 932.820976] ? sock_kzfree_s+0x70/0x70 [ 932.824859] sock_sendpage+0x8b/0xc0 [ 932.828571] pipe_to_sendpage+0x296/0x360 [ 932.832710] ? kernel_sendpage+0xf0/0xf0 [ 932.836767] ? direct_splice_actor+0x190/0x190 [ 932.841353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.846882] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 932.852252] __splice_from_pipe+0x391/0x7d0 [ 932.856568] ? direct_splice_actor+0x190/0x190 [ 932.861149] ? direct_splice_actor+0x190/0x190 [ 932.867031] splice_from_pipe+0x108/0x170 [ 932.871182] ? splice_shrink_spd+0xd0/0xd0 [ 932.875412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.881135] ? security_file_permission+0x89/0x230 [ 932.886151] generic_splice_sendpage+0x3c/0x50 [ 932.890733] ? splice_from_pipe+0x170/0x170 [ 932.895058] do_splice+0x642/0x1340 [ 932.898684] ? opipe_prep.part.0+0x2d0/0x2d0 [ 932.903088] ? __fget_light+0x1a9/0x230 [ 932.907057] __x64_sys_splice+0x2c6/0x330 [ 932.911203] do_syscall_64+0xfd/0x620 [ 932.915003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.920189] RIP: 0033:0x45b399 [ 932.923382] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 932.942392] RSP: 002b:00007fb266450c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 932.950098] RAX: ffffffffffffffda RBX: 00007fb2664516d4 RCX: 000000000045b399 [ 932.957372] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 932.964635] RBP: 000000000075bf20 R08: 004010000004ffdc R09: 0000000000000000 [ 932.971893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 932.979150] R13: 0000000000000b6a R14: 00000000004ccea6 R15: 0000000000000000 [ 932.990483] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 933.042059] syz-executor.0: vmalloc: allocation failure: 4416 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 933.053042] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 933.058889] CPU: 0 PID: 15987 Comm: syz-executor.0 Not tainted 4.19.100-syzkaller #0 [ 933.066785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.076142] Call Trace: [ 933.078750] dump_stack+0x197/0x210 [ 933.082402] warn_alloc.cold+0x7b/0x173 [ 933.086390] ? zone_watermark_ok_safe+0x260/0x260 [ 933.091247] ? __get_vm_area_node+0x12b/0x3a0 [ 933.095784] ? rcu_read_lock_sched_held+0x110/0x130 [ 933.100812] ? _raw_spin_unlock_bh+0x31/0x40 [ 933.105236] ? __get_vm_area_node+0x2df/0x3a0 [ 933.109752] __vmalloc_node_range+0x486/0x790 [ 933.114274] ? netlink_sendmsg+0x640/0xd70 [ 933.118523] vmalloc+0x6b/0x90 [ 933.121729] ? netlink_sendmsg+0x640/0xd70 [ 933.125978] netlink_sendmsg+0x640/0xd70 [ 933.130055] ? netlink_unicast+0x730/0x730 [ 933.134316] ? selinux_socket_sendmsg+0x36/0x40 [ 933.138999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 933.144553] ? security_socket_sendmsg+0x8d/0xc0 [ 933.149326] ? netlink_unicast+0x730/0x730 [ 933.153567] sock_sendmsg+0xd7/0x130 [ 933.157295] kernel_sendmsg+0x44/0x50 [ 933.161118] sock_no_sendpage+0x116/0x150 [ 933.165302] ? sock_kzfree_s+0x70/0x70 [ 933.169198] ? avc_has_perm+0x379/0x610 [ 933.173201] ? lock_acquire+0x16f/0x3f0 [ 933.177201] ? pipe_lock+0x6e/0x80 [ 933.180763] kernel_sendpage+0x92/0xf0 [ 933.184663] ? sock_kzfree_s+0x70/0x70 [ 933.188569] sock_sendpage+0x8b/0xc0 [ 933.192304] pipe_to_sendpage+0x296/0x360 [ 933.196474] ? kernel_sendpage+0xf0/0xf0 [ 933.200542] ? direct_splice_actor+0x190/0x190 [ 933.205138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 933.210681] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 933.216070] __splice_from_pipe+0x391/0x7d0 [ 933.220415] ? direct_splice_actor+0x190/0x190 [ 933.225012] ? direct_splice_actor+0x190/0x190 [ 933.229612] splice_from_pipe+0x108/0x170 [ 933.233779] ? splice_shrink_spd+0xd0/0xd0 [ 933.238031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 933.243584] ? security_file_permission+0x89/0x230 [ 933.248540] generic_splice_sendpage+0x3c/0x50 [ 933.253149] ? splice_from_pipe+0x170/0x170 [ 933.257502] do_splice+0x642/0x1340 [ 933.261166] ? opipe_prep.part.0+0x2d0/0x2d0 [ 933.265606] ? __fget_light+0x1a9/0x230 [ 933.269694] __x64_sys_splice+0x2c6/0x330 [ 933.273862] do_syscall_64+0xfd/0x620 [ 933.277681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.282882] RIP: 0033:0x45b399 [ 933.286089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 933.305607] RSP: 002b:00007fb266450c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 933.313341] RAX: ffffffffffffffda RBX: 00007fb2664516d4 RCX: 000000000045b399 [ 933.320614] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 933.327887] RBP: 000000000075bf20 R08: 004010000004ffdc R09: 0000000000000000 [ 933.335162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 933.342430] R13: 0000000000000b6a R14: 00000000004ccea6 R15: 0000000000000000 [ 933.352676] Mem-Info: [ 933.355434] active_anon:194201 inactive_anon:1768 isolated_anon:0 [ 933.355434] active_file:14179 inactive_file:37736 isolated_file:0 [ 933.355434] unevictable:3073 dirty:136 writeback:0 unstable:0 [ 933.355434] slab_reclaimable:19874 slab_unreclaimable:146163 [ 933.355434] mapped:60944 shmem:265 pagetables:1388 bounce:0 [ 933.355434] free:1109074 free_pcp:544 free_cma:0 07:24:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266d900000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:24:58 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:24:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a413, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xb0a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 933.437715] Node 0 active_anon:774644kB inactive_anon:7072kB active_file:56572kB inactive_file:150944kB unevictable:12292kB isolated(anon):0kB isolated(file):0kB mapped:243776kB dirty:544kB writeback:0kB shmem:1060kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 221184kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 933.485610] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 933.513660] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 933.548211] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 933.549717] FAULT_INJECTION: forcing a failure. [ 933.549717] name failslab, interval 1, probability 0, space 0, times 0 [ 933.559167] Node 0 DMA32 free:635800kB min:36168kB low:45208kB high:54248kB active_anon:780920kB inactive_anon:7072kB active_file:56572kB inactive_file:150944kB unevictable:12292kB writepending:544kB present:3129332kB managed:2609736kB mlocked:12288kB kernel_stack:7968kB pagetables:5552kB bounce:0kB free_pcp:1656kB local_pcp:468kB free_cma:0kB [ 933.564719] CPU: 0 PID: 15998 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 933.603124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.612493] Call Trace: [ 933.615114] dump_stack+0x197/0x210 [ 933.618772] should_fail.cold+0xa/0x1b [ 933.622691] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 933.627818] ? mark_held_locks+0xb1/0x100 [ 933.631987] __should_failslab+0x121/0x190 [ 933.636258] should_failslab+0x9/0x14 [ 933.640189] kmem_cache_alloc+0x47/0x700 [ 933.644272] ? kasan_check_write+0x14/0x20 [ 933.648527] ? do_raw_spin_lock+0xd7/0x250 [ 933.652791] sctp_get_port_local+0x478/0x1310 [ 933.657321] ? sctp_unhash+0x10/0x10 [ 933.661069] ? kasan_check_read+0x11/0x20 [ 933.664489] lowmem_reserve[]: 0 0 1 1 1 [ 933.665237] ? sctp_bind_addr_match+0x1e3/0x2d0 [ 933.674153] sctp_do_bind+0x20f/0x5c0 [ 933.677981] sctp_autobind+0x168/0x1e0 [ 933.679585] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 933.681892] ? mark_held_locks+0x100/0x100 [ 933.681912] ? sctp_do_bind+0x5c0/0x5c0 [ 933.681932] ? lock_sock_nested+0xac/0x120 [ 933.681953] ? sctp_endpoint_is_peeled_off+0xf2/0x130 [ 933.725963] sctp_sendmsg_new_asoc+0xb72/0xfd0 [ 933.730596] ? mark_held_locks+0xb1/0x100 [ 933.734780] ? sctp_autobind+0x1e0/0x1e0 [ 933.738858] ? lockdep_hardirqs_on+0x415/0x5d0 [ 933.743455] ? lock_sock_nested+0x9a/0x120 [ 933.747712] ? trace_hardirqs_on+0x67/0x220 [ 933.752060] ? lock_sock_nested+0x9a/0x120 [ 933.756317] ? __local_bh_enable_ip+0x15a/0x270 [ 933.760689] lowmem_reserve[]: 0 0 0 0 0 [ 933.761010] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 933.770525] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 933.774174] Node 1 Normal free:3780016kB min:53704kB low:67128kB high:80552kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870168kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 933.775728] sctp_sendmsg+0x125a/0x17d0 [ 933.775756] ? sctp_id2assoc+0x2d0/0x2d0 [ 933.811558] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 933.816958] ? _copy_from_user+0xdd/0x150 [ 933.821142] inet_sendmsg+0x141/0x5d0 [ 933.824968] ? ipip_gro_receive+0x100/0x100 [ 933.829310] sock_sendmsg+0xd7/0x130 [ 933.833049] ___sys_sendmsg+0x803/0x920 [ 933.837043] ? copy_msghdr_from_user+0x430/0x430 [ 933.841860] ? lock_downgrade+0x880/0x880 [ 933.846151] ? kasan_check_read+0x11/0x20 [ 933.850317] ? __fget+0x367/0x540 [ 933.853800] ? __fget_light+0x1a9/0x230 [ 933.856962] lowmem_reserve[]: 0 0 0 0 0 [ 933.857785] ? __fdget+0x1b/0x20 [ 933.865139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 933.870696] __sys_sendmsg+0x105/0x1d0 [ 933.870997] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 933.874599] ? __ia32_sys_shutdown+0x80/0x80 [ 933.874639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 933.874659] ? do_syscall_64+0x26/0x620 [ 933.901313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.906693] ? do_syscall_64+0x26/0x620 [ 933.910691] __x64_sys_sendmsg+0x78/0xb0 [ 933.914779] do_syscall_64+0xfd/0x620 [ 933.918599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.919318] Node 0 DMA32: 462*4kB (UME) 5*8kB (M) 1*16kB (E) 8*32kB (UME) 49*64kB (UME) 355*128kB (UME) 259*256kB (UME) 131*512kB (UM) 43*1024kB (UME) 11*2048kB (UM) 94*4096kB (UM) = 635696kB [ 933.923795] RIP: 0033:0x45b399 [ 933.923812] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 933.923821] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 933.923839] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 933.978191] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 07:24:59 executing program 3 (fault-call:5 fault-nth:1): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 933.981121] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 933.985474] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 933.985483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 933.985491] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000000 [ 934.066847] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:24:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a414, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:24:59 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8cffffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 934.116525] FAULT_INJECTION: forcing a failure. [ 934.116525] name failslab, interval 1, probability 0, space 0, times 0 07:24:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xb26, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 934.204584] Node 1 Normal: 72*4kB (UME) 258*8kB (UME) 278*16kB (U) 69*32kB (U) 16*64kB (UM) 11*128kB (UE) 7*256kB (UM) 5*512kB (UME) 2*1024kB (M) 1*2048kB (U) 918*4096kB (M) = 3780016kB [ 934.224185] CPU: 1 PID: 16007 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 934.232095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.238402] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 934.241562] Call Trace: [ 934.241587] dump_stack+0x197/0x210 [ 934.241611] should_fail.cold+0xa/0x1b [ 934.260713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 934.265835] ? sctp_get_port_local+0xd48/0x1310 [ 934.270003] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 934.270526] ? __local_bh_enable_ip+0x15a/0x270 [ 934.290571] __should_failslab+0x121/0x190 [ 934.294832] should_failslab+0x9/0x14 [ 934.298650] kmem_cache_alloc_trace+0x4b/0x760 [ 934.303431] ? sctp_unhash+0x10/0x10 [ 934.307162] ? kasan_check_read+0x11/0x20 [ 934.309170] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 934.311349] sctp_add_bind_addr+0x79/0x370 [ 934.311372] sctp_do_bind+0x2fb/0x5c0 [ 934.311394] sctp_autobind+0x168/0x1e0 [ 934.332661] ? mark_held_locks+0x100/0x100 [ 934.337179] ? sctp_do_bind+0x5c0/0x5c0 [ 934.341277] ? lock_sock_nested+0xac/0x120 [ 934.343265] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 934.345540] ? sctp_endpoint_is_peeled_off+0xf2/0x130 [ 934.345563] sctp_sendmsg_new_asoc+0xb72/0xfd0 [ 934.345587] ? mark_held_locks+0xb1/0x100 [ 934.368119] ? sctp_autobind+0x1e0/0x1e0 [ 934.372374] ? lockdep_hardirqs_on+0x415/0x5d0 [ 934.376063] 52179 total pagecache pages [ 934.376972] ? lock_sock_nested+0x9a/0x120 [ 934.385267] ? trace_hardirqs_on+0x67/0x220 [ 934.389694] ? lock_sock_nested+0x9a/0x120 [ 934.391497] 0 pages in swap cache [ 934.393959] ? __local_bh_enable_ip+0x15a/0x270 [ 934.393975] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 934.394000] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 934.404217] Swap cache stats: add 0, delete 0, find 0/0 [ 934.407648] sctp_sendmsg+0x125a/0x17d0 [ 934.407672] ? sctp_id2assoc+0x2d0/0x2d0 [ 934.421306] Free swap = 0kB [ 934.422374] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 934.422396] ? _copy_from_user+0xdd/0x150 [ 934.436088] Total swap = 0kB [ 934.439498] inet_sendmsg+0x141/0x5d0 [ 934.439517] ? ipip_gro_receive+0x100/0x100 [ 934.439531] sock_sendmsg+0xd7/0x130 [ 934.439548] ___sys_sendmsg+0x803/0x920 [ 934.439565] ? copy_msghdr_from_user+0x430/0x430 [ 934.439585] ? lock_downgrade+0x880/0x880 [ 934.439602] ? kasan_check_read+0x11/0x20 [ 934.439621] ? __fget+0x367/0x540 [ 934.448019] 1965979 pages RAM [ 934.451225] ? __fget_light+0x1a9/0x230 [ 934.451242] ? __fdget+0x1b/0x20 [ 934.458071] 0 pages HighMem/MovableOnly [ 934.458949] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 934.471323] 341741 pages reserved [ 934.473069] __sys_sendmsg+0x105/0x1d0 07:24:59 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x0) [ 934.473087] ? __ia32_sys_shutdown+0x80/0x80 [ 934.473115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 934.478055] 0 pages cma reserved [ 934.479811] ? do_syscall_64+0x26/0x620 [ 934.479828] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.479849] ? do_syscall_64+0x26/0x620 [ 934.531793] __x64_sys_sendmsg+0x78/0xb0 [ 934.536412] do_syscall_64+0xfd/0x620 [ 934.540367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.545572] RIP: 0033:0x45b399 [ 934.548784] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 934.567702] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 934.575433] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 934.582992] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 934.590392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 934.597676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:25:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a415, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266da00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 934.605141] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000001 07:25:00 executing program 3 (fault-call:5 fault-nth:2): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 934.703586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 07:25:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc0ed0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 934.757263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.766899] FAULT_INJECTION: forcing a failure. [ 934.766899] name failslab, interval 1, probability 0, space 0, times 0 [ 934.794810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.813536] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 934.847410] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 07:25:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xeb250000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 934.852534] CPU: 0 PID: 16026 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 934.862594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.868543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.868550] Call Trace: [ 934.868573] dump_stack+0x197/0x210 [ 934.868597] should_fail.cold+0xa/0x1b [ 934.868618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 934.868635] ? lock_downgrade+0x880/0x880 [ 934.868660] __should_failslab+0x121/0x190 [ 934.868673] should_failslab+0x9/0x14 [ 934.868688] kmem_cache_alloc_trace+0x2cc/0x760 [ 934.868704] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 934.868725] ? selinux_sctp_bind_connect+0x13b/0x2d0 [ 934.899427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.901041] sctp_association_new+0x78/0x1fb0 [ 934.901062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 934.901082] ? security_sctp_bind_connect+0x93/0xc0 [ 934.901103] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 934.901122] ? mark_held_locks+0xb1/0x100 [ 934.910159] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.911529] ? sctp_autobind+0x1e0/0x1e0 [ 934.911549] ? lockdep_hardirqs_on+0x415/0x5d0 [ 934.911566] ? lock_sock_nested+0x9a/0x120 [ 934.911580] ? trace_hardirqs_on+0x67/0x220 [ 934.911598] ? lock_sock_nested+0x9a/0x120 [ 934.916313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.924335] ? __local_bh_enable_ip+0x15a/0x270 [ 934.924353] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 934.924372] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 934.924393] sctp_sendmsg+0x125a/0x17d0 [ 934.924418] ? sctp_id2assoc+0x2d0/0x2d0 [ 934.924434] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 934.924455] ? _copy_from_user+0xdd/0x150 [ 934.930062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.935128] inet_sendmsg+0x141/0x5d0 [ 934.935148] ? ipip_gro_receive+0x100/0x100 [ 934.935164] sock_sendmsg+0xd7/0x130 [ 934.935181] ___sys_sendmsg+0x803/0x920 [ 934.941159] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16016 comm=syz-executor.0 [ 934.952431] ? copy_msghdr_from_user+0x430/0x430 [ 934.952457] ? lock_downgrade+0x880/0x880 [ 934.952477] ? kasan_check_read+0x11/0x20 [ 934.952498] ? __fget+0x367/0x540 [ 934.952529] ? __fget_light+0x1a9/0x230 [ 934.952551] ? __fdget+0x1b/0x20 [ 935.121177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.126789] __sys_sendmsg+0x105/0x1d0 [ 935.131245] ? __ia32_sys_shutdown+0x80/0x80 [ 935.135773] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 935.140553] ? do_syscall_64+0x26/0x620 [ 935.144674] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.150140] ? do_syscall_64+0x26/0x620 [ 935.154263] __x64_sys_sendmsg+0x78/0xb0 [ 935.158347] do_syscall_64+0xfd/0x620 [ 935.162969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.168651] RIP: 0033:0x45b399 [ 935.171995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 935.192187] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 935.199916] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 935.207219] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 07:25:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a416, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 935.214553] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 935.221839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 935.229294] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000002 [ 935.292248] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:00 executing program 3 (fault-call:5 fault-nth:3): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc0a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 935.432971] FAULT_INJECTION: forcing a failure. [ 935.432971] name failslab, interval 1, probability 0, space 0, times 0 [ 935.485924] CPU: 1 PID: 16042 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 935.493918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.503632] Call Trace: [ 935.506388] dump_stack+0x197/0x210 [ 935.510076] should_fail.cold+0xa/0x1b [ 935.514077] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 935.523108] ? lock_downgrade+0x880/0x880 [ 935.527372] __should_failslab+0x121/0x190 [ 935.531635] should_failslab+0x9/0x14 [ 935.535463] kmem_cache_alloc_trace+0x2cc/0x760 [ 935.540155] ? trace_hardirqs_on+0x67/0x220 [ 935.546241] flex_array_alloc+0x1f9/0x2c0 [ 935.550463] fa_alloc+0x24/0x70 [ 935.553763] sctp_stream_alloc_out+0x33/0x450 [ 935.559075] sctp_stream_init+0xf7/0x3c0 [ 935.563241] ? lockdep_init_map+0x9/0x10 [ 935.567359] sctp_association_new+0x1184/0x1fb0 [ 935.572343] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 935.577279] ? mark_held_locks+0xb1/0x100 [ 935.581495] ? sctp_autobind+0x1e0/0x1e0 07:25:01 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x2) [ 935.586100] ? lockdep_hardirqs_on+0x415/0x5d0 [ 935.590909] ? lock_sock_nested+0x9a/0x120 [ 935.595686] ? trace_hardirqs_on+0x67/0x220 [ 935.601347] ? lock_sock_nested+0x9a/0x120 [ 935.605611] ? __local_bh_enable_ip+0x15a/0x270 [ 935.610382] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 935.616111] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 935.623293] sctp_sendmsg+0x125a/0x17d0 [ 935.627294] ? sctp_id2assoc+0x2d0/0x2d0 [ 935.631377] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 935.637583] ? _copy_from_user+0xdd/0x150 [ 935.642381] inet_sendmsg+0x141/0x5d0 [ 935.646503] ? ipip_gro_receive+0x100/0x100 [ 935.650854] sock_sendmsg+0xd7/0x130 [ 935.654697] ___sys_sendmsg+0x803/0x920 [ 935.658701] ? copy_msghdr_from_user+0x430/0x430 [ 935.663507] ? lock_downgrade+0x880/0x880 [ 935.667691] ? kasan_check_read+0x11/0x20 [ 935.672214] ? __fget+0x367/0x540 [ 935.675709] ? __fget_light+0x1a9/0x230 [ 935.679708] ? __fdget+0x1b/0x20 [ 935.683093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.688742] __sys_sendmsg+0x105/0x1d0 [ 935.692656] ? __ia32_sys_shutdown+0x80/0x80 [ 935.697096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 935.701870] ? do_syscall_64+0x26/0x620 [ 935.705865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.711968] ? do_syscall_64+0x26/0x620 [ 935.716062] __x64_sys_sendmsg+0x78/0xb0 [ 935.720127] do_syscall_64+0xfd/0x620 [ 935.723956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.729162] RIP: 0033:0x45b399 [ 935.732358] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 935.751463] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 935.759212] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 935.766615] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 935.773907] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf0ffffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 935.781258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 935.788760] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000003 07:25:01 executing program 3 (fault-call:5 fault-nth:4): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a417, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 935.985027] FAULT_INJECTION: forcing a failure. [ 935.985027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 935.998231] CPU: 1 PID: 16057 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 936.006732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.016655] Call Trace: [ 936.019551] dump_stack+0x197/0x210 [ 936.023485] should_fail.cold+0xa/0x1b [ 936.027667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 936.032836] ? mark_held_locks+0x100/0x100 [ 936.037097] __alloc_pages_nodemask+0x1ee/0x750 [ 936.042243] ? __alloc_pages_slowpath+0x2870/0x2870 [ 936.047326] cache_grow_begin+0x91/0x8c0 [ 936.051724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 936.057311] ? check_preemption_disabled+0x48/0x290 [ 936.062443] kmem_cache_alloc_trace+0x685/0x760 [ 936.067274] flex_array_alloc+0x1f9/0x2c0 [ 936.071912] fa_alloc+0x24/0x70 [ 936.075331] sctp_stream_alloc_out+0x33/0x450 [ 936.080203] sctp_stream_init+0xf7/0x3c0 [ 936.085088] ? lockdep_init_map+0x9/0x10 [ 936.089453] sctp_association_new+0x1184/0x1fb0 [ 936.094420] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 936.099027] ? mark_held_locks+0xb1/0x100 [ 936.103568] ? sctp_autobind+0x1e0/0x1e0 [ 936.107826] ? lockdep_hardirqs_on+0x415/0x5d0 [ 936.112447] ? lock_sock_nested+0x9a/0x120 [ 936.117144] ? trace_hardirqs_on+0x67/0x220 [ 936.121753] ? lock_sock_nested+0x9a/0x120 [ 936.126393] ? __local_bh_enable_ip+0x15a/0x270 [ 936.131165] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 936.138873] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 936.144701] sctp_sendmsg+0x125a/0x17d0 [ 936.148710] ? sctp_id2assoc+0x2d0/0x2d0 [ 936.152789] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 936.158188] ? _copy_from_user+0xdd/0x150 [ 936.162392] inet_sendmsg+0x141/0x5d0 [ 936.166224] ? ipip_gro_receive+0x100/0x100 [ 936.170567] sock_sendmsg+0xd7/0x130 [ 936.174302] ___sys_sendmsg+0x803/0x920 [ 936.178300] ? copy_msghdr_from_user+0x430/0x430 [ 936.183090] ? lock_downgrade+0x880/0x880 [ 936.187265] ? kasan_check_read+0x11/0x20 [ 936.191439] ? __fget+0x367/0x540 [ 936.194939] ? __fget_light+0x1a9/0x230 [ 936.198940] ? __fdget+0x1b/0x20 [ 936.202413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 936.208058] __sys_sendmsg+0x105/0x1d0 [ 936.212059] ? __ia32_sys_shutdown+0x80/0x80 [ 936.216500] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 936.221473] ? do_syscall_64+0x26/0x620 [ 936.225477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.231211] ? do_syscall_64+0x26/0x620 [ 936.235221] __x64_sys_sendmsg+0x78/0xb0 [ 936.239305] do_syscall_64+0xfd/0x620 [ 936.243250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.248515] RIP: 0033:0x45b399 [ 936.251719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 936.270699] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 936.278425] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266db00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xd0a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf5ffffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 936.285861] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 936.293256] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 936.300539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 936.307856] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000004 07:25:01 executing program 3 (fault-call:5 fault-nth:5): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf6ffffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 936.521062] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 936.554717] FAULT_INJECTION: forcing a failure. [ 936.554717] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 936.566585] CPU: 0 PID: 16073 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 936.574490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.584913] Call Trace: [ 936.587525] dump_stack+0x197/0x210 [ 936.591179] should_fail.cold+0xa/0x1b [ 936.595116] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 936.600250] ? mark_held_locks+0x100/0x100 [ 936.604510] __alloc_pages_nodemask+0x1ee/0x750 [ 936.609200] ? __alloc_pages_slowpath+0x2870/0x2870 [ 936.614260] cache_grow_begin+0x91/0x8c0 [ 936.618341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 936.623892] ? check_preemption_disabled+0x48/0x290 [ 936.628924] kmem_cache_alloc_trace+0x685/0x760 [ 936.633621] flex_array_alloc+0x1f9/0x2c0 [ 936.637782] fa_alloc+0x24/0x70 [ 936.641074] sctp_stream_alloc_out+0x33/0x450 [ 936.645600] sctp_stream_init+0xf7/0x3c0 [ 936.649669] ? lockdep_init_map+0x9/0x10 [ 936.653748] sctp_association_new+0x1184/0x1fb0 [ 936.658526] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 936.663121] ? mark_held_locks+0xb1/0x100 [ 936.667288] ? sctp_autobind+0x1e0/0x1e0 [ 936.671360] ? lockdep_hardirqs_on+0x415/0x5d0 [ 936.675954] ? lock_sock_nested+0x9a/0x120 [ 936.680197] ? trace_hardirqs_on+0x67/0x220 [ 936.684533] ? lock_sock_nested+0x9a/0x120 [ 936.688782] ? __local_bh_enable_ip+0x15a/0x270 [ 936.693462] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 936.699010] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 936.704221] sctp_sendmsg+0x125a/0x17d0 [ 936.708229] ? sctp_id2assoc+0x2d0/0x2d0 [ 936.712300] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 936.717674] ? _copy_from_user+0xdd/0x150 [ 936.721860] inet_sendmsg+0x141/0x5d0 [ 936.725792] ? ipip_gro_receive+0x100/0x100 [ 936.730243] sock_sendmsg+0xd7/0x130 [ 936.733973] ___sys_sendmsg+0x803/0x920 [ 936.737969] ? copy_msghdr_from_user+0x430/0x430 [ 936.742746] ? lock_downgrade+0x880/0x880 [ 936.746922] ? kasan_check_read+0x11/0x20 [ 936.751093] ? __fget+0x367/0x540 [ 936.754575] ? __fget_light+0x1a9/0x230 [ 936.758563] ? __fdget+0x1b/0x20 [ 936.761938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 936.767493] __sys_sendmsg+0x105/0x1d0 [ 936.771398] ? __ia32_sys_shutdown+0x80/0x80 [ 936.775838] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 936.780607] ? do_syscall_64+0x26/0x620 [ 936.784594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.789965] ? do_syscall_64+0x26/0x620 [ 936.793955] __x64_sys_sendmsg+0x78/0xb0 [ 936.798044] do_syscall_64+0xfd/0x620 [ 936.801859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.807062] RIP: 0033:0x45b399 [ 936.810266] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 936.829175] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 936.836895] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 936.844171] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 936.851443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 936.858720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:25:02 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x3) 07:25:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a418, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 936.865995] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000005 07:25:02 executing program 3 (fault-call:5 fault-nth:6): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfcfdffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266dc00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 937.047476] FAULT_INJECTION: forcing a failure. [ 937.047476] name failslab, interval 1, probability 0, space 0, times 0 [ 937.087990] CPU: 1 PID: 16081 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 937.095915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.105398] Call Trace: [ 937.108016] dump_stack+0x197/0x210 [ 937.111666] should_fail.cold+0xa/0x1b [ 937.115577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 937.120706] ? sctp_bind_addr_state+0x1ab/0x340 [ 937.125399] ? find_held_lock+0x35/0x130 [ 937.129490] __should_failslab+0x121/0x190 [ 937.133742] should_failslab+0x9/0x14 [ 937.137557] kmem_cache_alloc_trace+0x4b/0x760 [ 937.142155] ? kasan_check_read+0x11/0x20 [ 937.146392] sctp_add_bind_addr+0x79/0x370 [ 937.150654] sctp_copy_local_addr_list+0x385/0x530 [ 937.155607] ? sctp_defaults_init+0xbe0/0xbe0 [ 937.160217] ? get_random_bytes+0x35/0x40 [ 937.164383] ? _get_random_bytes+0x197/0x400 [ 937.168811] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 937.174016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.179583] sctp_copy_one_addr+0x5f/0x170 [ 937.183832] ? sctp_copy_one_addr+0x5f/0x170 [ 937.188389] sctp_bind_addr_copy+0xfc/0x2c8 [ 937.192752] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 937.198313] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 937.202914] ? mark_held_locks+0xb1/0x100 [ 937.207178] ? sctp_autobind+0x1e0/0x1e0 [ 937.211253] ? lockdep_hardirqs_on+0x415/0x5d0 [ 937.215854] ? lock_sock_nested+0x9a/0x120 [ 937.220110] ? trace_hardirqs_on+0x67/0x220 [ 937.224453] ? lock_sock_nested+0x9a/0x120 [ 937.228713] ? __local_bh_enable_ip+0x15a/0x270 [ 937.233402] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 937.238956] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 937.244161] sctp_sendmsg+0x125a/0x17d0 [ 937.248156] ? sctp_id2assoc+0x2d0/0x2d0 [ 937.252226] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 937.257718] ? _copy_from_user+0xdd/0x150 [ 937.261900] inet_sendmsg+0x141/0x5d0 [ 937.265716] ? ipip_gro_receive+0x100/0x100 [ 937.270052] sock_sendmsg+0xd7/0x130 [ 937.273831] ___sys_sendmsg+0x803/0x920 [ 937.277101] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 937.277818] ? copy_msghdr_from_user+0x430/0x430 [ 937.277867] ? lock_downgrade+0x880/0x880 [ 937.277886] ? kasan_check_read+0x11/0x20 [ 937.277904] ? __fget+0x367/0x540 [ 937.277936] ? __fget_light+0x1a9/0x230 [ 937.277953] ? __fdget+0x1b/0x20 [ 937.277973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 937.316241] __sys_sendmsg+0x105/0x1d0 [ 937.320285] ? __ia32_sys_shutdown+0x80/0x80 [ 937.324711] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 937.329470] ? do_syscall_64+0x26/0x620 [ 937.333569] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.338949] ? do_syscall_64+0x26/0x620 [ 937.342950] __x64_sys_sendmsg+0x78/0xb0 [ 937.347029] do_syscall_64+0xfd/0x620 [ 937.350849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.356045] RIP: 0033:0x45b399 [ 937.359362] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 937.378277] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a419, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 937.386105] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 937.393383] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 937.401280] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 937.408557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 937.416616] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000006 07:25:02 executing program 3 (fault-call:5 fault-nth:7): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfdfdffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe0a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266dd00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 937.569963] FAULT_INJECTION: forcing a failure. [ 937.569963] name failslab, interval 1, probability 0, space 0, times 0 [ 937.600926] CPU: 1 PID: 16096 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 937.608862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.618238] Call Trace: [ 937.620855] dump_stack+0x197/0x210 [ 937.624511] should_fail.cold+0xa/0x1b [ 937.628429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 937.633554] ? sctp_bind_addr_state+0x1ab/0x340 [ 937.638247] ? find_held_lock+0x35/0x130 [ 937.642345] __should_failslab+0x121/0x190 [ 937.646595] should_failslab+0x9/0x14 [ 937.650416] kmem_cache_alloc_trace+0x4b/0x760 [ 937.655019] ? kasan_check_read+0x11/0x20 [ 937.659190] sctp_add_bind_addr+0x79/0x370 [ 937.663450] sctp_copy_local_addr_list+0x385/0x530 [ 937.668404] ? sctp_defaults_init+0xbe0/0xbe0 [ 937.672922] ? get_random_bytes+0x35/0x40 [ 937.677091] ? _get_random_bytes+0x197/0x400 [ 937.681514] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 937.686724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.692334] sctp_copy_one_addr+0x5f/0x170 [ 937.696604] ? sctp_copy_one_addr+0x5f/0x170 [ 937.701036] sctp_bind_addr_copy+0xfc/0x2c8 [ 937.705388] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 937.710966] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 937.715568] ? mark_held_locks+0xb1/0x100 [ 937.719771] ? sctp_autobind+0x1e0/0x1e0 [ 937.723867] ? lockdep_hardirqs_on+0x415/0x5d0 [ 937.728467] ? lock_sock_nested+0x9a/0x120 [ 937.732753] ? trace_hardirqs_on+0x67/0x220 [ 937.737096] ? lock_sock_nested+0x9a/0x120 [ 937.741453] ? __local_bh_enable_ip+0x15a/0x270 [ 937.746144] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 937.751768] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 937.756997] sctp_sendmsg+0x125a/0x17d0 [ 937.760991] ? sctp_id2assoc+0x2d0/0x2d0 [ 937.765069] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 937.770449] ? _copy_from_user+0xdd/0x150 [ 937.774673] inet_sendmsg+0x141/0x5d0 [ 937.778510] ? ipip_gro_receive+0x100/0x100 [ 937.782847] sock_sendmsg+0xd7/0x130 [ 937.786580] ___sys_sendmsg+0x803/0x920 [ 937.790580] ? copy_msghdr_from_user+0x430/0x430 [ 937.795354] ? lock_downgrade+0x880/0x880 [ 937.799521] ? kasan_check_read+0x11/0x20 [ 937.803687] ? __fget+0x367/0x540 [ 937.807173] ? __fget_light+0x1a9/0x230 [ 937.811202] ? __fdget+0x1b/0x20 [ 937.814597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 937.820168] __sys_sendmsg+0x105/0x1d0 [ 937.824079] ? __ia32_sys_shutdown+0x80/0x80 [ 937.828523] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 937.833406] ? do_syscall_64+0x26/0x620 [ 937.837399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.842782] ? do_syscall_64+0x26/0x620 [ 937.846794] __x64_sys_sendmsg+0x78/0xb0 [ 937.850876] do_syscall_64+0xfd/0x620 [ 937.854703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.859911] RIP: 0033:0x45b399 [ 937.863117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 937.882136] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 937.889897] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 937.897192] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 937.904468] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 937.911751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:25:03 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x4) [ 937.919033] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000007 [ 937.927114] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a41a, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:03 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfeffffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:03 executing program 3 (fault-call:5 fault-nth:8): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266de00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 938.172211] FAULT_INJECTION: forcing a failure. [ 938.172211] name failslab, interval 1, probability 0, space 0, times 0 [ 938.201334] CPU: 0 PID: 16116 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 938.209265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.210554] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 938.218629] Call Trace: [ 938.218657] dump_stack+0x197/0x210 [ 938.218681] should_fail.cold+0xa/0x1b [ 938.218708] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 938.242511] ? sctp_bind_addr_state+0x1ab/0x340 [ 938.247200] ? find_held_lock+0x35/0x130 [ 938.251286] __should_failslab+0x121/0x190 [ 938.255535] should_failslab+0x9/0x14 [ 938.259357] kmem_cache_alloc_trace+0x4b/0x760 [ 938.263960] ? kasan_check_read+0x11/0x20 [ 938.268397] sctp_add_bind_addr+0x79/0x370 [ 938.272665] sctp_copy_local_addr_list+0x385/0x530 [ 938.277622] ? sctp_defaults_init+0xbe0/0xbe0 [ 938.282140] ? get_random_bytes+0x35/0x40 [ 938.286313] ? _get_random_bytes+0x197/0x400 [ 938.290745] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 938.295956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 938.301524] sctp_copy_one_addr+0x5f/0x170 [ 938.305778] ? sctp_copy_one_addr+0x5f/0x170 [ 938.310472] sctp_bind_addr_copy+0xfc/0x2c8 [ 938.314828] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 938.320476] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 938.325081] ? mark_held_locks+0xb1/0x100 [ 938.329268] ? sctp_autobind+0x1e0/0x1e0 [ 938.333352] ? lockdep_hardirqs_on+0x415/0x5d0 [ 938.337957] ? lock_sock_nested+0x9a/0x120 [ 938.342208] ? trace_hardirqs_on+0x67/0x220 [ 938.346551] ? lock_sock_nested+0x9a/0x120 [ 938.350816] ? __local_bh_enable_ip+0x15a/0x270 [ 938.355509] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 938.361068] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 938.366291] sctp_sendmsg+0x125a/0x17d0 [ 938.370304] ? sctp_id2assoc+0x2d0/0x2d0 [ 938.374443] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 938.379837] ? _copy_from_user+0xdd/0x150 [ 938.384032] inet_sendmsg+0x141/0x5d0 [ 938.387873] ? ipip_gro_receive+0x100/0x100 [ 938.392213] sock_sendmsg+0xd7/0x130 [ 938.395951] ___sys_sendmsg+0x803/0x920 [ 938.399952] ? copy_msghdr_from_user+0x430/0x430 [ 938.404739] ? lock_downgrade+0x880/0x880 [ 938.408904] ? kasan_check_read+0x11/0x20 [ 938.413202] ? __fget+0x367/0x540 [ 938.416689] ? __fget_light+0x1a9/0x230 [ 938.420687] ? __fdget+0x1b/0x20 [ 938.424111] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 938.429738] __sys_sendmsg+0x105/0x1d0 [ 938.433707] ? __ia32_sys_shutdown+0x80/0x80 [ 938.438168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 938.442940] ? do_syscall_64+0x26/0x620 [ 938.446940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.452319] ? do_syscall_64+0x26/0x620 [ 938.456327] __x64_sys_sendmsg+0x78/0xb0 [ 938.460414] do_syscall_64+0xfd/0x620 [ 938.464249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.469457] RIP: 0033:0x45b399 [ 938.472667] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 938.491679] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 938.499416] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 938.506708] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 938.513996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a41b, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 938.521290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 938.528593] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000008 07:25:04 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xff070400, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:04 executing program 3 (fault-call:5 fault-nth:9): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266df00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf0a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 938.729456] FAULT_INJECTION: forcing a failure. [ 938.729456] name failslab, interval 1, probability 0, space 0, times 0 [ 938.776067] CPU: 1 PID: 16130 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 938.783998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.793483] Call Trace: [ 938.796203] dump_stack+0x197/0x210 [ 938.799866] should_fail.cold+0xa/0x1b [ 938.803836] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 938.809089] ? sctp_bind_addr_state+0x1ab/0x340 [ 938.813783] ? find_held_lock+0x35/0x130 [ 938.817864] __should_failslab+0x121/0x190 [ 938.822112] should_failslab+0x9/0x14 [ 938.826374] kmem_cache_alloc_trace+0x4b/0x760 [ 938.830975] ? kasan_check_read+0x11/0x20 [ 938.835144] sctp_add_bind_addr+0x79/0x370 [ 938.839399] sctp_copy_local_addr_list+0x385/0x530 [ 938.844355] ? sctp_defaults_init+0xbe0/0xbe0 [ 938.848997] ? get_random_bytes+0x35/0x40 [ 938.853162] ? _get_random_bytes+0x197/0x400 [ 938.857585] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 938.862792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 938.868350] sctp_copy_one_addr+0x5f/0x170 [ 938.872603] ? sctp_copy_one_addr+0x5f/0x170 [ 938.877033] sctp_bind_addr_copy+0xfc/0x2c8 [ 938.881383] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 938.886954] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 938.891555] ? mark_held_locks+0xb1/0x100 [ 938.895720] ? sctp_autobind+0x1e0/0x1e0 [ 938.899798] ? lockdep_hardirqs_on+0x415/0x5d0 [ 938.904543] ? lock_sock_nested+0x9a/0x120 [ 938.908799] ? trace_hardirqs_on+0x67/0x220 [ 938.913139] ? lock_sock_nested+0x9a/0x120 [ 938.917395] ? __local_bh_enable_ip+0x15a/0x270 [ 938.922011] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 938.922079] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 938.936285] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 938.941684] sctp_sendmsg+0x125a/0x17d0 [ 938.945687] ? sctp_id2assoc+0x2d0/0x2d0 [ 938.949878] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 938.955264] ? _copy_from_user+0xdd/0x150 [ 938.959552] inet_sendmsg+0x141/0x5d0 [ 938.963366] ? ipip_gro_receive+0x100/0x100 [ 938.967702] sock_sendmsg+0xd7/0x130 [ 938.971520] ___sys_sendmsg+0x803/0x920 [ 938.975524] ? copy_msghdr_from_user+0x430/0x430 [ 938.980311] ? lock_downgrade+0x880/0x880 [ 938.984480] ? kasan_check_read+0x11/0x20 [ 938.988649] ? __fget+0x367/0x540 [ 938.992138] ? __fget_light+0x1a9/0x230 [ 938.996125] ? __fdget+0x1b/0x20 [ 938.999609] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 939.005166] __sys_sendmsg+0x105/0x1d0 [ 939.009066] ? __ia32_sys_shutdown+0x80/0x80 [ 939.013507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 939.018454] ? do_syscall_64+0x26/0x620 07:25:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a41c, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 939.022449] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.027938] ? do_syscall_64+0x26/0x620 [ 939.031935] __x64_sys_sendmsg+0x78/0xb0 [ 939.036023] do_syscall_64+0xfd/0x620 [ 939.039844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.045042] RIP: 0033:0x45b399 [ 939.048253] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 939.067335] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 939.075061] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 939.082344] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 939.089629] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 939.096915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 939.104196] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000009 07:25:04 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x5) 07:25:04 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xff0f0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:04 executing program 3 (fault-call:5 fault-nth:10): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 939.244209] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a41d, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 939.311419] FAULT_INJECTION: forcing a failure. [ 939.311419] name failslab, interval 1, probability 0, space 0, times 0 [ 939.326880] CPU: 1 PID: 16156 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 939.334787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.344151] Call Trace: [ 939.346765] dump_stack+0x197/0x210 [ 939.350421] should_fail.cold+0xa/0x1b [ 939.354331] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 939.359445] ? sctp_bind_addr_state+0x1ab/0x340 [ 939.364288] ? find_held_lock+0x35/0x130 [ 939.368377] __should_failslab+0x121/0x190 [ 939.372637] should_failslab+0x9/0x14 [ 939.376452] kmem_cache_alloc_trace+0x4b/0x760 [ 939.381085] ? kasan_check_read+0x11/0x20 [ 939.385274] sctp_add_bind_addr+0x79/0x370 [ 939.389538] sctp_copy_local_addr_list+0x385/0x530 [ 939.394485] ? sctp_defaults_init+0xbe0/0xbe0 [ 939.398997] ? get_random_bytes+0x35/0x40 [ 939.403190] ? _get_random_bytes+0x197/0x400 [ 939.407613] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 939.412819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.418386] sctp_copy_one_addr+0x5f/0x170 [ 939.422742] ? sctp_copy_one_addr+0x5f/0x170 [ 939.427179] sctp_bind_addr_copy+0xfc/0x2c8 [ 939.431647] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 939.437221] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 939.441826] ? mark_held_locks+0xb1/0x100 [ 939.445996] ? sctp_autobind+0x1e0/0x1e0 [ 939.450075] ? lockdep_hardirqs_on+0x415/0x5d0 [ 939.454674] ? lock_sock_nested+0x9a/0x120 [ 939.458932] ? trace_hardirqs_on+0x67/0x220 [ 939.463799] ? lock_sock_nested+0x9a/0x120 [ 939.468282] ? __local_bh_enable_ip+0x15a/0x270 [ 939.472967] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 939.478529] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 939.484269] sctp_sendmsg+0x125a/0x17d0 [ 939.488273] ? sctp_id2assoc+0x2d0/0x2d0 [ 939.492363] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 939.497845] ? _copy_from_user+0xdd/0x150 [ 939.502041] inet_sendmsg+0x141/0x5d0 [ 939.505970] ? ipip_gro_receive+0x100/0x100 [ 939.510312] sock_sendmsg+0xd7/0x130 [ 939.514070] ___sys_sendmsg+0x803/0x920 [ 939.518413] ? copy_msghdr_from_user+0x430/0x430 [ 939.523198] ? lock_downgrade+0x880/0x880 [ 939.527398] ? kasan_check_read+0x11/0x20 [ 939.531695] ? __fget+0x367/0x540 [ 939.535182] ? __fget_light+0x1a9/0x230 [ 939.539182] ? __fdget+0x1b/0x20 [ 939.542605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 939.548169] __sys_sendmsg+0x105/0x1d0 [ 939.552078] ? __ia32_sys_shutdown+0x80/0x80 [ 939.556549] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 939.561353] ? do_syscall_64+0x26/0x620 [ 939.565357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.570740] ? do_syscall_64+0x26/0x620 [ 939.574832] __x64_sys_sendmsg+0x78/0xb0 [ 939.579011] do_syscall_64+0xfd/0x620 [ 939.582844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.588135] RIP: 0033:0x45b399 [ 939.591352] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 939.610443] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 939.618293] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 939.625578] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 939.632872] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 939.640156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 939.647441] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000000a 07:25:05 executing program 3 (fault-call:5 fault-nth:11): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xffff1f00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 939.719814] selinux_nlmsg_perm: 1698 callbacks suppressed [ 939.719831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 07:25:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x100a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 939.770122] FAULT_INJECTION: forcing a failure. [ 939.770122] name failslab, interval 1, probability 0, space 0, times 0 [ 939.803203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 939.820439] CPU: 1 PID: 16161 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 939.829151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.838520] Call Trace: [ 939.841130] dump_stack+0x197/0x210 [ 939.844784] should_fail.cold+0xa/0x1b [ 939.848700] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 939.853824] ? sctp_bind_addr_state+0x1ab/0x340 [ 939.858519] ? find_held_lock+0x35/0x130 [ 939.862609] __should_failslab+0x121/0x190 [ 939.866871] should_failslab+0x9/0x14 [ 939.870693] kmem_cache_alloc_trace+0x4b/0x760 [ 939.875320] ? kasan_check_read+0x11/0x20 [ 939.879497] sctp_add_bind_addr+0x79/0x370 [ 939.883754] sctp_copy_local_addr_list+0x385/0x530 [ 939.888707] ? sctp_defaults_init+0xbe0/0xbe0 [ 939.893218] ? get_random_bytes+0x35/0x40 [ 939.897389] ? _get_random_bytes+0x197/0x400 [ 939.901814] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 939.907017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.912578] sctp_copy_one_addr+0x5f/0x170 [ 939.916826] ? sctp_copy_one_addr+0x5f/0x170 [ 939.921255] sctp_bind_addr_copy+0xfc/0x2c8 [ 939.925625] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 939.931194] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 939.935805] ? mark_held_locks+0xb1/0x100 [ 939.939970] ? sctp_autobind+0x1e0/0x1e0 [ 939.944046] ? lockdep_hardirqs_on+0x415/0x5d0 [ 939.948649] ? lock_sock_nested+0x9a/0x120 [ 939.952904] ? trace_hardirqs_on+0x67/0x220 [ 939.957258] ? lock_sock_nested+0x9a/0x120 [ 939.961514] ? __local_bh_enable_ip+0x15a/0x270 [ 939.966390] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 939.972039] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 939.977246] sctp_sendmsg+0x125a/0x17d0 [ 939.981676] ? sctp_id2assoc+0x2d0/0x2d0 [ 939.981765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 939.985755] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 939.985773] ? _copy_from_user+0xdd/0x150 [ 939.985809] inet_sendmsg+0x141/0x5d0 [ 940.011176] ? ipip_gro_receive+0x100/0x100 [ 940.015525] sock_sendmsg+0xd7/0x130 [ 940.019265] ___sys_sendmsg+0x803/0x920 [ 940.023262] ? copy_msghdr_from_user+0x430/0x430 [ 940.027777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 940.040204] ? lock_downgrade+0x880/0x880 [ 940.040226] ? kasan_check_read+0x11/0x20 [ 940.040246] ? __fget+0x367/0x540 [ 940.040276] ? __fget_light+0x1a9/0x230 [ 940.040291] ? __fdget+0x1b/0x20 [ 940.040305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 940.040326] __sys_sendmsg+0x105/0x1d0 [ 940.040343] ? __ia32_sys_shutdown+0x80/0x80 [ 940.040372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 940.040386] ? do_syscall_64+0x26/0x620 [ 940.040402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.040419] ? do_syscall_64+0x26/0x620 [ 940.077633] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 940.078136] __x64_sys_sendmsg+0x78/0xb0 [ 940.078157] do_syscall_64+0xfd/0x620 [ 940.078178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.078190] RIP: 0033:0x45b399 [ 940.078206] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.078214] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 940.078228] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 940.078237] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 940.078245] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 940.078257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 940.111296] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 940.111636] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000000b [ 940.121585] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a41e, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 940.225694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 940.259130] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 07:25:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e100000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:05 executing program 3 (fault-call:5 fault-nth:12): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfffffdfc, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 940.351134] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 940.380449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16151 comm=syz-executor.0 [ 940.425329] FAULT_INJECTION: forcing a failure. [ 940.425329] name failslab, interval 1, probability 0, space 0, times 0 [ 940.461830] CPU: 1 PID: 16181 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 940.469764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.479135] Call Trace: [ 940.481744] dump_stack+0x197/0x210 [ 940.485392] should_fail.cold+0xa/0x1b [ 940.489306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.494431] ? sctp_bind_addr_state+0x1ab/0x340 [ 940.499122] ? find_held_lock+0x35/0x130 [ 940.503314] __should_failslab+0x121/0x190 [ 940.507573] should_failslab+0x9/0x14 [ 940.511483] kmem_cache_alloc_trace+0x4b/0x760 [ 940.516154] ? kasan_check_read+0x11/0x20 [ 940.520323] sctp_add_bind_addr+0x79/0x370 [ 940.524604] sctp_copy_local_addr_list+0x385/0x530 [ 940.529564] ? sctp_defaults_init+0xbe0/0xbe0 [ 940.534086] ? get_random_bytes+0x35/0x40 [ 940.538339] ? _get_random_bytes+0x197/0x400 [ 940.543990] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 940.549210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.554755] sctp_copy_one_addr+0x5f/0x170 [ 940.559013] ? sctp_copy_one_addr+0x5f/0x170 [ 940.563450] sctp_bind_addr_copy+0xfc/0x2c8 [ 940.567821] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 940.573382] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 940.577980] ? mark_held_locks+0xb1/0x100 [ 940.582255] ? sctp_autobind+0x1e0/0x1e0 [ 940.586342] ? lockdep_hardirqs_on+0x415/0x5d0 [ 940.591041] ? lock_sock_nested+0x9a/0x120 [ 940.595297] ? trace_hardirqs_on+0x67/0x220 [ 940.599640] ? lock_sock_nested+0x9a/0x120 [ 940.603893] ? __local_bh_enable_ip+0x15a/0x270 [ 940.608669] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 940.614239] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 940.619450] sctp_sendmsg+0x125a/0x17d0 [ 940.623465] ? sctp_id2assoc+0x2d0/0x2d0 [ 940.627591] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 940.632980] ? _copy_from_user+0xdd/0x150 [ 940.637693] inet_sendmsg+0x141/0x5d0 [ 940.641549] ? ipip_gro_receive+0x100/0x100 [ 940.646029] sock_sendmsg+0xd7/0x130 [ 940.648233] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 940.649757] ___sys_sendmsg+0x803/0x920 [ 940.649775] ? copy_msghdr_from_user+0x430/0x430 [ 940.649797] ? lock_downgrade+0x880/0x880 [ 940.671340] ? kasan_check_read+0x11/0x20 [ 940.675516] ? __fget+0x367/0x540 [ 940.679001] ? __fget_light+0x1a9/0x230 [ 940.682990] ? __fdget+0x1b/0x20 [ 940.686367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 940.691922] __sys_sendmsg+0x105/0x1d0 [ 940.695825] ? __ia32_sys_shutdown+0x80/0x80 [ 940.700264] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 940.705045] ? do_syscall_64+0x26/0x620 [ 940.709132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.714521] ? do_syscall_64+0x26/0x620 [ 940.718541] __x64_sys_sendmsg+0x78/0xb0 [ 940.722647] do_syscall_64+0xfd/0x620 [ 940.726476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.731701] RIP: 0033:0x45b399 [ 940.734908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.753826] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 940.761549] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:06 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x6) 07:25:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a41f, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:06 executing program 3 (fault-call:5 fault-nth:13): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 940.770132] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 940.777510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 940.784794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 940.792077] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000000c 07:25:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x110a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000000e200000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 940.901287] FAULT_INJECTION: forcing a failure. [ 940.901287] name failslab, interval 1, probability 0, space 0, times 0 [ 940.933152] CPU: 1 PID: 16192 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 940.941072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.950433] Call Trace: [ 940.953055] dump_stack+0x197/0x210 [ 940.956727] should_fail.cold+0xa/0x1b [ 940.960649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.965778] ? sctp_bind_addr_state+0x1ab/0x340 [ 940.970500] ? find_held_lock+0x35/0x130 [ 940.974600] __should_failslab+0x121/0x190 [ 940.978856] should_failslab+0x9/0x14 [ 940.982751] kmem_cache_alloc_trace+0x4b/0x760 [ 940.987358] ? kasan_check_read+0x11/0x20 [ 940.991532] sctp_add_bind_addr+0x79/0x370 [ 940.995794] sctp_copy_local_addr_list+0x385/0x530 [ 941.000757] ? sctp_defaults_init+0xbe0/0xbe0 [ 941.005265] ? get_random_bytes+0x35/0x40 [ 941.009691] ? _get_random_bytes+0x197/0x400 [ 941.014114] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 941.019326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.024885] sctp_copy_one_addr+0x5f/0x170 [ 941.029136] ? sctp_copy_one_addr+0x5f/0x170 [ 941.033564] sctp_bind_addr_copy+0xfc/0x2c8 [ 941.037911] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 941.043470] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 941.048069] ? mark_held_locks+0xb1/0x100 [ 941.052246] ? sctp_autobind+0x1e0/0x1e0 [ 941.056432] ? lockdep_hardirqs_on+0x415/0x5d0 [ 941.061032] ? lock_sock_nested+0x9a/0x120 [ 941.065284] ? trace_hardirqs_on+0x67/0x220 [ 941.069628] ? lock_sock_nested+0x9a/0x120 [ 941.073875] ? __local_bh_enable_ip+0x15a/0x270 [ 941.078558] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 941.084118] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 941.089328] sctp_sendmsg+0x125a/0x17d0 [ 941.093333] ? sctp_id2assoc+0x2d0/0x2d0 [ 941.097414] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 941.102808] ? _copy_from_user+0xdd/0x150 [ 941.107001] inet_sendmsg+0x141/0x5d0 [ 941.110816] ? ipip_gro_receive+0x100/0x100 [ 941.115160] sock_sendmsg+0xd7/0x130 [ 941.118888] ___sys_sendmsg+0x803/0x920 [ 941.122870] ? copy_msghdr_from_user+0x430/0x430 [ 941.127648] ? lock_downgrade+0x880/0x880 [ 941.131816] ? kasan_check_read+0x11/0x20 [ 941.135985] ? __fget+0x367/0x540 [ 941.139469] ? __fget_light+0x1a9/0x230 [ 941.143456] ? __fdget+0x1b/0x20 [ 941.146840] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 941.152396] __sys_sendmsg+0x105/0x1d0 [ 941.156298] ? __ia32_sys_shutdown+0x80/0x80 [ 941.160743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 941.165521] ? do_syscall_64+0x26/0x620 [ 941.169539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.174934] ? do_syscall_64+0x26/0x620 [ 941.178937] __x64_sys_sendmsg+0x78/0xb0 [ 941.183012] do_syscall_64+0xfd/0x620 [ 941.186942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.192151] RIP: 0033:0x45b399 [ 941.195353] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 941.214263] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 941.221984] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 941.229483] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 941.236763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 941.244047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:25:06 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfffffdfd, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 941.251333] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000000d 07:25:06 executing program 3 (fault-call:5 fault-nth:14): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a420, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 941.329265] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e200000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 941.427947] FAULT_INJECTION: forcing a failure. [ 941.427947] name failslab, interval 1, probability 0, space 0, times 0 [ 941.451016] CPU: 1 PID: 16205 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 941.458936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.468299] Call Trace: [ 941.470901] dump_stack+0x197/0x210 [ 941.474555] should_fail.cold+0xa/0x1b [ 941.478474] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 941.483595] ? sctp_bind_addr_state+0x1ab/0x340 [ 941.488288] ? find_held_lock+0x35/0x130 [ 941.492374] __should_failslab+0x121/0x190 [ 941.496631] should_failslab+0x9/0x14 [ 941.500443] kmem_cache_alloc_trace+0x4b/0x760 [ 941.505047] ? kasan_check_read+0x11/0x20 [ 941.509223] sctp_add_bind_addr+0x79/0x370 [ 941.513482] sctp_copy_local_addr_list+0x385/0x530 [ 941.518440] ? sctp_defaults_init+0xbe0/0xbe0 [ 941.522951] ? get_random_bytes+0x35/0x40 [ 941.527232] ? _get_random_bytes+0x197/0x400 [ 941.531649] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 941.536855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.542414] sctp_copy_one_addr+0x5f/0x170 [ 941.546662] ? sctp_copy_one_addr+0x5f/0x170 [ 941.551088] sctp_bind_addr_copy+0xfc/0x2c8 [ 941.555440] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 941.561351] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 941.565961] ? mark_held_locks+0xb1/0x100 [ 941.570128] ? sctp_autobind+0x1e0/0x1e0 [ 941.574206] ? lockdep_hardirqs_on+0x415/0x5d0 [ 941.578805] ? lock_sock_nested+0x9a/0x120 [ 941.583070] ? trace_hardirqs_on+0x67/0x220 [ 941.587409] ? lock_sock_nested+0x9a/0x120 [ 941.591661] ? __local_bh_enable_ip+0x15a/0x270 [ 941.596341] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 941.601898] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 941.607111] sctp_sendmsg+0x125a/0x17d0 [ 941.611108] ? sctp_id2assoc+0x2d0/0x2d0 [ 941.615183] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 941.620675] ? _copy_from_user+0xdd/0x150 [ 941.624861] inet_sendmsg+0x141/0x5d0 [ 941.628678] ? ipip_gro_receive+0x100/0x100 [ 941.633028] sock_sendmsg+0xd7/0x130 [ 941.636757] ___sys_sendmsg+0x803/0x920 [ 941.640754] ? copy_msghdr_from_user+0x430/0x430 [ 941.645533] ? lock_downgrade+0x880/0x880 [ 941.649699] ? kasan_check_read+0x11/0x20 [ 941.653861] ? __fget+0x367/0x540 [ 941.657346] ? __fget_light+0x1a9/0x230 [ 941.661434] ? __fdget+0x1b/0x20 [ 941.664813] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 941.670373] __sys_sendmsg+0x105/0x1d0 [ 941.674286] ? __ia32_sys_shutdown+0x80/0x80 [ 941.678722] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 941.683613] ? do_syscall_64+0x26/0x620 [ 941.687595] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.692988] ? do_syscall_64+0x26/0x620 [ 941.696985] __x64_sys_sendmsg+0x78/0xb0 [ 941.701071] do_syscall_64+0xfd/0x620 [ 941.704909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.710113] RIP: 0033:0x45b399 [ 941.713324] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 941.732241] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 941.739965] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 941.747290] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 941.754569] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 941.761865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 941.769231] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000000e 07:25:07 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x7) 07:25:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a421, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xffffff7f, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:07 executing program 3 (fault-call:5 fault-nth:15): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 941.867785] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1200, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 941.973937] FAULT_INJECTION: forcing a failure. [ 941.973937] name failslab, interval 1, probability 0, space 0, times 0 [ 942.014947] CPU: 1 PID: 16228 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 942.022894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.032263] Call Trace: [ 942.035052] dump_stack+0x197/0x210 [ 942.038717] should_fail.cold+0xa/0x1b [ 942.042627] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 942.047766] ? sctp_bind_addr_state+0x1ab/0x340 [ 942.052453] ? find_held_lock+0x35/0x130 [ 942.056543] __should_failslab+0x121/0x190 [ 942.060875] should_failslab+0x9/0x14 [ 942.064692] kmem_cache_alloc_trace+0x4b/0x760 [ 942.069299] ? kasan_check_read+0x11/0x20 [ 942.073468] sctp_add_bind_addr+0x79/0x370 [ 942.077724] sctp_copy_local_addr_list+0x385/0x530 [ 942.082672] ? sctp_defaults_init+0xbe0/0xbe0 [ 942.087181] ? get_random_bytes+0x35/0x40 [ 942.091350] ? _get_random_bytes+0x197/0x400 [ 942.095770] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 942.100979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.106647] sctp_copy_one_addr+0x5f/0x170 [ 942.110902] ? sctp_copy_one_addr+0x5f/0x170 [ 942.115332] sctp_bind_addr_copy+0xfc/0x2c8 [ 942.119675] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 942.125232] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 942.129832] ? mark_held_locks+0xb1/0x100 [ 942.134003] ? sctp_autobind+0x1e0/0x1e0 [ 942.138077] ? lockdep_hardirqs_on+0x415/0x5d0 [ 942.142677] ? lock_sock_nested+0x9a/0x120 [ 942.146930] ? trace_hardirqs_on+0x67/0x220 [ 942.151369] ? lock_sock_nested+0x9a/0x120 [ 942.155726] ? __local_bh_enable_ip+0x15a/0x270 [ 942.160480] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 942.166047] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 942.171259] sctp_sendmsg+0x125a/0x17d0 [ 942.175262] ? sctp_id2assoc+0x2d0/0x2d0 [ 942.179337] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 942.184820] ? _copy_from_user+0xdd/0x150 [ 942.189012] inet_sendmsg+0x141/0x5d0 [ 942.192824] ? ipip_gro_receive+0x100/0x100 [ 942.197158] sock_sendmsg+0xd7/0x130 [ 942.200993] ___sys_sendmsg+0x803/0x920 [ 942.204992] ? copy_msghdr_from_user+0x430/0x430 [ 942.209777] ? lock_downgrade+0x880/0x880 07:25:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a422, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 942.213943] ? kasan_check_read+0x11/0x20 [ 942.218111] ? __fget+0x367/0x540 [ 942.221599] ? __fget_light+0x1a9/0x230 [ 942.225581] ? __fdget+0x1b/0x20 [ 942.228960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.234516] __sys_sendmsg+0x105/0x1d0 [ 942.238417] ? __ia32_sys_shutdown+0x80/0x80 [ 942.242864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 942.247645] ? do_syscall_64+0x26/0x620 [ 942.251637] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.257011] ? do_syscall_64+0x26/0x620 [ 942.261002] __x64_sys_sendmsg+0x78/0xb0 07:25:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e300000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 942.265084] do_syscall_64+0xfd/0x620 [ 942.268928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.274342] RIP: 0033:0x45b399 [ 942.277546] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 942.296464] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 942.304191] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 942.311471] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 942.318744] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 942.326026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 942.333307] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000000f 07:25:07 executing program 3 (fault-call:5 fault-nth:16): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xffffff8c, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 942.419477] FAULT_INJECTION: forcing a failure. [ 942.419477] name failslab, interval 1, probability 0, space 0, times 0 [ 942.434206] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 942.448232] CPU: 0 PID: 16234 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 942.456262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.465641] Call Trace: [ 942.468261] dump_stack+0x197/0x210 [ 942.471921] should_fail.cold+0xa/0x1b [ 942.475838] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 942.480998] ? sctp_bind_addr_state+0x1ab/0x340 [ 942.485698] ? find_held_lock+0x35/0x130 [ 942.489791] __should_failslab+0x121/0x190 [ 942.494051] should_failslab+0x9/0x14 [ 942.497885] kmem_cache_alloc_trace+0x4b/0x760 [ 942.502598] ? kasan_check_read+0x11/0x20 [ 942.506766] sctp_add_bind_addr+0x79/0x370 [ 942.511034] sctp_copy_local_addr_list+0x385/0x530 [ 942.515993] ? sctp_defaults_init+0xbe0/0xbe0 [ 942.520504] ? get_random_bytes+0x35/0x40 [ 942.524675] ? _get_random_bytes+0x197/0x400 [ 942.529530] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 942.534744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.540307] sctp_copy_one_addr+0x5f/0x170 [ 942.544564] ? sctp_copy_one_addr+0x5f/0x170 [ 942.549014] sctp_bind_addr_copy+0xfc/0x2c8 [ 942.553367] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 942.558936] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 942.563532] ? mark_held_locks+0xb1/0x100 [ 942.567707] ? sctp_autobind+0x1e0/0x1e0 [ 942.571972] ? lockdep_hardirqs_on+0x415/0x5d0 [ 942.576810] ? lock_sock_nested+0x9a/0x120 [ 942.581057] ? trace_hardirqs_on+0x67/0x220 [ 942.585400] ? lock_sock_nested+0x9a/0x120 [ 942.589656] ? __local_bh_enable_ip+0x15a/0x270 [ 942.594343] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 942.599901] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 942.605114] sctp_sendmsg+0x125a/0x17d0 [ 942.609118] ? sctp_id2assoc+0x2d0/0x2d0 [ 942.613195] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 942.618589] ? _copy_from_user+0xdd/0x150 [ 942.622778] inet_sendmsg+0x141/0x5d0 [ 942.626601] ? ipip_gro_receive+0x100/0x100 [ 942.630939] sock_sendmsg+0xd7/0x130 [ 942.634666] ___sys_sendmsg+0x803/0x920 [ 942.638663] ? copy_msghdr_from_user+0x430/0x430 [ 942.643461] ? lock_downgrade+0x880/0x880 [ 942.647633] ? kasan_check_read+0x11/0x20 [ 942.651812] ? __fget+0x367/0x540 [ 942.655402] ? __fget_light+0x1a9/0x230 [ 942.659396] ? __fdget+0x1b/0x20 [ 942.662880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.668440] __sys_sendmsg+0x105/0x1d0 [ 942.672376] ? __ia32_sys_shutdown+0x80/0x80 [ 942.676822] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 942.681599] ? do_syscall_64+0x26/0x620 [ 942.685696] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.691073] ? do_syscall_64+0x26/0x620 [ 942.695072] __x64_sys_sendmsg+0x78/0xb0 [ 942.699155] do_syscall_64+0xfd/0x620 [ 942.702983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.708184] RIP: 0033:0x45b399 [ 942.711394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 942.730481] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 942.738308] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 942.745602] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 942.752974] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 942.760255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 942.767538] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000010 07:25:08 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x8) 07:25:08 executing program 3 (fault-call:5 fault-nth:17): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x120a, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:08 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfffffff0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a423, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e400000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 942.984246] FAULT_INJECTION: forcing a failure. [ 942.984246] name failslab, interval 1, probability 0, space 0, times 0 [ 943.020473] CPU: 1 PID: 16252 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 943.028534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.037898] Call Trace: [ 943.040505] dump_stack+0x197/0x210 [ 943.044165] should_fail.cold+0xa/0x1b [ 943.048076] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.053199] ? sctp_bind_addr_state+0x1ab/0x340 [ 943.057885] ? find_held_lock+0x35/0x130 [ 943.061968] __should_failslab+0x121/0x190 [ 943.066220] should_failslab+0x9/0x14 [ 943.070047] kmem_cache_alloc_trace+0x4b/0x760 [ 943.074643] ? kasan_check_read+0x11/0x20 [ 943.078824] sctp_add_bind_addr+0x79/0x370 [ 943.083080] sctp_copy_local_addr_list+0x385/0x530 [ 943.088031] ? sctp_defaults_init+0xbe0/0xbe0 [ 943.092537] ? get_random_bytes+0x35/0x40 [ 943.096707] ? _get_random_bytes+0x197/0x400 [ 943.101233] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 943.106436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 943.111990] sctp_copy_one_addr+0x5f/0x170 [ 943.116241] ? sctp_copy_one_addr+0x5f/0x170 [ 943.120670] sctp_bind_addr_copy+0xfc/0x2c8 [ 943.125014] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 943.130682] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 943.135386] ? mark_held_locks+0xb1/0x100 [ 943.139552] ? sctp_autobind+0x1e0/0x1e0 [ 943.143629] ? lockdep_hardirqs_on+0x415/0x5d0 [ 943.148225] ? lock_sock_nested+0x9a/0x120 [ 943.152472] ? trace_hardirqs_on+0x67/0x220 [ 943.156811] ? lock_sock_nested+0x9a/0x120 [ 943.161059] ? __local_bh_enable_ip+0x15a/0x270 [ 943.165745] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 943.171305] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 943.176511] sctp_sendmsg+0x125a/0x17d0 [ 943.180508] ? sctp_id2assoc+0x2d0/0x2d0 [ 943.184583] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 943.189961] ? _copy_from_user+0xdd/0x150 [ 943.194144] inet_sendmsg+0x141/0x5d0 [ 943.197960] ? ipip_gro_receive+0x100/0x100 [ 943.202293] sock_sendmsg+0xd7/0x130 [ 943.206048] ___sys_sendmsg+0x803/0x920 [ 943.210036] ? copy_msghdr_from_user+0x430/0x430 [ 943.214811] ? lock_downgrade+0x880/0x880 [ 943.219082] ? kasan_check_read+0x11/0x20 [ 943.223246] ? __fget+0x367/0x540 [ 943.226726] ? __fget_light+0x1a9/0x230 [ 943.230711] ? __fdget+0x1b/0x20 [ 943.234088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 943.239652] __sys_sendmsg+0x105/0x1d0 [ 943.243554] ? __ia32_sys_shutdown+0x80/0x80 [ 943.247997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.252768] ? do_syscall_64+0x26/0x620 [ 943.256755] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.262132] ? do_syscall_64+0x26/0x620 [ 943.266120] __x64_sys_sendmsg+0x78/0xb0 [ 943.270201] do_syscall_64+0xfd/0x620 [ 943.274025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.279345] RIP: 0033:0x45b399 [ 943.282548] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 943.301484] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 943.309207] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 943.316485] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 943.323764] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 943.331046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 943.338434] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000011 [ 943.358431] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a424, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:08 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfffffff5, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:08 executing program 3 (fault-call:5 fault-nth:18): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 943.636466] FAULT_INJECTION: forcing a failure. [ 943.636466] name failslab, interval 1, probability 0, space 0, times 0 [ 943.677571] CPU: 0 PID: 16271 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 943.685506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.694884] Call Trace: [ 943.697498] dump_stack+0x197/0x210 [ 943.701149] should_fail.cold+0xa/0x1b [ 943.705072] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.710212] ? sctp_bind_addr_state+0x1ab/0x340 [ 943.714907] ? find_held_lock+0x35/0x130 [ 943.719001] __should_failslab+0x121/0x190 [ 943.723252] should_failslab+0x9/0x14 [ 943.727081] kmem_cache_alloc_trace+0x4b/0x760 [ 943.731798] ? kasan_check_read+0x11/0x20 [ 943.735977] sctp_add_bind_addr+0x79/0x370 [ 943.740237] sctp_copy_local_addr_list+0x385/0x530 [ 943.745190] ? sctp_defaults_init+0xbe0/0xbe0 [ 943.749702] ? get_random_bytes+0x35/0x40 [ 943.753870] ? _get_random_bytes+0x197/0x400 [ 943.758300] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 943.763517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 943.769163] sctp_copy_one_addr+0x5f/0x170 [ 943.773423] ? sctp_copy_one_addr+0x5f/0x170 [ 943.777966] sctp_bind_addr_copy+0xfc/0x2c8 [ 943.782316] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 943.787882] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 943.792488] ? mark_held_locks+0xb1/0x100 [ 943.796657] ? sctp_autobind+0x1e0/0x1e0 [ 943.800740] ? lockdep_hardirqs_on+0x415/0x5d0 [ 943.805343] ? lock_sock_nested+0x9a/0x120 [ 943.809601] ? trace_hardirqs_on+0x67/0x220 [ 943.813940] ? lock_sock_nested+0x9a/0x120 [ 943.818197] ? __local_bh_enable_ip+0x15a/0x270 [ 943.822885] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 943.828442] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 943.833660] sctp_sendmsg+0x125a/0x17d0 [ 943.837669] ? sctp_id2assoc+0x2d0/0x2d0 [ 943.841748] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 943.847128] ? _copy_from_user+0xdd/0x150 [ 943.851321] inet_sendmsg+0x141/0x5d0 [ 943.855370] ? ipip_gro_receive+0x100/0x100 [ 943.859715] sock_sendmsg+0xd7/0x130 [ 943.863476] ___sys_sendmsg+0x803/0x920 [ 943.867468] ? copy_msghdr_from_user+0x430/0x430 [ 943.872246] ? lock_downgrade+0x880/0x880 [ 943.876414] ? kasan_check_read+0x11/0x20 [ 943.880577] ? __fget+0x367/0x540 [ 943.884067] ? __fget_light+0x1a9/0x230 [ 943.888059] ? __fdget+0x1b/0x20 [ 943.891439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 943.896998] __sys_sendmsg+0x105/0x1d0 [ 943.900906] ? __ia32_sys_shutdown+0x80/0x80 [ 943.905351] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.910123] ? do_syscall_64+0x26/0x620 [ 943.914126] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.919516] ? do_syscall_64+0x26/0x620 [ 943.923516] __x64_sys_sendmsg+0x78/0xb0 [ 943.927591] do_syscall_64+0xfd/0x620 [ 943.931416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.936613] RIP: 0033:0x45b399 [ 943.939825] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 943.958838] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 943.966567] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfffffff6, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 943.973855] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 943.981142] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 943.988432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 943.995717] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000012 07:25:09 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0xa) 07:25:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 944.041524] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:09 executing program 3 (fault-call:5 fault-nth:19): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a425, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bffffffe400000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 944.206726] FAULT_INJECTION: forcing a failure. [ 944.206726] name failslab, interval 1, probability 0, space 0, times 0 [ 944.235508] CPU: 1 PID: 16288 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 944.243432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.252797] Call Trace: [ 944.255404] dump_stack+0x197/0x210 [ 944.259056] should_fail.cold+0xa/0x1b [ 944.262980] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 944.268111] ? sctp_bind_addr_state+0x1ab/0x340 [ 944.272793] ? find_held_lock+0x35/0x130 [ 944.276886] __should_failslab+0x121/0x190 [ 944.281146] should_failslab+0x9/0x14 [ 944.284965] kmem_cache_alloc_trace+0x4b/0x760 [ 944.289563] ? kasan_check_read+0x11/0x20 [ 944.293731] sctp_add_bind_addr+0x79/0x370 [ 944.297988] sctp_copy_local_addr_list+0x385/0x530 [ 944.302945] ? sctp_defaults_init+0xbe0/0xbe0 [ 944.307459] ? get_random_bytes+0x35/0x40 [ 944.311625] ? _get_random_bytes+0x197/0x400 [ 944.316049] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 944.321252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 944.326812] sctp_copy_one_addr+0x5f/0x170 [ 944.331060] ? sctp_copy_one_addr+0x5f/0x170 [ 944.335486] sctp_bind_addr_copy+0xfc/0x2c8 [ 944.339831] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 944.345388] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 944.349984] ? mark_held_locks+0xb1/0x100 [ 944.354154] ? sctp_autobind+0x1e0/0x1e0 [ 944.358232] ? lockdep_hardirqs_on+0x415/0x5d0 [ 944.362827] ? lock_sock_nested+0x9a/0x120 [ 944.367076] ? trace_hardirqs_on+0x67/0x220 [ 944.371413] ? lock_sock_nested+0x9a/0x120 [ 944.375666] ? __local_bh_enable_ip+0x15a/0x270 [ 944.380350] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 944.385903] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 944.391116] sctp_sendmsg+0x125a/0x17d0 [ 944.395416] ? sctp_id2assoc+0x2d0/0x2d0 [ 944.399503] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 944.404882] ? _copy_from_user+0xdd/0x150 [ 944.409066] inet_sendmsg+0x141/0x5d0 [ 944.412881] ? ipip_gro_receive+0x100/0x100 [ 944.417219] sock_sendmsg+0xd7/0x130 [ 944.420943] ___sys_sendmsg+0x803/0x920 [ 944.424947] ? copy_msghdr_from_user+0x430/0x430 [ 944.429727] ? lock_downgrade+0x880/0x880 [ 944.433886] ? kasan_check_read+0x11/0x20 [ 944.438047] ? __fget+0x367/0x540 [ 944.441546] ? __fget_light+0x1a9/0x230 [ 944.445550] ? __fdget+0x1b/0x20 [ 944.448932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 944.454489] __sys_sendmsg+0x105/0x1d0 [ 944.458393] ? __ia32_sys_shutdown+0x80/0x80 [ 944.462941] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 944.467717] ? do_syscall_64+0x26/0x620 [ 944.471819] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.477197] ? do_syscall_64+0x26/0x620 [ 944.481198] __x64_sys_sendmsg+0x78/0xb0 [ 944.485288] do_syscall_64+0xfd/0x620 [ 944.489111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.494385] RIP: 0033:0x45b399 [ 944.497602] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 944.516635] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 944.524493] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 944.531868] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 944.539149] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 944.546529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:25:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfffffffe, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a426, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:10 executing program 3 (fault-call:5 fault-nth:20): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 944.553809] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000013 [ 944.623790] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 944.657407] FAULT_INJECTION: forcing a failure. [ 944.657407] name failslab, interval 1, probability 0, space 0, times 0 [ 944.677308] CPU: 1 PID: 16299 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 944.685316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.694787] Call Trace: [ 944.697496] dump_stack+0x197/0x210 [ 944.701144] should_fail.cold+0xa/0x1b [ 944.705062] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 944.710189] ? sctp_bind_addr_state+0x1ab/0x340 [ 944.714887] ? find_held_lock+0x35/0x130 [ 944.718977] __should_failslab+0x121/0x190 [ 944.723234] should_failslab+0x9/0x14 [ 944.727056] kmem_cache_alloc_trace+0x4b/0x760 [ 944.731670] ? kasan_check_read+0x11/0x20 [ 944.735855] sctp_add_bind_addr+0x79/0x370 [ 944.740117] sctp_copy_local_addr_list+0x385/0x530 [ 944.745068] ? sctp_defaults_init+0xbe0/0xbe0 [ 944.749585] ? get_random_bytes+0x35/0x40 [ 944.753779] ? _get_random_bytes+0x197/0x400 [ 944.758206] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 944.763421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 944.768986] sctp_copy_one_addr+0x5f/0x170 [ 944.773235] ? sctp_copy_one_addr+0x5f/0x170 [ 944.777664] sctp_bind_addr_copy+0xfc/0x2c8 [ 944.782033] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 944.787597] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 944.792215] ? mark_held_locks+0xb1/0x100 [ 944.796381] ? sctp_autobind+0x1e0/0x1e0 [ 944.800462] ? lockdep_hardirqs_on+0x415/0x5d0 [ 944.805228] ? lock_sock_nested+0x9a/0x120 [ 944.809480] ? trace_hardirqs_on+0x67/0x220 [ 944.813818] ? lock_sock_nested+0x9a/0x120 [ 944.818077] ? __local_bh_enable_ip+0x15a/0x270 [ 944.822883] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 944.828435] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 944.833642] sctp_sendmsg+0x125a/0x17d0 [ 944.837647] ? sctp_id2assoc+0x2d0/0x2d0 [ 944.841728] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 944.847114] ? _copy_from_user+0xdd/0x150 [ 944.851310] inet_sendmsg+0x141/0x5d0 [ 944.855134] ? ipip_gro_receive+0x100/0x100 [ 944.859467] sock_sendmsg+0xd7/0x130 [ 944.863209] ___sys_sendmsg+0x803/0x920 [ 944.867299] ? copy_msghdr_from_user+0x430/0x430 [ 944.872081] ? lock_downgrade+0x880/0x880 [ 944.876256] ? kasan_check_read+0x11/0x20 [ 944.880425] ? __fget+0x367/0x540 [ 944.884048] ? __fget_light+0x1a9/0x230 [ 944.888042] ? __fdget+0x1b/0x20 [ 944.891425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 944.896986] __sys_sendmsg+0x105/0x1d0 [ 944.900897] ? __ia32_sys_shutdown+0x80/0x80 [ 944.905336] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 944.910115] ? do_syscall_64+0x26/0x620 [ 944.914106] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.919486] ? do_syscall_64+0x26/0x620 [ 944.923659] __x64_sys_sendmsg+0x78/0xb0 [ 944.927826] do_syscall_64+0xfd/0x620 [ 944.931650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.936856] RIP: 0033:0x45b399 [ 944.940180] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 944.959099] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 944.966917] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2200, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:10 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0xc) [ 944.974207] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 944.981490] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 944.988773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 944.996061] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000014 07:25:10 executing program 3 (fault-call:5 fault-nth:21): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a427, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 945.074223] selinux_nlmsg_perm: 826 callbacks suppressed [ 945.074240] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 07:25:10 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xedc000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 945.135267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 [ 945.151140] FAULT_INJECTION: forcing a failure. [ 945.151140] name failslab, interval 1, probability 0, space 0, times 0 [ 945.163450] CPU: 1 PID: 16310 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 945.171360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.180723] Call Trace: [ 945.183341] dump_stack+0x197/0x210 [ 945.186998] should_fail.cold+0xa/0x1b [ 945.190915] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 945.196034] ? sctp_bind_addr_state+0x1ab/0x340 [ 945.200763] ? find_held_lock+0x35/0x130 [ 945.204863] __should_failslab+0x121/0x190 [ 945.209118] should_failslab+0x9/0x14 [ 945.212931] kmem_cache_alloc_trace+0x4b/0x760 [ 945.217537] ? kasan_check_read+0x11/0x20 [ 945.221868] sctp_add_bind_addr+0x79/0x370 [ 945.226150] sctp_copy_local_addr_list+0x385/0x530 [ 945.231105] ? sctp_defaults_init+0xbe0/0xbe0 [ 945.235614] ? get_random_bytes+0x35/0x40 [ 945.240917] ? _get_random_bytes+0x197/0x400 [ 945.245340] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 945.250548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 945.251931] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 [ 945.256098] sctp_copy_one_addr+0x5f/0x170 [ 945.256116] ? sctp_copy_one_addr+0x5f/0x170 [ 945.256137] sctp_bind_addr_copy+0xfc/0x2c8 [ 945.256161] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 945.286748] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 945.291348] ? mark_held_locks+0xb1/0x100 [ 945.295512] ? sctp_autobind+0x1e0/0x1e0 [ 945.299592] ? lockdep_hardirqs_on+0x415/0x5d0 [ 945.304194] ? lock_sock_nested+0x9a/0x120 [ 945.308446] ? trace_hardirqs_on+0x67/0x220 [ 945.312783] ? lock_sock_nested+0x9a/0x120 [ 945.314109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 [ 945.317028] ? __local_bh_enable_ip+0x15a/0x270 [ 945.317046] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 945.317065] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 945.317089] sctp_sendmsg+0x125a/0x17d0 [ 945.348997] ? sctp_id2assoc+0x2d0/0x2d0 [ 945.353070] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 945.358455] ? _copy_from_user+0xdd/0x150 [ 945.362642] inet_sendmsg+0x141/0x5d0 [ 945.366464] ? ipip_gro_receive+0x100/0x100 [ 945.370803] sock_sendmsg+0xd7/0x130 [ 945.372110] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 [ 945.374541] ___sys_sendmsg+0x803/0x920 [ 945.374562] ? copy_msghdr_from_user+0x430/0x430 [ 945.374586] ? lock_downgrade+0x880/0x880 [ 945.374604] ? kasan_check_read+0x11/0x20 [ 945.374623] ? __fget+0x367/0x540 [ 945.407190] ? __fget_light+0x1a9/0x230 [ 945.411190] ? __fdget+0x1b/0x20 [ 945.414577] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 945.420147] __sys_sendmsg+0x105/0x1d0 [ 945.423859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 [ 945.424048] ? __ia32_sys_shutdown+0x80/0x80 [ 945.440524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.445300] ? do_syscall_64+0x26/0x620 [ 945.449294] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.454673] ? do_syscall_64+0x26/0x620 [ 945.458671] __x64_sys_sendmsg+0x78/0xb0 [ 945.462759] do_syscall_64+0xfd/0x620 [ 945.466578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.470781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 [ 945.471948] RIP: 0033:0x45b399 [ 945.471964] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 945.471973] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 945.471989] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 945.471999] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 945.472008] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e500000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 945.472016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 945.472028] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000015 [ 945.512087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 [ 945.578310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 07:25:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2300, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a428, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 945.624957] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 945.631061] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16307 comm=syz-executor.0 07:25:11 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:11 executing program 3 (fault-call:5 fault-nth:22): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e600000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x25ec, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:11 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:11 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0xe) 07:25:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x260b, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 946.088818] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 946.098785] FAULT_INJECTION: forcing a failure. [ 946.098785] name failslab, interval 1, probability 0, space 0, times 0 [ 946.117178] CPU: 0 PID: 16343 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 946.125084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.134451] Call Trace: [ 946.137063] dump_stack+0x197/0x210 [ 946.140714] should_fail.cold+0xa/0x1b [ 946.144638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 946.149764] ? sctp_bind_addr_state+0x1ab/0x340 [ 946.154565] ? find_held_lock+0x35/0x130 [ 946.158677] __should_failslab+0x121/0x190 [ 946.163034] should_failslab+0x9/0x14 [ 946.166852] kmem_cache_alloc_trace+0x4b/0x760 [ 946.171446] ? kasan_check_read+0x11/0x20 [ 946.175605] sctp_add_bind_addr+0x79/0x370 [ 946.179848] sctp_copy_local_addr_list+0x385/0x530 [ 946.184784] ? sctp_defaults_init+0xbe0/0xbe0 [ 946.189279] ? get_random_bytes+0x35/0x40 [ 946.193430] ? _get_random_bytes+0x197/0x400 [ 946.197841] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 946.203029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 946.208568] sctp_copy_one_addr+0x5f/0x170 [ 946.212804] ? sctp_copy_one_addr+0x5f/0x170 [ 946.217207] sctp_bind_addr_copy+0xfc/0x2c8 [ 946.221550] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 946.227104] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 946.231684] ? mark_held_locks+0xb1/0x100 [ 946.235837] ? sctp_autobind+0x1e0/0x1e0 [ 946.239896] ? lockdep_hardirqs_on+0x415/0x5d0 [ 946.244490] ? lock_sock_nested+0x9a/0x120 [ 946.248748] ? trace_hardirqs_on+0x67/0x220 [ 946.253070] ? lock_sock_nested+0x9a/0x120 [ 946.258092] ? __local_bh_enable_ip+0x15a/0x270 [ 946.262760] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 946.268296] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 946.273483] sctp_sendmsg+0x125a/0x17d0 [ 946.277575] ? sctp_id2assoc+0x2d0/0x2d0 [ 946.281633] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 946.287014] ? _copy_from_user+0xdd/0x150 [ 946.291191] inet_sendmsg+0x141/0x5d0 [ 946.294997] ? ipip_gro_receive+0x100/0x100 [ 946.299331] sock_sendmsg+0xd7/0x130 [ 946.303051] ___sys_sendmsg+0x803/0x920 [ 946.307021] ? copy_msghdr_from_user+0x430/0x430 [ 946.311793] ? lock_downgrade+0x880/0x880 [ 946.315963] ? kasan_check_read+0x11/0x20 [ 946.320125] ? __fget+0x367/0x540 [ 946.323603] ? __fget_light+0x1a9/0x230 [ 946.327571] ? __fdget+0x1b/0x20 [ 946.330943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 946.336490] __sys_sendmsg+0x105/0x1d0 [ 946.340383] ? __ia32_sys_shutdown+0x80/0x80 [ 946.345067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 946.349828] ? do_syscall_64+0x26/0x620 [ 946.353808] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.359190] ? do_syscall_64+0x26/0x620 [ 946.363173] __x64_sys_sendmsg+0x78/0xb0 [ 946.367231] do_syscall_64+0xfd/0x620 [ 946.371034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.376338] RIP: 0033:0x45b399 [ 946.379527] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 946.398427] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 946.406153] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 946.413420] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 946.420695] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 946.427963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 946.435234] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000016 07:25:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a429, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:12 executing program 3 (fault-call:5 fault-nth:23): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000000e700000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2804, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8040000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 946.816776] FAULT_INJECTION: forcing a failure. [ 946.816776] name failslab, interval 1, probability 0, space 0, times 0 [ 946.828053] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 946.837103] CPU: 1 PID: 16368 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 946.845106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.854472] Call Trace: [ 946.857083] dump_stack+0x197/0x210 [ 946.860732] should_fail.cold+0xa/0x1b [ 946.864635] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 946.869749] ? sctp_bind_addr_state+0x1ab/0x340 [ 946.874434] ? find_held_lock+0x35/0x130 [ 946.878515] __should_failslab+0x121/0x190 [ 946.882764] should_failslab+0x9/0x14 [ 946.886571] kmem_cache_alloc_trace+0x4b/0x760 [ 946.891168] ? kasan_check_read+0x11/0x20 [ 946.895331] sctp_add_bind_addr+0x79/0x370 [ 946.899583] sctp_copy_local_addr_list+0x385/0x530 [ 946.904532] ? sctp_defaults_init+0xbe0/0xbe0 [ 946.909034] ? get_random_bytes+0x35/0x40 [ 946.913191] ? _get_random_bytes+0x197/0x400 [ 946.917614] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 946.922821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 946.928376] sctp_copy_one_addr+0x5f/0x170 [ 946.932621] ? sctp_copy_one_addr+0x5f/0x170 [ 946.937044] sctp_bind_addr_copy+0xfc/0x2c8 [ 946.941406] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 946.946972] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 946.951567] ? mark_held_locks+0xb1/0x100 [ 946.955729] ? sctp_autobind+0x1e0/0x1e0 [ 946.959799] ? lockdep_hardirqs_on+0x415/0x5d0 [ 946.964389] ? lock_sock_nested+0x9a/0x120 [ 946.968630] ? trace_hardirqs_on+0x67/0x220 [ 946.972970] ? lock_sock_nested+0x9a/0x120 [ 946.977212] ? __local_bh_enable_ip+0x15a/0x270 [ 946.981887] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 946.987435] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 946.992645] sctp_sendmsg+0x125a/0x17d0 [ 946.996636] ? sctp_id2assoc+0x2d0/0x2d0 [ 947.000706] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 947.006078] ? _copy_from_user+0xdd/0x150 [ 947.010258] inet_sendmsg+0x141/0x5d0 [ 947.014069] ? ipip_gro_receive+0x100/0x100 [ 947.018399] sock_sendmsg+0xd7/0x130 [ 947.022120] ___sys_sendmsg+0x803/0x920 [ 947.026103] ? copy_msghdr_from_user+0x430/0x430 [ 947.030873] ? lock_downgrade+0x880/0x880 [ 947.035031] ? kasan_check_read+0x11/0x20 [ 947.039191] ? __fget+0x367/0x540 [ 947.042674] ? __fget_light+0x1a9/0x230 [ 947.046655] ? __fdget+0x1b/0x20 [ 947.050025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 947.055575] __sys_sendmsg+0x105/0x1d0 [ 947.059482] ? __ia32_sys_shutdown+0x80/0x80 [ 947.063908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 947.068673] ? do_syscall_64+0x26/0x620 [ 947.072658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.078117] ? do_syscall_64+0x26/0x620 [ 947.082110] __x64_sys_sendmsg+0x78/0xb0 [ 947.086179] do_syscall_64+0xfd/0x620 [ 947.089991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.095187] RIP: 0033:0x45b399 [ 947.098394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:25:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a42a, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 947.117303] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 947.125017] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 947.132291] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 947.139698] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 947.147099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 947.154380] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000017 07:25:12 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0xf) 07:25:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2c00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:12 executing program 3 (fault-call:5 fault-nth:24): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e700000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a42b, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 947.356963] FAULT_INJECTION: forcing a failure. [ 947.356963] name failslab, interval 1, probability 0, space 0, times 0 [ 947.431144] CPU: 1 PID: 16383 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 947.439253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.448615] Call Trace: [ 947.451219] dump_stack+0x197/0x210 [ 947.454874] should_fail.cold+0xa/0x1b [ 947.458782] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 947.463901] ? sctp_bind_addr_state+0x1ab/0x340 [ 947.468583] ? find_held_lock+0x35/0x130 [ 947.472663] __should_failslab+0x121/0x190 [ 947.476909] should_failslab+0x9/0x14 [ 947.480727] kmem_cache_alloc_trace+0x4b/0x760 [ 947.485320] ? kasan_check_read+0x11/0x20 [ 947.489489] sctp_add_bind_addr+0x79/0x370 [ 947.493743] sctp_copy_local_addr_list+0x385/0x530 [ 947.498699] ? sctp_defaults_init+0xbe0/0xbe0 [ 947.503200] ? get_random_bytes+0x35/0x40 [ 947.507359] ? _get_random_bytes+0x197/0x400 [ 947.511779] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 947.516979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 947.522532] sctp_copy_one_addr+0x5f/0x170 [ 947.526781] ? sctp_copy_one_addr+0x5f/0x170 [ 947.531226] sctp_bind_addr_copy+0xfc/0x2c8 [ 947.535599] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 947.541153] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 947.545750] ? mark_held_locks+0xb1/0x100 [ 947.549918] ? sctp_autobind+0x1e0/0x1e0 [ 947.553988] ? lockdep_hardirqs_on+0x415/0x5d0 [ 947.558584] ? lock_sock_nested+0x9a/0x120 [ 947.562839] ? trace_hardirqs_on+0x67/0x220 [ 947.567177] ? lock_sock_nested+0x9a/0x120 [ 947.571436] ? __local_bh_enable_ip+0x15a/0x270 [ 947.576117] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 947.581669] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 947.586877] sctp_sendmsg+0x125a/0x17d0 [ 947.590884] ? sctp_id2assoc+0x2d0/0x2d0 [ 947.594962] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 947.600342] ? _copy_from_user+0xdd/0x150 [ 947.604523] inet_sendmsg+0x141/0x5d0 [ 947.608331] ? ipip_gro_receive+0x100/0x100 [ 947.612663] sock_sendmsg+0xd7/0x130 [ 947.616400] ___sys_sendmsg+0x803/0x920 [ 947.620389] ? copy_msghdr_from_user+0x430/0x430 [ 947.625168] ? lock_downgrade+0x880/0x880 [ 947.629339] ? kasan_check_read+0x11/0x20 [ 947.633499] ? __fget+0x367/0x540 [ 947.636983] ? __fget_light+0x1a9/0x230 [ 947.640970] ? __fdget+0x1b/0x20 [ 947.644346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 947.649899] __sys_sendmsg+0x105/0x1d0 [ 947.653810] ? __ia32_sys_shutdown+0x80/0x80 [ 947.658244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 947.663009] ? do_syscall_64+0x26/0x620 [ 947.667012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.672386] ? do_syscall_64+0x26/0x620 [ 947.676378] __x64_sys_sendmsg+0x78/0xb0 [ 947.680452] do_syscall_64+0xfd/0x620 [ 947.684271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.689557] RIP: 0033:0x45b399 [ 947.692766] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 947.711682] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 947.719521] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e800000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2c04, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 947.726801] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 947.734086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 947.741369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 947.748648] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000018 07:25:13 executing program 3 (fault-call:5 fault-nth:25): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a42c, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 947.830789] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 947.878421] FAULT_INJECTION: forcing a failure. [ 947.878421] name failslab, interval 1, probability 0, space 0, times 0 [ 947.891106] CPU: 1 PID: 16402 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 947.899008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.908367] Call Trace: [ 947.910981] dump_stack+0x197/0x210 [ 947.914639] should_fail.cold+0xa/0x1b [ 947.918553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 947.923673] ? sctp_bind_addr_state+0x1ab/0x340 [ 947.928359] ? find_held_lock+0x35/0x130 [ 947.932438] __should_failslab+0x121/0x190 [ 947.936687] should_failslab+0x9/0x14 [ 947.940523] kmem_cache_alloc_trace+0x4b/0x760 [ 947.945119] ? kasan_check_read+0x11/0x20 [ 947.949286] sctp_add_bind_addr+0x79/0x370 [ 947.953538] sctp_copy_local_addr_list+0x385/0x530 [ 947.958484] ? sctp_defaults_init+0xbe0/0xbe0 [ 947.962988] ? get_random_bytes+0x35/0x40 [ 947.967157] ? _get_random_bytes+0x197/0x400 [ 947.971578] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 947.976785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 947.982351] sctp_copy_one_addr+0x5f/0x170 [ 947.986596] ? sctp_copy_one_addr+0x5f/0x170 [ 947.991133] sctp_bind_addr_copy+0xfc/0x2c8 [ 947.995477] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 948.001038] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 948.005643] ? mark_held_locks+0xb1/0x100 [ 948.009813] ? sctp_autobind+0x1e0/0x1e0 [ 948.013889] ? lockdep_hardirqs_on+0x415/0x5d0 [ 948.018484] ? lock_sock_nested+0x9a/0x120 [ 948.022731] ? trace_hardirqs_on+0x67/0x220 [ 948.027065] ? lock_sock_nested+0x9a/0x120 [ 948.031318] ? __local_bh_enable_ip+0x15a/0x270 [ 948.036009] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 948.041562] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 948.046772] sctp_sendmsg+0x125a/0x17d0 [ 948.050768] ? sctp_id2assoc+0x2d0/0x2d0 [ 948.054845] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 948.060224] ? _copy_from_user+0xdd/0x150 [ 948.064414] inet_sendmsg+0x141/0x5d0 [ 948.068229] ? ipip_gro_receive+0x100/0x100 [ 948.072566] sock_sendmsg+0xd7/0x130 [ 948.076291] ___sys_sendmsg+0x803/0x920 [ 948.080280] ? copy_msghdr_from_user+0x430/0x430 [ 948.085057] ? lock_downgrade+0x880/0x880 [ 948.089316] ? kasan_check_read+0x11/0x20 [ 948.093482] ? __fget+0x367/0x540 [ 948.096968] ? __fget_light+0x1a9/0x230 [ 948.100966] ? __fdget+0x1b/0x20 [ 948.104347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 948.109898] __sys_sendmsg+0x105/0x1d0 [ 948.113799] ? __ia32_sys_shutdown+0x80/0x80 [ 948.118242] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.123026] ? do_syscall_64+0x26/0x620 [ 948.127018] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.132399] ? do_syscall_64+0x26/0x620 [ 948.136401] __x64_sys_sendmsg+0x78/0xb0 [ 948.140482] do_syscall_64+0xfd/0x620 [ 948.144300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.149500] RIP: 0033:0x45b399 [ 948.152705] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.171615] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2d04, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6b6b6b00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:13 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x10) [ 948.179337] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 948.186613] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 948.193890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 948.201175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 948.208454] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000019 07:25:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a42d, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:13 executing program 3 (fault-call:5 fault-nth:26): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266e900000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2e04, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 948.393581] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 948.404848] FAULT_INJECTION: forcing a failure. [ 948.404848] name failslab, interval 1, probability 0, space 0, times 0 07:25:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x100000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 948.456372] CPU: 0 PID: 16422 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 948.464302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.473670] Call Trace: [ 948.476286] dump_stack+0x197/0x210 [ 948.479937] should_fail.cold+0xa/0x1b [ 948.483840] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.488949] ? sctp_bind_addr_state+0x1ab/0x340 [ 948.493638] ? find_held_lock+0x35/0x130 [ 948.497720] __should_failslab+0x121/0x190 [ 948.501977] should_failslab+0x9/0x14 [ 948.505793] kmem_cache_alloc_trace+0x4b/0x760 [ 948.510389] ? kasan_check_read+0x11/0x20 [ 948.514553] sctp_add_bind_addr+0x79/0x370 [ 948.518821] sctp_copy_local_addr_list+0x385/0x530 [ 948.523768] ? sctp_defaults_init+0xbe0/0xbe0 [ 948.528271] ? get_random_bytes+0x35/0x40 [ 948.532432] ? _get_random_bytes+0x197/0x400 [ 948.536863] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 948.542086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 948.547761] sctp_copy_one_addr+0x5f/0x170 [ 948.552013] ? sctp_copy_one_addr+0x5f/0x170 [ 948.556448] sctp_bind_addr_copy+0xfc/0x2c8 [ 948.561507] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 948.567068] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 948.571670] ? mark_held_locks+0xb1/0x100 [ 948.575835] ? sctp_autobind+0x1e0/0x1e0 [ 948.579927] ? lockdep_hardirqs_on+0x415/0x5d0 [ 948.584521] ? lock_sock_nested+0x9a/0x120 [ 948.588765] ? trace_hardirqs_on+0x67/0x220 [ 948.593101] ? lock_sock_nested+0x9a/0x120 [ 948.597351] ? __local_bh_enable_ip+0x15a/0x270 [ 948.602031] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 948.607579] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 948.612900] sctp_sendmsg+0x125a/0x17d0 [ 948.616898] ? sctp_id2assoc+0x2d0/0x2d0 [ 948.620986] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 948.626374] ? _copy_from_user+0xdd/0x150 [ 948.630562] inet_sendmsg+0x141/0x5d0 [ 948.634376] ? ipip_gro_receive+0x100/0x100 [ 948.638706] sock_sendmsg+0xd7/0x130 [ 948.642432] ___sys_sendmsg+0x803/0x920 [ 948.646418] ? copy_msghdr_from_user+0x430/0x430 [ 948.651193] ? lock_downgrade+0x880/0x880 [ 948.655357] ? kasan_check_read+0x11/0x20 [ 948.659522] ? __fget+0x367/0x540 [ 948.663012] ? __fget_light+0x1a9/0x230 [ 948.667002] ? __fdget+0x1b/0x20 [ 948.670382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 948.675935] __sys_sendmsg+0x105/0x1d0 [ 948.679843] ? __ia32_sys_shutdown+0x80/0x80 [ 948.684275] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.689043] ? do_syscall_64+0x26/0x620 [ 948.693029] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.698404] ? do_syscall_64+0x26/0x620 [ 948.703094] __x64_sys_sendmsg+0x78/0xb0 [ 948.707168] do_syscall_64+0xfd/0x620 [ 948.710989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.716183] RIP: 0033:0x45b399 [ 948.719381] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.738291] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 948.746026] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 948.753302] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 948.760584] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 948.767860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 948.775139] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000001a 07:25:14 executing program 3 (fault-call:5 fault-nth:27): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2f04, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:14 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x200000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 949.018991] FAULT_INJECTION: forcing a failure. [ 949.018991] name failslab, interval 1, probability 0, space 0, times 0 07:25:14 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x11) [ 949.083566] CPU: 0 PID: 16434 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 949.091496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.100859] Call Trace: [ 949.103476] dump_stack+0x197/0x210 [ 949.107130] should_fail.cold+0xa/0x1b [ 949.111048] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.116173] ? sctp_bind_addr_state+0x1ab/0x340 [ 949.120865] ? find_held_lock+0x35/0x130 [ 949.124955] __should_failslab+0x121/0x190 [ 949.129212] should_failslab+0x9/0x14 [ 949.133031] kmem_cache_alloc_trace+0x4b/0x760 [ 949.137626] ? kasan_check_read+0x11/0x20 [ 949.141787] sctp_add_bind_addr+0x79/0x370 [ 949.146032] sctp_copy_local_addr_list+0x385/0x530 [ 949.151093] ? sctp_defaults_init+0xbe0/0xbe0 [ 949.155612] ? get_random_bytes+0x35/0x40 [ 949.159766] ? _get_random_bytes+0x197/0x400 [ 949.164179] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 949.169470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.175054] sctp_copy_one_addr+0x5f/0x170 [ 949.179293] ? sctp_copy_one_addr+0x5f/0x170 [ 949.183707] sctp_bind_addr_copy+0xfc/0x2c8 [ 949.188044] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 949.193587] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 949.198164] ? mark_held_locks+0xb1/0x100 [ 949.202318] ? sctp_autobind+0x1e0/0x1e0 [ 949.206376] ? lockdep_hardirqs_on+0x415/0x5d0 [ 949.210951] ? lock_sock_nested+0x9a/0x120 [ 949.215177] ? trace_hardirqs_on+0x67/0x220 [ 949.219505] ? lock_sock_nested+0x9a/0x120 [ 949.223738] ? __local_bh_enable_ip+0x15a/0x270 [ 949.228400] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 949.233938] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 949.239134] sctp_sendmsg+0x125a/0x17d0 [ 949.243112] ? sctp_id2assoc+0x2d0/0x2d0 [ 949.247165] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 949.252723] ? _copy_from_user+0xdd/0x150 [ 949.256892] inet_sendmsg+0x141/0x5d0 [ 949.260695] ? ipip_gro_receive+0x100/0x100 [ 949.265012] sock_sendmsg+0xd7/0x130 [ 949.268717] ___sys_sendmsg+0x803/0x920 [ 949.272687] ? copy_msghdr_from_user+0x430/0x430 [ 949.277657] ? lock_downgrade+0x880/0x880 [ 949.281805] ? kasan_check_read+0x11/0x20 [ 949.285969] ? __fget+0x367/0x540 [ 949.289443] ? __fget_light+0x1a9/0x230 [ 949.293616] ? __fdget+0x1b/0x20 [ 949.296990] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 949.302538] __sys_sendmsg+0x105/0x1d0 [ 949.306421] ? __ia32_sys_shutdown+0x80/0x80 [ 949.310831] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.315579] ? do_syscall_64+0x26/0x620 [ 949.319562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.325056] ? do_syscall_64+0x26/0x620 [ 949.329039] __x64_sys_sendmsg+0x78/0xb0 [ 949.333094] do_syscall_64+0xfd/0x620 [ 949.336894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.342077] RIP: 0033:0x45b399 [ 949.345273] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.364166] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 949.371866] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000002ea00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 949.380429] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 949.387687] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 949.394949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 949.402210] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000001b 07:25:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a42e, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 949.463485] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:14 executing program 3 (fault-call:5 fault-nth:28): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3004, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ea00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x300000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 949.798815] FAULT_INJECTION: forcing a failure. [ 949.798815] name failslab, interval 1, probability 0, space 0, times 0 [ 949.841191] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 949.841556] CPU: 0 PID: 16461 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 949.857702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.867047] Call Trace: [ 949.869631] dump_stack+0x197/0x210 [ 949.873253] should_fail.cold+0xa/0x1b [ 949.877132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.882244] ? sctp_bind_addr_state+0x1ab/0x340 [ 949.886906] ? find_held_lock+0x35/0x130 [ 949.890969] __should_failslab+0x121/0x190 [ 949.895196] should_failslab+0x9/0x14 [ 949.898988] kmem_cache_alloc_trace+0x4b/0x760 [ 949.903575] ? kasan_check_read+0x11/0x20 [ 949.907718] sctp_add_bind_addr+0x79/0x370 [ 949.911950] sctp_copy_local_addr_list+0x385/0x530 [ 949.916874] ? sctp_defaults_init+0xbe0/0xbe0 [ 949.921360] ? get_random_bytes+0x35/0x40 [ 949.925522] ? _get_random_bytes+0x197/0x400 [ 949.929933] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 949.935120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.940654] sctp_copy_one_addr+0x5f/0x170 [ 949.944880] ? sctp_copy_one_addr+0x5f/0x170 [ 949.949291] sctp_bind_addr_copy+0xfc/0x2c8 [ 949.953616] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 949.959167] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 949.963744] ? mark_held_locks+0xb1/0x100 [ 949.969024] ? sctp_autobind+0x1e0/0x1e0 [ 949.973083] ? lockdep_hardirqs_on+0x415/0x5d0 [ 949.977663] ? lock_sock_nested+0x9a/0x120 [ 949.981912] ? trace_hardirqs_on+0x67/0x220 [ 949.986252] ? lock_sock_nested+0x9a/0x120 [ 949.990485] ? __local_bh_enable_ip+0x15a/0x270 [ 949.995160] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 950.000706] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 950.005919] sctp_sendmsg+0x125a/0x17d0 [ 950.009920] ? sctp_id2assoc+0x2d0/0x2d0 [ 950.013974] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 950.019345] ? _copy_from_user+0xdd/0x150 [ 950.023523] inet_sendmsg+0x141/0x5d0 [ 950.027331] ? ipip_gro_receive+0x100/0x100 [ 950.031667] sock_sendmsg+0xd7/0x130 [ 950.035391] ___sys_sendmsg+0x803/0x920 [ 950.039374] ? copy_msghdr_from_user+0x430/0x430 [ 950.044134] ? lock_downgrade+0x880/0x880 [ 950.048280] ? kasan_check_read+0x11/0x20 [ 950.052442] ? __fget+0x367/0x540 [ 950.055920] ? __fget_light+0x1a9/0x230 [ 950.059898] ? __fdget+0x1b/0x20 [ 950.063269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 950.068807] __sys_sendmsg+0x105/0x1d0 [ 950.072699] ? __ia32_sys_shutdown+0x80/0x80 [ 950.077108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.081857] ? do_syscall_64+0x26/0x620 [ 950.085831] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.091185] ? do_syscall_64+0x26/0x620 [ 950.095155] __x64_sys_sendmsg+0x78/0xb0 [ 950.099212] do_syscall_64+0xfd/0x620 [ 950.103009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.108188] RIP: 0033:0x45b399 [ 950.111376] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.130279] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x30a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 950.137986] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 950.145250] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 950.152604] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 950.159865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 950.167128] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000001c 07:25:15 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x12) 07:25:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3104, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:15 executing program 3 (fault-call:5 fault-nth:29): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x400000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a42f, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266eb00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 950.369509] FAULT_INJECTION: forcing a failure. [ 950.369509] name failslab, interval 1, probability 0, space 0, times 0 [ 950.416667] CPU: 1 PID: 16475 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 950.424598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.433960] Call Trace: [ 950.436562] dump_stack+0x197/0x210 [ 950.440212] should_fail.cold+0xa/0x1b [ 950.444117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.449234] ? sctp_bind_addr_state+0x1ab/0x340 [ 950.453914] ? find_held_lock+0x35/0x130 [ 950.458004] __should_failslab+0x121/0x190 [ 950.462253] should_failslab+0x9/0x14 [ 950.466064] kmem_cache_alloc_trace+0x4b/0x760 [ 950.470659] ? kasan_check_read+0x11/0x20 [ 950.474824] sctp_add_bind_addr+0x79/0x370 [ 950.479075] sctp_copy_local_addr_list+0x385/0x530 [ 950.484025] ? sctp_defaults_init+0xbe0/0xbe0 [ 950.488531] ? get_random_bytes+0x35/0x40 [ 950.492694] ? _get_random_bytes+0x197/0x400 [ 950.497113] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 950.502313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.507872] sctp_copy_one_addr+0x5f/0x170 [ 950.512118] ? sctp_copy_one_addr+0x5f/0x170 [ 950.516541] sctp_bind_addr_copy+0xfc/0x2c8 [ 950.520880] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 950.526435] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 950.531037] ? mark_held_locks+0xb1/0x100 [ 950.535197] ? sctp_autobind+0x1e0/0x1e0 [ 950.539270] ? lockdep_hardirqs_on+0x415/0x5d0 [ 950.543860] ? lock_sock_nested+0x9a/0x120 [ 950.548114] ? trace_hardirqs_on+0x67/0x220 [ 950.552440] ? lock_sock_nested+0x9a/0x120 [ 950.556686] ? __local_bh_enable_ip+0x15a/0x270 [ 950.561366] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 950.566921] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 950.572131] sctp_sendmsg+0x125a/0x17d0 [ 950.576129] ? sctp_id2assoc+0x2d0/0x2d0 [ 950.580203] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 950.585755] ? _copy_from_user+0xdd/0x150 [ 950.587850] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 950.589932] inet_sendmsg+0x141/0x5d0 [ 950.589951] ? ipip_gro_receive+0x100/0x100 [ 950.589969] sock_sendmsg+0xd7/0x130 [ 950.589986] ___sys_sendmsg+0x803/0x920 [ 950.590005] ? copy_msghdr_from_user+0x430/0x430 [ 950.590027] ? lock_downgrade+0x880/0x880 [ 950.590051] ? kasan_check_read+0x11/0x20 [ 950.590070] ? __fget+0x367/0x540 [ 950.590099] ? __fget_light+0x1a9/0x230 [ 950.635065] ? __fdget+0x1b/0x20 [ 950.638444] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 950.644001] __sys_sendmsg+0x105/0x1d0 [ 950.647899] ? __ia32_sys_shutdown+0x80/0x80 [ 950.652332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.657099] ? do_syscall_64+0x26/0x620 [ 950.661081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.666454] ? do_syscall_64+0x26/0x620 [ 950.670443] __x64_sys_sendmsg+0x78/0xb0 [ 950.674520] do_syscall_64+0xfd/0x620 [ 950.678339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.683541] RIP: 0033:0x45b399 [ 950.686743] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.705648] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:16 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3204, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 950.713370] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 950.720647] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 950.727925] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 950.735200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 950.742474] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000001d 07:25:16 executing program 3 (fault-call:5 fault-nth:30): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a430, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ec00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 950.873263] FAULT_INJECTION: forcing a failure. [ 950.873263] name failslab, interval 1, probability 0, space 0, times 0 [ 950.908237] CPU: 1 PID: 16488 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 950.916161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.925521] Call Trace: [ 950.928121] dump_stack+0x197/0x210 [ 950.931771] should_fail.cold+0xa/0x1b [ 950.935678] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.940796] ? sctp_bind_addr_state+0x1ab/0x340 [ 950.945482] ? find_held_lock+0x35/0x130 [ 950.949563] __should_failslab+0x121/0x190 [ 950.953806] should_failslab+0x9/0x14 [ 950.957621] kmem_cache_alloc_trace+0x4b/0x760 [ 950.962217] ? kasan_check_read+0x11/0x20 [ 950.966388] sctp_add_bind_addr+0x79/0x370 [ 950.970644] sctp_copy_local_addr_list+0x385/0x530 [ 950.975587] ? sctp_defaults_init+0xbe0/0xbe0 [ 950.980091] ? get_random_bytes+0x35/0x40 [ 950.984253] ? _get_random_bytes+0x197/0x400 [ 950.988672] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 950.993877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.999431] sctp_copy_one_addr+0x5f/0x170 [ 951.003676] ? sctp_copy_one_addr+0x5f/0x170 [ 951.008096] sctp_bind_addr_copy+0xfc/0x2c8 [ 951.012441] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 951.018007] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 951.022606] ? mark_held_locks+0xb1/0x100 [ 951.026772] ? sctp_autobind+0x1e0/0x1e0 [ 951.030852] ? lockdep_hardirqs_on+0x415/0x5d0 [ 951.035444] ? lock_sock_nested+0x9a/0x120 [ 951.039688] ? trace_hardirqs_on+0x67/0x220 [ 951.044083] ? lock_sock_nested+0x9a/0x120 [ 951.048350] ? __local_bh_enable_ip+0x15a/0x270 [ 951.053035] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 951.058588] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 951.063969] sctp_sendmsg+0x125a/0x17d0 [ 951.067968] ? sctp_id2assoc+0x2d0/0x2d0 [ 951.072056] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 951.077525] ? _copy_from_user+0xdd/0x150 [ 951.081718] inet_sendmsg+0x141/0x5d0 [ 951.085532] ? ipip_gro_receive+0x100/0x100 [ 951.089887] sock_sendmsg+0xd7/0x130 [ 951.093612] ___sys_sendmsg+0x803/0x920 [ 951.097701] ? copy_msghdr_from_user+0x430/0x430 [ 951.102480] ? lock_downgrade+0x880/0x880 [ 951.106641] ? kasan_check_read+0x11/0x20 [ 951.110811] ? __fget+0x367/0x540 [ 951.114319] ? __fget_light+0x1a9/0x230 [ 951.118308] ? __fdget+0x1b/0x20 [ 951.121682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.127237] __sys_sendmsg+0x105/0x1d0 [ 951.131139] ? __ia32_sys_shutdown+0x80/0x80 [ 951.135715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.140512] ? do_syscall_64+0x26/0x620 [ 951.144504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.149877] ? do_syscall_64+0x26/0x620 [ 951.153888] __x64_sys_sendmsg+0x78/0xb0 [ 951.157974] do_syscall_64+0xfd/0x620 [ 951.161799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.166997] RIP: 0033:0x45b399 [ 951.171156] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.190079] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 951.197805] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 951.205081] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 951.212360] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:16 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x13) [ 951.219632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 951.226913] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000001e 07:25:16 executing program 3 (fault-call:5 fault-nth:31): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a431, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 951.287069] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x500000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 951.372640] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 951.421826] FAULT_INJECTION: forcing a failure. [ 951.421826] name failslab, interval 1, probability 0, space 0, times 0 [ 951.451475] CPU: 0 PID: 16507 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 951.459385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.468834] Call Trace: [ 951.471442] dump_stack+0x197/0x210 [ 951.475096] should_fail.cold+0xa/0x1b [ 951.479003] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.484126] ? sctp_bind_addr_state+0x1ab/0x340 [ 951.488821] ? find_held_lock+0x35/0x130 [ 951.492912] __should_failslab+0x121/0x190 [ 951.497164] should_failslab+0x9/0x14 [ 951.500989] kmem_cache_alloc_trace+0x4b/0x760 [ 951.505588] ? kasan_check_read+0x11/0x20 [ 951.509758] sctp_add_bind_addr+0x79/0x370 [ 951.514027] sctp_copy_local_addr_list+0x385/0x530 [ 951.518982] ? sctp_defaults_init+0xbe0/0xbe0 [ 951.523509] ? get_random_bytes+0x35/0x40 [ 951.527678] ? _get_random_bytes+0x197/0x400 [ 951.532099] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 951.537300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.542860] sctp_copy_one_addr+0x5f/0x170 [ 951.547116] ? sctp_copy_one_addr+0x5f/0x170 [ 951.551541] sctp_bind_addr_copy+0xfc/0x2c8 [ 951.555885] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 951.561556] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 951.566161] ? mark_held_locks+0xb1/0x100 [ 951.570430] ? sctp_autobind+0x1e0/0x1e0 [ 951.574510] ? lockdep_hardirqs_on+0x415/0x5d0 [ 951.579111] ? lock_sock_nested+0x9a/0x120 [ 951.583403] ? trace_hardirqs_on+0x67/0x220 [ 951.587743] ? lock_sock_nested+0x9a/0x120 [ 951.591990] ? __local_bh_enable_ip+0x15a/0x270 [ 951.596673] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 951.602230] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 951.607437] sctp_sendmsg+0x125a/0x17d0 [ 951.611447] ? sctp_id2assoc+0x2d0/0x2d0 [ 951.615523] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 951.620900] ? _copy_from_user+0xdd/0x150 [ 951.625088] inet_sendmsg+0x141/0x5d0 [ 951.628908] ? ipip_gro_receive+0x100/0x100 [ 951.633243] sock_sendmsg+0xd7/0x130 [ 951.636978] ___sys_sendmsg+0x803/0x920 [ 951.641093] ? copy_msghdr_from_user+0x430/0x430 [ 951.645960] ? lock_downgrade+0x880/0x880 [ 951.650122] ? kasan_check_read+0x11/0x20 [ 951.654289] ? __fget+0x367/0x540 [ 951.657809] ? __fget_light+0x1a9/0x230 [ 951.661808] ? __fdget+0x1b/0x20 [ 951.665187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.670752] __sys_sendmsg+0x105/0x1d0 [ 951.674658] ? __ia32_sys_shutdown+0x80/0x80 [ 951.679122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.683906] ? do_syscall_64+0x26/0x620 [ 951.687910] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.693287] ? do_syscall_64+0x26/0x620 [ 951.697297] __x64_sys_sendmsg+0x78/0xb0 [ 951.701382] do_syscall_64+0xfd/0x620 [ 951.705200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.710408] RIP: 0033:0x45b399 [ 951.713614] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.732525] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 951.740355] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 951.748249] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 951.755531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 951.762990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 951.770449] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000001f 07:25:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3304, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:17 executing program 3 (fault-call:5 fault-nth:32): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x50a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a432, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 951.956797] FAULT_INJECTION: forcing a failure. [ 951.956797] name failslab, interval 1, probability 0, space 0, times 0 [ 952.003168] CPU: 0 PID: 16517 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 952.011194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.020570] Call Trace: [ 952.023210] dump_stack+0x197/0x210 [ 952.026867] should_fail.cold+0xa/0x1b [ 952.030780] ? retint_kernel+0x2d/0x2d [ 952.034687] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 952.039799] ? sctp_bind_addr_state+0x1ab/0x340 [ 952.044481] ? find_held_lock+0x35/0x130 [ 952.048673] __should_failslab+0x121/0x190 [ 952.052926] should_failslab+0x9/0x14 [ 952.056750] kmem_cache_alloc_trace+0x4b/0x760 [ 952.061353] ? kasan_check_read+0x11/0x20 [ 952.065527] sctp_add_bind_addr+0x79/0x370 [ 952.069790] sctp_copy_local_addr_list+0x385/0x530 [ 952.074742] ? sctp_defaults_init+0xbe0/0xbe0 [ 952.079247] ? get_random_bytes+0x35/0x40 [ 952.083408] ? _get_random_bytes+0x197/0x400 [ 952.087825] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 952.093036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.098599] sctp_copy_one_addr+0x5f/0x170 [ 952.102852] ? sctp_copy_one_addr+0x5f/0x170 [ 952.107285] sctp_bind_addr_copy+0xfc/0x2c8 [ 952.111769] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 952.117337] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 952.121941] ? mark_held_locks+0xb1/0x100 [ 952.126110] ? sctp_autobind+0x1e0/0x1e0 [ 952.130183] ? lockdep_hardirqs_on+0x415/0x5d0 [ 952.134778] ? lock_sock_nested+0x9a/0x120 [ 952.139042] ? trace_hardirqs_on+0x67/0x220 [ 952.143414] ? lock_sock_nested+0x9a/0x120 [ 952.147671] ? __local_bh_enable_ip+0x15a/0x270 [ 952.152352] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 952.158022] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 952.163245] sctp_sendmsg+0x125a/0x17d0 [ 952.167246] ? sctp_id2assoc+0x2d0/0x2d0 [ 952.171322] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 952.176817] ? _copy_from_user+0xdd/0x150 [ 952.181004] inet_sendmsg+0x141/0x5d0 [ 952.184830] ? ipip_gro_receive+0x100/0x100 [ 952.189165] sock_sendmsg+0xd7/0x130 [ 952.192902] ___sys_sendmsg+0x803/0x920 [ 952.196891] ? copy_msghdr_from_user+0x430/0x430 [ 952.201671] ? lock_downgrade+0x880/0x880 [ 952.205842] ? kasan_check_read+0x11/0x20 [ 952.210029] ? __fget+0x367/0x540 [ 952.213522] ? __fget_light+0x1a9/0x230 [ 952.217518] ? __fdget+0x1b/0x20 [ 952.220906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.226462] __sys_sendmsg+0x105/0x1d0 [ 952.230375] ? __ia32_sys_shutdown+0x80/0x80 [ 952.234967] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 952.239754] ? do_syscall_64+0x26/0x620 [ 952.243747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.249122] ? do_syscall_64+0x26/0x620 [ 952.253115] __x64_sys_sendmsg+0x78/0xb0 [ 952.257189] do_syscall_64+0xfd/0x620 [ 952.261005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.266207] RIP: 0033:0x45b399 [ 952.269424] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.288336] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 952.296054] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:17 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x14) 07:25:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ed00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 952.303332] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 952.310612] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 952.317886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 952.325165] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000020 07:25:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3404, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a433, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:17 executing program 3 (fault-call:5 fault-nth:33): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 952.452843] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ee00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x600000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 952.556071] FAULT_INJECTION: forcing a failure. [ 952.556071] name failslab, interval 1, probability 0, space 0, times 0 [ 952.582315] CPU: 1 PID: 16537 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 952.590238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.599598] Call Trace: [ 952.602201] dump_stack+0x197/0x210 [ 952.605849] should_fail.cold+0xa/0x1b [ 952.609757] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 952.614878] ? sctp_bind_addr_state+0x1ab/0x340 [ 952.619582] ? find_held_lock+0x35/0x130 [ 952.623670] __should_failslab+0x121/0x190 [ 952.627914] should_failslab+0x9/0x14 [ 952.631871] kmem_cache_alloc_trace+0x4b/0x760 [ 952.636471] ? kasan_check_read+0x11/0x20 [ 952.640637] sctp_add_bind_addr+0x79/0x370 [ 952.644889] sctp_copy_local_addr_list+0x385/0x530 [ 952.649834] ? sctp_defaults_init+0xbe0/0xbe0 [ 952.654338] ? get_random_bytes+0x35/0x40 [ 952.658496] ? _get_random_bytes+0x197/0x400 [ 952.662913] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 952.668122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.673676] sctp_copy_one_addr+0x5f/0x170 [ 952.678045] ? sctp_copy_one_addr+0x5f/0x170 [ 952.682468] sctp_bind_addr_copy+0xfc/0x2c8 [ 952.686812] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 952.692368] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 952.696961] ? mark_held_locks+0xb1/0x100 [ 952.701125] ? sctp_autobind+0x1e0/0x1e0 [ 952.705283] ? lockdep_hardirqs_on+0x415/0x5d0 [ 952.709876] ? lock_sock_nested+0x9a/0x120 [ 952.714120] ? trace_hardirqs_on+0x67/0x220 [ 952.718455] ? lock_sock_nested+0x9a/0x120 [ 952.722702] ? __local_bh_enable_ip+0x15a/0x270 [ 952.727387] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 952.732942] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 952.734468] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 952.738152] sctp_sendmsg+0x125a/0x17d0 [ 952.738180] ? sctp_id2assoc+0x2d0/0x2d0 [ 952.738199] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 952.738221] ? _copy_from_user+0xdd/0x150 [ 952.738257] inet_sendmsg+0x141/0x5d0 [ 952.738272] ? ipip_gro_receive+0x100/0x100 [ 952.738288] sock_sendmsg+0xd7/0x130 [ 952.738306] ___sys_sendmsg+0x803/0x920 [ 952.738328] ? copy_msghdr_from_user+0x430/0x430 [ 952.785061] ? lock_downgrade+0x880/0x880 [ 952.789229] ? kasan_check_read+0x11/0x20 [ 952.793398] ? __fget+0x367/0x540 [ 952.796886] ? __fget_light+0x1a9/0x230 [ 952.800874] ? __fdget+0x1b/0x20 [ 952.804285] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.809866] __sys_sendmsg+0x105/0x1d0 [ 952.814411] ? __ia32_sys_shutdown+0x80/0x80 [ 952.818848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 952.823624] ? do_syscall_64+0x26/0x620 [ 952.827615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.832990] ? do_syscall_64+0x26/0x620 [ 952.837091] __x64_sys_sendmsg+0x78/0xb0 [ 952.841175] do_syscall_64+0xfd/0x620 [ 952.845014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.850218] RIP: 0033:0x45b399 [ 952.853485] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.872419] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 952.880141] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 952.887428] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 952.894713] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a434, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:18 executing program 3 (fault-call:5 fault-nth:34): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 952.902000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 952.909394] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000021 07:25:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000001ef00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x60a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 953.091747] FAULT_INJECTION: forcing a failure. [ 953.091747] name failslab, interval 1, probability 0, space 0, times 0 [ 953.148352] CPU: 0 PID: 16549 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 953.156292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.165753] Call Trace: [ 953.168368] dump_stack+0x197/0x210 [ 953.172024] should_fail.cold+0xa/0x1b [ 953.175948] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 953.181066] ? sctp_bind_addr_state+0x1ab/0x340 [ 953.185756] ? find_held_lock+0x35/0x130 [ 953.189870] __should_failslab+0x121/0x190 [ 953.194122] should_failslab+0x9/0x14 [ 953.197930] kmem_cache_alloc_trace+0x4b/0x760 [ 953.202638] ? kasan_check_read+0x11/0x20 [ 953.206807] sctp_add_bind_addr+0x79/0x370 [ 953.211066] sctp_copy_local_addr_list+0x385/0x530 [ 953.216355] ? sctp_defaults_init+0xbe0/0xbe0 [ 953.220866] ? get_random_bytes+0x35/0x40 [ 953.225030] ? _get_random_bytes+0x197/0x400 [ 953.229460] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 953.234666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 953.240334] sctp_copy_one_addr+0x5f/0x170 [ 953.244583] ? sctp_copy_one_addr+0x5f/0x170 [ 953.249020] sctp_bind_addr_copy+0xfc/0x2c8 [ 953.253365] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 953.259045] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 953.263737] ? mark_held_locks+0xb1/0x100 [ 953.267906] ? sctp_autobind+0x1e0/0x1e0 [ 953.271981] ? lockdep_hardirqs_on+0x415/0x5d0 [ 953.276585] ? lock_sock_nested+0x9a/0x120 [ 953.280827] ? trace_hardirqs_on+0x67/0x220 [ 953.285146] ? lock_sock_nested+0x9a/0x120 [ 953.289387] ? __local_bh_enable_ip+0x15a/0x270 [ 953.294062] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 953.299602] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 953.304789] sctp_sendmsg+0x125a/0x17d0 [ 953.308806] ? sctp_id2assoc+0x2d0/0x2d0 [ 953.312867] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 953.318228] ? _copy_from_user+0xdd/0x150 [ 953.322387] inet_sendmsg+0x141/0x5d0 [ 953.326203] ? ipip_gro_receive+0x100/0x100 [ 953.330529] sock_sendmsg+0xd7/0x130 [ 953.334232] ___sys_sendmsg+0x803/0x920 [ 953.338196] ? copy_msghdr_from_user+0x430/0x430 [ 953.342952] ? lock_downgrade+0x880/0x880 [ 953.347103] ? kasan_check_read+0x11/0x20 [ 953.351263] ? __fget+0x367/0x540 [ 953.354840] ? __fget_light+0x1a9/0x230 [ 953.358808] ? __fdget+0x1b/0x20 [ 953.362173] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 953.367716] __sys_sendmsg+0x105/0x1d0 [ 953.371600] ? __ia32_sys_shutdown+0x80/0x80 [ 953.376127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 953.380892] ? do_syscall_64+0x26/0x620 [ 953.384861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.390225] ? do_syscall_64+0x26/0x620 [ 953.394210] __x64_sys_sendmsg+0x78/0xb0 [ 953.398271] do_syscall_64+0xfd/0x620 [ 953.402077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.407270] RIP: 0033:0x45b399 [ 953.410464] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 953.429362] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 953.437067] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3504, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:18 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x15) [ 953.444334] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 953.451620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 953.458898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 953.466158] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000022 07:25:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x700000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:19 executing program 3 (fault-call:5 fault-nth:35): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 953.666501] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a435, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 953.763565] FAULT_INJECTION: forcing a failure. [ 953.763565] name failslab, interval 1, probability 0, space 0, times 0 [ 953.780558] CPU: 1 PID: 16569 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 953.788580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.797944] Call Trace: [ 953.800552] dump_stack+0x197/0x210 [ 953.804207] should_fail.cold+0xa/0x1b [ 953.808124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 953.813248] ? sctp_bind_addr_state+0x1ab/0x340 [ 953.817942] ? find_held_lock+0x35/0x130 [ 953.822032] __should_failslab+0x121/0x190 [ 953.826291] should_failslab+0x9/0x14 [ 953.830110] kmem_cache_alloc_trace+0x4b/0x760 [ 953.834712] ? kasan_check_read+0x11/0x20 [ 953.838881] sctp_add_bind_addr+0x79/0x370 [ 953.843136] sctp_copy_local_addr_list+0x385/0x530 [ 953.848095] ? sctp_defaults_init+0xbe0/0xbe0 [ 953.852625] ? get_random_bytes+0x35/0x40 [ 953.856793] ? _get_random_bytes+0x197/0x400 [ 953.861218] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 953.866432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 953.872000] sctp_copy_one_addr+0x5f/0x170 [ 953.876358] ? sctp_copy_one_addr+0x5f/0x170 [ 953.883402] sctp_bind_addr_copy+0xfc/0x2c8 [ 953.887835] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 953.893412] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 953.898019] ? mark_held_locks+0xb1/0x100 [ 953.902275] ? sctp_autobind+0x1e0/0x1e0 [ 953.906366] ? lockdep_hardirqs_on+0x415/0x5d0 [ 953.910961] ? lock_sock_nested+0x9a/0x120 [ 953.915270] ? trace_hardirqs_on+0x67/0x220 [ 953.919616] ? lock_sock_nested+0x9a/0x120 [ 953.923867] ? __local_bh_enable_ip+0x15a/0x270 [ 953.928552] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 953.934105] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 953.939317] sctp_sendmsg+0x125a/0x17d0 [ 953.943316] ? sctp_id2assoc+0x2d0/0x2d0 [ 953.947416] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 953.952822] ? _copy_from_user+0xdd/0x150 [ 953.957015] inet_sendmsg+0x141/0x5d0 [ 953.960844] ? ipip_gro_receive+0x100/0x100 [ 953.965180] sock_sendmsg+0xd7/0x130 [ 953.968912] ___sys_sendmsg+0x803/0x920 [ 953.972913] ? copy_msghdr_from_user+0x430/0x430 [ 953.977697] ? lock_downgrade+0x880/0x880 [ 953.981876] ? kasan_check_read+0x11/0x20 [ 953.986042] ? __fget+0x367/0x540 [ 953.989535] ? __fget_light+0x1a9/0x230 [ 953.993528] ? __fdget+0x1b/0x20 [ 953.996907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 954.002467] __sys_sendmsg+0x105/0x1d0 [ 954.006420] ? __ia32_sys_shutdown+0x80/0x80 [ 954.010861] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 954.015640] ? do_syscall_64+0x26/0x620 [ 954.019632] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 954.025105] ? do_syscall_64+0x26/0x620 [ 954.029108] __x64_sys_sendmsg+0x78/0xb0 [ 954.033194] do_syscall_64+0xfd/0x620 [ 954.037031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 954.042228] RIP: 0033:0x45b399 [ 954.045437] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:25:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ef00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 954.064358] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 954.073143] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 954.080428] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 954.087707] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 954.094988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 954.102296] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000023 07:25:19 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x16) 07:25:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x70a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3604, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:19 executing program 3 (fault-call:5 fault-nth:36): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 954.157055] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 954.283733] FAULT_INJECTION: forcing a failure. [ 954.283733] name failslab, interval 1, probability 0, space 0, times 0 [ 954.308022] CPU: 1 PID: 16582 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 954.308032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.308036] Call Trace: [ 954.308062] dump_stack+0x197/0x210 [ 954.308086] should_fail.cold+0xa/0x1b [ 954.308139] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 954.308154] ? sctp_bind_addr_state+0x1ab/0x340 [ 954.308176] ? find_held_lock+0x35/0x130 [ 954.349994] __should_failslab+0x121/0x190 [ 954.354251] should_failslab+0x9/0x14 [ 954.358063] kmem_cache_alloc_trace+0x4b/0x760 [ 954.362664] ? kasan_check_read+0x11/0x20 [ 954.366835] sctp_add_bind_addr+0x79/0x370 [ 954.371092] sctp_copy_local_addr_list+0x385/0x530 [ 954.376150] ? sctp_defaults_init+0xbe0/0xbe0 [ 954.380719] ? get_random_bytes+0x35/0x40 [ 954.384891] ? _get_random_bytes+0x197/0x400 [ 954.389410] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 954.394616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 954.400170] sctp_copy_one_addr+0x5f/0x170 [ 954.404419] ? sctp_copy_one_addr+0x5f/0x170 [ 954.408845] sctp_bind_addr_copy+0xfc/0x2c8 [ 954.413198] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 954.418833] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 954.423452] ? mark_held_locks+0xb1/0x100 [ 954.427620] ? sctp_autobind+0x1e0/0x1e0 [ 954.431715] ? lockdep_hardirqs_on+0x415/0x5d0 [ 954.436310] ? lock_sock_nested+0x9a/0x120 [ 954.440559] ? trace_hardirqs_on+0x67/0x220 [ 954.444984] ? lock_sock_nested+0x9a/0x120 [ 954.449237] ? __local_bh_enable_ip+0x15a/0x270 [ 954.453923] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 954.459475] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 954.464690] sctp_sendmsg+0x125a/0x17d0 [ 954.468696] ? sctp_id2assoc+0x2d0/0x2d0 [ 954.472772] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 954.478155] ? _copy_from_user+0xdd/0x150 [ 954.482343] inet_sendmsg+0x141/0x5d0 [ 954.486172] ? ipip_gro_receive+0x100/0x100 [ 954.490513] sock_sendmsg+0xd7/0x130 [ 954.494266] ___sys_sendmsg+0x803/0x920 [ 954.498782] ? copy_msghdr_from_user+0x430/0x430 [ 954.503788] ? lock_downgrade+0x880/0x880 [ 954.507960] ? kasan_check_read+0x11/0x20 [ 954.512135] ? __fget+0x367/0x540 [ 954.515678] ? __fget_light+0x1a9/0x230 [ 954.519664] ? __fdget+0x1b/0x20 [ 954.523039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 954.528607] __sys_sendmsg+0x105/0x1d0 [ 954.532509] ? __ia32_sys_shutdown+0x80/0x80 [ 954.536946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 954.541714] ? do_syscall_64+0x26/0x620 [ 954.545703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 954.551081] ? do_syscall_64+0x26/0x620 [ 954.555128] __x64_sys_sendmsg+0x78/0xb0 [ 954.559207] do_syscall_64+0xfd/0x620 [ 954.563030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 954.568230] RIP: 0033:0x45b399 [ 954.571552] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 954.590593] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 954.598326] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 954.605607] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 954.612891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 954.620170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 954.627459] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000024 07:25:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x80a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a436, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:20 executing program 3 (fault-call:5 fault-nth:37): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x900000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3704, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 954.880366] FAULT_INJECTION: forcing a failure. [ 954.880366] name failslab, interval 1, probability 0, space 0, times 0 [ 954.903988] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 954.917091] CPU: 1 PID: 16596 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 954.925000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.934372] Call Trace: [ 954.936980] dump_stack+0x197/0x210 [ 954.940629] should_fail.cold+0xa/0x1b [ 954.944541] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 954.949677] ? sctp_bind_addr_state+0x1ab/0x340 [ 954.954373] ? find_held_lock+0x35/0x130 [ 954.958466] __should_failslab+0x121/0x190 [ 954.962720] should_failslab+0x9/0x14 [ 954.966539] kmem_cache_alloc_trace+0x4b/0x760 [ 954.971144] ? kasan_check_read+0x11/0x20 [ 954.975316] sctp_add_bind_addr+0x79/0x370 [ 954.979582] sctp_copy_local_addr_list+0x385/0x530 [ 954.984533] ? sctp_defaults_init+0xbe0/0xbe0 [ 954.989182] ? get_random_bytes+0x35/0x40 [ 954.993362] ? _get_random_bytes+0x197/0x400 [ 954.997822] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 955.003039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 955.008641] sctp_copy_one_addr+0x5f/0x170 [ 955.012923] ? sctp_copy_one_addr+0x5f/0x170 [ 955.017472] sctp_bind_addr_copy+0xfc/0x2c8 [ 955.021826] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 955.027492] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 955.032142] ? mark_held_locks+0xb1/0x100 [ 955.036317] ? sctp_autobind+0x1e0/0x1e0 [ 955.040401] ? lockdep_hardirqs_on+0x415/0x5d0 [ 955.045006] ? lock_sock_nested+0x9a/0x120 [ 955.049258] ? trace_hardirqs_on+0x67/0x220 [ 955.053600] ? lock_sock_nested+0x9a/0x120 [ 955.057938] ? __local_bh_enable_ip+0x15a/0x270 [ 955.062755] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 955.068312] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 955.073523] sctp_sendmsg+0x125a/0x17d0 07:25:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a437, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 955.077523] ? sctp_id2assoc+0x2d0/0x2d0 [ 955.081598] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 955.086981] ? _copy_from_user+0xdd/0x150 [ 955.091173] inet_sendmsg+0x141/0x5d0 [ 955.095001] ? ipip_gro_receive+0x100/0x100 [ 955.099361] sock_sendmsg+0xd7/0x130 [ 955.103102] ___sys_sendmsg+0x803/0x920 [ 955.107096] ? copy_msghdr_from_user+0x430/0x430 [ 955.111915] ? lock_downgrade+0x880/0x880 [ 955.116091] ? kasan_check_read+0x11/0x20 [ 955.120260] ? __fget+0x367/0x540 [ 955.123746] ? __fget_light+0x1a9/0x230 [ 955.127735] ? __fdget+0x1b/0x20 [ 955.131110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 955.136663] __sys_sendmsg+0x105/0x1d0 [ 955.140565] ? __ia32_sys_shutdown+0x80/0x80 [ 955.145002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 955.149772] ? do_syscall_64+0x26/0x620 [ 955.153760] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.159142] ? do_syscall_64+0x26/0x620 [ 955.163148] __x64_sys_sendmsg+0x78/0xb0 [ 955.167233] do_syscall_64+0xfd/0x620 [ 955.171058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.176361] RIP: 0033:0x45b399 [ 955.179592] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 955.198511] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 955.206235] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 955.214021] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 955.221304] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:20 executing program 3 (fault-call:5 fault-nth:38): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:20 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x18) [ 955.228586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 955.235867] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000025 [ 955.341884] FAULT_INJECTION: forcing a failure. [ 955.341884] name failslab, interval 1, probability 0, space 0, times 0 07:25:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x90a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 955.414533] CPU: 1 PID: 16611 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 955.422612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.431985] Call Trace: [ 955.434591] dump_stack+0x197/0x210 [ 955.438240] should_fail.cold+0xa/0x1b [ 955.442147] ? sctp_bind_addr_state+0x1ab/0x340 [ 955.446836] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 955.451956] ? sctp_bind_addr_state+0x1ab/0x340 [ 955.456636] ? find_held_lock+0x35/0x130 [ 955.460717] __should_failslab+0x121/0x190 [ 955.464969] should_failslab+0x9/0x14 [ 955.468785] kmem_cache_alloc_trace+0x4b/0x760 [ 955.473386] ? kasan_check_read+0x11/0x20 [ 955.477559] sctp_add_bind_addr+0x79/0x370 [ 955.481819] sctp_copy_local_addr_list+0x385/0x530 [ 955.486772] ? sctp_defaults_init+0xbe0/0xbe0 [ 955.491283] ? get_random_bytes+0x35/0x40 [ 955.495449] ? _get_random_bytes+0x197/0x400 [ 955.500072] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 955.505274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 955.510833] sctp_copy_one_addr+0x5f/0x170 [ 955.515714] ? sctp_copy_one_addr+0x5f/0x170 [ 955.520151] sctp_bind_addr_copy+0xfc/0x2c8 [ 955.524493] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 955.530058] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 955.534668] ? mark_held_locks+0xb1/0x100 [ 955.539070] ? sctp_autobind+0x1e0/0x1e0 [ 955.543168] ? lockdep_hardirqs_on+0x415/0x5d0 [ 955.547753] ? lock_sock_nested+0x9a/0x120 [ 955.551983] ? trace_hardirqs_on+0x67/0x220 [ 955.556312] ? lock_sock_nested+0x9a/0x120 [ 955.560555] ? __local_bh_enable_ip+0x15a/0x270 [ 955.565218] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 955.570752] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 955.575938] sctp_sendmsg+0x125a/0x17d0 [ 955.580017] ? sctp_id2assoc+0x2d0/0x2d0 [ 955.584080] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 955.589441] ? _copy_from_user+0xdd/0x150 [ 955.593722] inet_sendmsg+0x141/0x5d0 [ 955.597523] ? ipip_gro_receive+0x100/0x100 [ 955.601837] sock_sendmsg+0xd7/0x130 [ 955.605610] ___sys_sendmsg+0x803/0x920 [ 955.609662] ? copy_msghdr_from_user+0x430/0x430 [ 955.615130] ? lock_downgrade+0x880/0x880 [ 955.619284] ? kasan_check_read+0x11/0x20 [ 955.623431] ? __fget+0x367/0x540 [ 955.626887] ? __fget_light+0x1a9/0x230 [ 955.630872] ? __fdget+0x1b/0x20 [ 955.634247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 955.639807] __sys_sendmsg+0x105/0x1d0 [ 955.643700] ? __ia32_sys_shutdown+0x80/0x80 [ 955.648138] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 955.652894] ? do_syscall_64+0x26/0x620 [ 955.656873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.662341] ? do_syscall_64+0x26/0x620 [ 955.666308] __x64_sys_sendmsg+0x78/0xb0 [ 955.670378] do_syscall_64+0xfd/0x620 [ 955.674317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.679507] RIP: 0033:0x45b399 [ 955.682817] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 955.701924] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bfffffff000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 955.709627] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 955.716896] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 955.724303] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 955.731565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 955.738927] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000026 07:25:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3f00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:21 executing program 3 (fault-call:5 fault-nth:39): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a438, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:21 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 955.838536] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 955.951610] FAULT_INJECTION: forcing a failure. [ 955.951610] name failslab, interval 1, probability 0, space 0, times 0 [ 955.996920] CPU: 0 PID: 16627 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 956.004961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.015082] Call Trace: [ 956.017796] dump_stack+0x197/0x210 [ 956.021454] should_fail.cold+0xa/0x1b [ 956.025517] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 956.030639] ? sctp_bind_addr_state+0x1ab/0x340 [ 956.035327] ? find_held_lock+0x35/0x130 [ 956.039433] __should_failslab+0x121/0x190 [ 956.043693] should_failslab+0x9/0x14 [ 956.047511] kmem_cache_alloc_trace+0x4b/0x760 [ 956.052116] ? kasan_check_read+0x11/0x20 [ 956.056638] sctp_add_bind_addr+0x79/0x370 [ 956.060909] sctp_copy_local_addr_list+0x385/0x530 [ 956.065969] ? sctp_defaults_init+0xbe0/0xbe0 [ 956.070480] ? get_random_bytes+0x35/0x40 [ 956.074658] ? _get_random_bytes+0x197/0x400 [ 956.079085] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 956.084296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 956.089860] sctp_copy_one_addr+0x5f/0x170 [ 956.094119] ? sctp_copy_one_addr+0x5f/0x170 [ 956.098549] sctp_bind_addr_copy+0xfc/0x2c8 [ 956.103155] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 956.108831] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 956.113438] ? mark_held_locks+0xb1/0x100 [ 956.117632] ? sctp_autobind+0x1e0/0x1e0 [ 956.121714] ? lockdep_hardirqs_on+0x415/0x5d0 [ 956.126317] ? lock_sock_nested+0x9a/0x120 [ 956.130575] ? trace_hardirqs_on+0x67/0x220 [ 956.134918] ? lock_sock_nested+0x9a/0x120 [ 956.139179] ? __local_bh_enable_ip+0x15a/0x270 [ 956.143869] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 956.149527] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 956.154745] sctp_sendmsg+0x125a/0x17d0 [ 956.158749] ? sctp_id2assoc+0x2d0/0x2d0 [ 956.162831] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 956.168312] ? _copy_from_user+0xdd/0x150 [ 956.172503] inet_sendmsg+0x141/0x5d0 [ 956.176360] ? ipip_gro_receive+0x100/0x100 [ 956.180693] sock_sendmsg+0xd7/0x130 [ 956.184446] ___sys_sendmsg+0x803/0x920 [ 956.188445] ? copy_msghdr_from_user+0x430/0x430 [ 956.193220] ? lock_downgrade+0x880/0x880 [ 956.197404] ? kasan_check_read+0x11/0x20 [ 956.201572] ? __fget+0x367/0x540 [ 956.205058] ? __fget_light+0x1a9/0x230 [ 956.209046] ? __fdget+0x1b/0x20 [ 956.212421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 956.217980] __sys_sendmsg+0x105/0x1d0 [ 956.221886] ? __ia32_sys_shutdown+0x80/0x80 [ 956.226324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 956.231095] ? do_syscall_64+0x26/0x620 [ 956.235077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.240458] ? do_syscall_64+0x26/0x620 [ 956.244451] __x64_sys_sendmsg+0x78/0xb0 [ 956.248535] do_syscall_64+0xfd/0x620 [ 956.252357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.257552] RIP: 0033:0x45b399 [ 956.260762] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 956.279682] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 956.287414] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:21 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x19) [ 956.294697] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 956.301981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 956.309265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 956.316659] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000027 07:25:21 executing program 3 (fault-call:5 fault-nth:40): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 956.390589] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a439, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:21 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0a000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 956.505712] FAULT_INJECTION: forcing a failure. [ 956.505712] name failslab, interval 1, probability 0, space 0, times 0 [ 956.538222] CPU: 0 PID: 16638 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 956.546269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.555639] Call Trace: [ 956.558250] dump_stack+0x197/0x210 [ 956.561909] should_fail.cold+0xa/0x1b [ 956.565826] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 956.570960] ? sctp_bind_addr_state+0x1ab/0x340 [ 956.575662] ? find_held_lock+0x35/0x130 [ 956.579764] __should_failslab+0x121/0x190 [ 956.584032] should_failslab+0x9/0x14 [ 956.587863] kmem_cache_alloc_trace+0x4b/0x760 [ 956.592581] ? kasan_check_read+0x11/0x20 [ 956.596760] sctp_add_bind_addr+0x79/0x370 [ 956.601130] sctp_copy_local_addr_list+0x385/0x530 [ 956.606081] ? sctp_defaults_init+0xbe0/0xbe0 [ 956.610592] ? get_random_bytes+0x35/0x40 [ 956.614760] ? _get_random_bytes+0x197/0x400 [ 956.619615] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 956.624815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 956.630381] sctp_copy_one_addr+0x5f/0x170 [ 956.634639] ? sctp_copy_one_addr+0x5f/0x170 [ 956.639075] sctp_bind_addr_copy+0xfc/0x2c8 [ 956.643425] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 956.649086] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 956.653693] ? mark_held_locks+0xb1/0x100 [ 956.657870] ? sctp_autobind+0x1e0/0x1e0 [ 956.661952] ? lockdep_hardirqs_on+0x415/0x5d0 [ 956.666562] ? lock_sock_nested+0x9a/0x120 [ 956.670916] ? trace_hardirqs_on+0x67/0x220 [ 956.675266] ? lock_sock_nested+0x9a/0x120 [ 956.679521] ? __local_bh_enable_ip+0x15a/0x270 [ 956.684211] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 956.689776] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 956.694994] sctp_sendmsg+0x125a/0x17d0 [ 956.699002] ? sctp_id2assoc+0x2d0/0x2d0 [ 956.703083] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 956.708463] ? _copy_from_user+0xdd/0x150 [ 956.712655] inet_sendmsg+0x141/0x5d0 [ 956.716577] ? ipip_gro_receive+0x100/0x100 [ 956.720921] sock_sendmsg+0xd7/0x130 [ 956.724654] ___sys_sendmsg+0x803/0x920 [ 956.728659] ? copy_msghdr_from_user+0x430/0x430 [ 956.733445] ? lock_downgrade+0x880/0x880 [ 956.737617] ? kasan_check_read+0x11/0x20 [ 956.741859] ? __fget+0x367/0x540 [ 956.745363] ? __fget_light+0x1a9/0x230 [ 956.749360] ? __fdget+0x1b/0x20 [ 956.752844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 956.758622] __sys_sendmsg+0x105/0x1d0 [ 956.762874] ? __ia32_sys_shutdown+0x80/0x80 [ 956.767319] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 956.772095] ? do_syscall_64+0x26/0x620 [ 956.776093] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.781477] ? do_syscall_64+0x26/0x620 [ 956.785476] __x64_sys_sendmsg+0x78/0xb0 [ 956.789567] do_syscall_64+0xfd/0x620 [ 956.793397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.798685] RIP: 0033:0x45b399 [ 956.801900] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 956.821172] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 956.828903] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 956.836796] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 956.844078] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f100000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 956.851454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 956.858845] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000028 07:25:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:22 executing program 3 (fault-call:5 fault-nth:41): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xb26000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 956.964969] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 957.035595] FAULT_INJECTION: forcing a failure. [ 957.035595] name failslab, interval 1, probability 0, space 0, times 0 [ 957.068902] CPU: 0 PID: 16652 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 07:25:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a43a, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 957.078061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.087440] Call Trace: [ 957.090054] dump_stack+0x197/0x210 [ 957.093717] should_fail.cold+0xa/0x1b [ 957.097644] ? trace_hardirqs_on_caller+0x6a/0x220 [ 957.102600] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 957.107723] ? sctp_bind_addr_state+0x1ab/0x340 [ 957.112936] ? find_held_lock+0x35/0x130 [ 957.117445] __should_failslab+0x121/0x190 [ 957.121707] should_failslab+0x9/0x14 [ 957.125520] kmem_cache_alloc_trace+0x4b/0x760 [ 957.130234] ? kasan_check_read+0x11/0x20 [ 957.134436] sctp_add_bind_addr+0x79/0x370 [ 957.138815] sctp_copy_local_addr_list+0x385/0x530 [ 957.143881] ? sctp_defaults_init+0xbe0/0xbe0 [ 957.148401] ? get_random_bytes+0x35/0x40 [ 957.152577] ? _get_random_bytes+0x197/0x400 [ 957.157022] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 957.162229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 957.167801] sctp_copy_one_addr+0x5f/0x170 [ 957.172238] ? sctp_copy_one_addr+0x5f/0x170 [ 957.176670] sctp_bind_addr_copy+0xfc/0x2c8 07:25:22 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x1a) [ 957.181024] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 957.186698] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 957.191301] ? mark_held_locks+0xb1/0x100 [ 957.195466] ? sctp_autobind+0x1e0/0x1e0 [ 957.200097] ? lockdep_hardirqs_on+0x415/0x5d0 [ 957.204689] ? lock_sock_nested+0x9a/0x120 [ 957.208949] ? trace_hardirqs_on+0x67/0x220 [ 957.213300] ? lock_sock_nested+0x9a/0x120 [ 957.217565] ? __local_bh_enable_ip+0x15a/0x270 [ 957.222256] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 957.227915] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 957.233133] sctp_sendmsg+0x125a/0x17d0 [ 957.237159] ? sctp_id2assoc+0x2d0/0x2d0 [ 957.241238] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 957.246689] ? _copy_from_user+0xdd/0x150 [ 957.250874] inet_sendmsg+0x141/0x5d0 [ 957.254679] ? ipip_gro_receive+0x100/0x100 [ 957.259110] sock_sendmsg+0xd7/0x130 [ 957.262850] ___sys_sendmsg+0x803/0x920 [ 957.266824] ? copy_msghdr_from_user+0x430/0x430 [ 957.271699] ? lock_downgrade+0x880/0x880 [ 957.275849] ? kasan_check_read+0x11/0x20 [ 957.279996] ? __fget+0x367/0x540 [ 957.283463] ? __fget_light+0x1a9/0x230 [ 957.287432] ? __fdget+0x1b/0x20 [ 957.290818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 957.296372] __sys_sendmsg+0x105/0x1d0 [ 957.300269] ? __ia32_sys_shutdown+0x80/0x80 [ 957.304685] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 957.309448] ? do_syscall_64+0x26/0x620 [ 957.313985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.319778] ? do_syscall_64+0x26/0x620 [ 957.323761] __x64_sys_sendmsg+0x78/0xb0 [ 957.327833] do_syscall_64+0xfd/0x620 [ 957.331646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.336844] RIP: 0033:0x45b399 [ 957.340034] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 957.359113] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 957.366834] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 957.374112] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 07:25:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4001, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 957.381398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 957.388663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 957.395939] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000029 07:25:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f200000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:22 executing program 3 (fault-call:5 fault-nth:42): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4800, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 957.622614] FAULT_INJECTION: forcing a failure. [ 957.622614] name failslab, interval 1, probability 0, space 0, times 0 [ 957.636789] CPU: 0 PID: 16669 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 957.644708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.654177] Call Trace: [ 957.656796] dump_stack+0x197/0x210 [ 957.660463] should_fail.cold+0xa/0x1b [ 957.664373] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 957.669507] ? sctp_bind_addr_state+0x1ab/0x340 [ 957.674292] ? find_held_lock+0x35/0x130 [ 957.678401] __should_failslab+0x121/0x190 [ 957.682655] should_failslab+0x9/0x14 [ 957.686471] kmem_cache_alloc_trace+0x4b/0x760 [ 957.691082] ? kasan_check_read+0x11/0x20 [ 957.695250] sctp_add_bind_addr+0x79/0x370 [ 957.699514] sctp_copy_local_addr_list+0x385/0x530 [ 957.704484] ? sctp_defaults_init+0xbe0/0xbe0 [ 957.708982] ? get_random_bytes+0x35/0x40 [ 957.713130] ? _get_random_bytes+0x197/0x400 [ 957.718069] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 957.723272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 957.728839] sctp_copy_one_addr+0x5f/0x170 [ 957.733087] ? sctp_copy_one_addr+0x5f/0x170 [ 957.737497] sctp_bind_addr_copy+0xfc/0x2c8 [ 957.741826] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 957.747451] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 957.752048] ? mark_held_locks+0xb1/0x100 [ 957.756214] ? sctp_autobind+0x1e0/0x1e0 [ 957.760276] ? lockdep_hardirqs_on+0x415/0x5d0 [ 957.764886] ? lock_sock_nested+0x9a/0x120 [ 957.769132] ? trace_hardirqs_on+0x67/0x220 [ 957.773461] ? lock_sock_nested+0x9a/0x120 [ 957.778436] ? __local_bh_enable_ip+0x15a/0x270 [ 957.783104] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 957.788660] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 957.793880] sctp_sendmsg+0x125a/0x17d0 [ 957.797868] ? sctp_id2assoc+0x2d0/0x2d0 [ 957.801949] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 957.807336] ? _copy_from_user+0xdd/0x150 [ 957.811503] inet_sendmsg+0x141/0x5d0 [ 957.815800] ? ipip_gro_receive+0x100/0x100 [ 957.820293] sock_sendmsg+0xd7/0x130 [ 957.824102] ___sys_sendmsg+0x803/0x920 [ 957.828106] ? copy_msghdr_from_user+0x430/0x430 [ 957.832877] ? lock_downgrade+0x880/0x880 [ 957.837028] ? kasan_check_read+0x11/0x20 [ 957.841882] ? __fget+0x367/0x540 [ 957.845352] ? __fget_light+0x1a9/0x230 [ 957.849441] ? __fdget+0x1b/0x20 [ 957.852812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 957.858367] __sys_sendmsg+0x105/0x1d0 [ 957.862272] ? __ia32_sys_shutdown+0x80/0x80 [ 957.866693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 957.871478] ? do_syscall_64+0x26/0x620 [ 957.875551] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.880947] ? do_syscall_64+0x26/0x620 [ 957.884941] __x64_sys_sendmsg+0x78/0xb0 [ 957.889108] do_syscall_64+0xfd/0x620 [ 957.893028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.899003] RIP: 0033:0x45b399 [ 957.902539] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 957.921459] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 957.929174] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 957.936546] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 957.943833] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 957.951104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 957.958645] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000002a [ 957.966617] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a43b, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f300000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4c00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 958.172191] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:23 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x1c) 07:25:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a43c, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:23 executing program 3 (fault-call:5 fault-nth:43): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1200000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6800, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 958.386304] FAULT_INJECTION: forcing a failure. [ 958.386304] name failslab, interval 1, probability 0, space 0, times 0 07:25:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a43d, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 958.517744] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 958.557972] CPU: 1 PID: 16696 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 958.565918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.575297] Call Trace: [ 958.577911] dump_stack+0x197/0x210 [ 958.581571] should_fail.cold+0xa/0x1b [ 958.585496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 958.590762] ? sctp_bind_addr_state+0x1ab/0x340 [ 958.595458] ? find_held_lock+0x35/0x130 [ 958.599558] __should_failslab+0x121/0x190 [ 958.603820] should_failslab+0x9/0x14 [ 958.607645] kmem_cache_alloc_trace+0x4b/0x760 [ 958.612261] ? kasan_check_read+0x11/0x20 [ 958.616442] sctp_add_bind_addr+0x79/0x370 [ 958.620708] sctp_copy_local_addr_list+0x385/0x530 [ 958.625667] ? sctp_defaults_init+0xbe0/0xbe0 [ 958.630188] ? get_random_bytes+0x35/0x40 [ 958.634380] ? _get_random_bytes+0x197/0x400 [ 958.638809] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 958.644039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 958.649618] sctp_copy_one_addr+0x5f/0x170 [ 958.654087] ? sctp_copy_one_addr+0x5f/0x170 [ 958.658526] sctp_bind_addr_copy+0xfc/0x2c8 [ 958.662889] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 958.668836] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 958.673447] ? mark_held_locks+0xb1/0x100 [ 958.677758] ? sctp_autobind+0x1e0/0x1e0 [ 958.681841] ? lockdep_hardirqs_on+0x415/0x5d0 [ 958.688898] ? lock_sock_nested+0x9a/0x120 [ 958.693156] ? trace_hardirqs_on+0x67/0x220 [ 958.697711] ? lock_sock_nested+0x9a/0x120 [ 958.701981] ? __local_bh_enable_ip+0x15a/0x270 [ 958.706673] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 958.712236] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 958.717484] sctp_sendmsg+0x125a/0x17d0 [ 958.721491] ? sctp_id2assoc+0x2d0/0x2d0 [ 958.725600] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 958.730985] ? _copy_from_user+0xdd/0x150 [ 958.735182] inet_sendmsg+0x141/0x5d0 [ 958.739007] ? ipip_gro_receive+0x100/0x100 [ 958.743340] sock_sendmsg+0xd7/0x130 [ 958.747169] ___sys_sendmsg+0x803/0x920 [ 958.751171] ? copy_msghdr_from_user+0x430/0x430 [ 958.756063] ? lock_downgrade+0x880/0x880 [ 958.760241] ? kasan_check_read+0x11/0x20 [ 958.764413] ? __fget+0x367/0x540 [ 958.767899] ? __fget_light+0x1a9/0x230 [ 958.771889] ? __fdget+0x1b/0x20 [ 958.775342] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 958.780904] __sys_sendmsg+0x105/0x1d0 [ 958.784823] ? __ia32_sys_shutdown+0x80/0x80 [ 958.789479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 958.794258] ? do_syscall_64+0x26/0x620 [ 958.798259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 958.803645] ? do_syscall_64+0x26/0x620 [ 958.807650] __x64_sys_sendmsg+0x78/0xb0 [ 958.811738] do_syscall_64+0xfd/0x620 [ 958.815574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 958.820783] RIP: 0033:0x45b399 [ 958.823987] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 958.843017] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 958.850744] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:24 executing program 3 (fault-call:5 fault-nth:44): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 958.858139] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 958.865432] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 958.872901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 958.880183] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000002b 07:25:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2000000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f400000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 959.024744] FAULT_INJECTION: forcing a failure. [ 959.024744] name failslab, interval 1, probability 0, space 0, times 0 [ 959.048150] CPU: 1 PID: 16710 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 959.056080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.065569] Call Trace: [ 959.068190] dump_stack+0x197/0x210 [ 959.071986] should_fail.cold+0xa/0x1b [ 959.075902] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.081203] ? sctp_bind_addr_state+0x1ab/0x340 [ 959.085997] ? find_held_lock+0x35/0x130 [ 959.090112] __should_failslab+0x121/0x190 [ 959.094466] should_failslab+0x9/0x14 [ 959.098375] kmem_cache_alloc_trace+0x4b/0x760 [ 959.102986] ? kasan_check_read+0x11/0x20 [ 959.107162] sctp_add_bind_addr+0x79/0x370 [ 959.111444] sctp_copy_local_addr_list+0x385/0x530 [ 959.116405] ? sctp_defaults_init+0xbe0/0xbe0 [ 959.120926] ? get_random_bytes+0x35/0x40 [ 959.125104] ? _get_random_bytes+0x197/0x400 [ 959.129535] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 959.134772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 959.140450] sctp_copy_one_addr+0x5f/0x170 [ 959.144710] ? sctp_copy_one_addr+0x5f/0x170 [ 959.149147] sctp_bind_addr_copy+0xfc/0x2c8 [ 959.153609] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 959.159261] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 959.163870] ? mark_held_locks+0xb1/0x100 [ 959.168393] ? sctp_autobind+0x1e0/0x1e0 [ 959.172560] ? lockdep_hardirqs_on+0x415/0x5d0 [ 959.177164] ? lock_sock_nested+0x9a/0x120 [ 959.181420] ? trace_hardirqs_on+0x67/0x220 [ 959.185754] ? lock_sock_nested+0x9a/0x120 [ 959.190019] ? __local_bh_enable_ip+0x15a/0x270 [ 959.194711] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 959.200264] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 959.205586] sctp_sendmsg+0x125a/0x17d0 [ 959.209579] ? sctp_id2assoc+0x2d0/0x2d0 [ 959.213669] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 959.219050] ? _copy_from_user+0xdd/0x150 [ 959.223246] inet_sendmsg+0x141/0x5d0 [ 959.227060] ? ipip_gro_receive+0x100/0x100 [ 959.231435] sock_sendmsg+0xd7/0x130 [ 959.235170] ___sys_sendmsg+0x803/0x920 [ 959.239365] ? copy_msghdr_from_user+0x430/0x430 [ 959.244140] ? lock_downgrade+0x880/0x880 [ 959.248309] ? kasan_check_read+0x11/0x20 [ 959.252493] ? __fget+0x367/0x540 [ 959.255977] ? __fget_light+0x1a9/0x230 [ 959.259964] ? __fdget+0x1b/0x20 [ 959.263353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 959.268911] __sys_sendmsg+0x105/0x1d0 [ 959.272989] ? __ia32_sys_shutdown+0x80/0x80 [ 959.277421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 959.282387] __x64_sys_sendmsg+0x78/0xb0 [ 959.286473] do_syscall_64+0xfd/0x620 [ 959.290312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.295520] RIP: 0033:0x45b399 [ 959.298733] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 959.317647] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 959.325461] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 959.332747] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 959.340035] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 959.347314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 959.354685] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000002c 07:25:24 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x1d) 07:25:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a43e, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 959.392039] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:24 executing program 3 (fault-call:5 fault-nth:45): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6c00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f500000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2200000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 959.603966] FAULT_INJECTION: forcing a failure. [ 959.603966] name failslab, interval 1, probability 0, space 0, times 0 [ 959.652908] CPU: 0 PID: 16724 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 959.661014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.670384] Call Trace: [ 959.673003] dump_stack+0x197/0x210 [ 959.676687] should_fail.cold+0xa/0x1b [ 959.680616] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.685928] ? sctp_bind_addr_state+0x1ab/0x340 [ 959.690616] ? find_held_lock+0x35/0x130 [ 959.694707] __should_failslab+0x121/0x190 [ 959.699013] should_failslab+0x9/0x14 [ 959.702929] kmem_cache_alloc_trace+0x4b/0x760 [ 959.707559] ? kasan_check_read+0x11/0x20 [ 959.711747] sctp_add_bind_addr+0x79/0x370 [ 959.716030] sctp_copy_local_addr_list+0x385/0x530 [ 959.720992] ? sctp_defaults_init+0xbe0/0xbe0 [ 959.725509] ? get_random_bytes+0x35/0x40 [ 959.729682] ? _get_random_bytes+0x197/0x400 [ 959.736320] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 959.741547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 959.747112] sctp_copy_one_addr+0x5f/0x170 [ 959.751372] ? sctp_copy_one_addr+0x5f/0x170 [ 959.755839] sctp_bind_addr_copy+0xfc/0x2c8 [ 959.760215] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 959.766070] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 959.770680] ? mark_held_locks+0xb1/0x100 [ 959.774850] ? sctp_autobind+0x1e0/0x1e0 [ 959.778923] ? lockdep_hardirqs_on+0x415/0x5d0 [ 959.783525] ? lock_sock_nested+0x9a/0x120 [ 959.787869] ? trace_hardirqs_on+0x67/0x220 [ 959.792209] ? lock_sock_nested+0x9a/0x120 [ 959.796460] ? __local_bh_enable_ip+0x15a/0x270 [ 959.801148] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 959.806797] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 959.812055] sctp_sendmsg+0x125a/0x17d0 [ 959.816058] ? sctp_id2assoc+0x2d0/0x2d0 [ 959.820140] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 959.825535] ? _copy_from_user+0xdd/0x150 [ 959.829902] inet_sendmsg+0x141/0x5d0 [ 959.834257] ? ipip_gro_receive+0x100/0x100 [ 959.838676] sock_sendmsg+0xd7/0x130 [ 959.843388] ___sys_sendmsg+0x803/0x920 [ 959.847835] ? copy_msghdr_from_user+0x430/0x430 [ 959.853806] ? lock_downgrade+0x880/0x880 [ 959.858945] ? kasan_check_read+0x11/0x20 [ 959.863119] ? __fget+0x367/0x540 [ 959.866611] ? __fget_light+0x1a9/0x230 [ 959.870606] ? __fdget+0x1b/0x20 [ 959.873992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 959.880082] __sys_sendmsg+0x105/0x1d0 [ 959.883997] ? __ia32_sys_shutdown+0x80/0x80 [ 959.888444] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 959.893764] ? do_syscall_64+0x26/0x620 [ 959.897764] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.903472] ? do_syscall_64+0x26/0x620 [ 959.907479] __x64_sys_sendmsg+0x78/0xb0 [ 959.911567] do_syscall_64+0xfd/0x620 [ 959.915387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.920607] RIP: 0033:0x45b399 [ 959.923822] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 959.942917] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 959.950658] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 959.957985] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 959.965284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 959.972573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 959.979970] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000002d [ 959.987784] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a43f, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:25 executing program 3 (fault-call:5 fault-nth:46): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bfffffff500000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 960.147469] FAULT_INJECTION: forcing a failure. [ 960.147469] name failslab, interval 1, probability 0, space 0, times 0 07:25:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2300000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 960.187989] CPU: 1 PID: 16738 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 960.196203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.205575] Call Trace: [ 960.208190] dump_stack+0x197/0x210 [ 960.211859] should_fail.cold+0xa/0x1b [ 960.215794] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 960.220924] ? sctp_bind_addr_state+0x1ab/0x340 [ 960.225610] ? find_held_lock+0x35/0x130 [ 960.229705] __should_failslab+0x121/0x190 [ 960.233960] should_failslab+0x9/0x14 [ 960.237813] kmem_cache_alloc_trace+0x4b/0x760 [ 960.242526] ? kasan_check_read+0x11/0x20 [ 960.247050] sctp_add_bind_addr+0x79/0x370 [ 960.251324] sctp_copy_local_addr_list+0x385/0x530 [ 960.256294] ? sctp_defaults_init+0xbe0/0xbe0 [ 960.260807] ? get_random_bytes+0x35/0x40 [ 960.264980] ? _get_random_bytes+0x197/0x400 [ 960.269411] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 960.275145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 960.280706] sctp_copy_one_addr+0x5f/0x170 07:25:25 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x1e) [ 960.284963] ? sctp_copy_one_addr+0x5f/0x170 [ 960.289395] sctp_bind_addr_copy+0xfc/0x2c8 [ 960.293895] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 960.299586] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 960.304282] ? mark_held_locks+0xb1/0x100 [ 960.308464] ? sctp_autobind+0x1e0/0x1e0 [ 960.312559] ? lockdep_hardirqs_on+0x415/0x5d0 [ 960.317675] ? lock_sock_nested+0x9a/0x120 [ 960.321929] ? trace_hardirqs_on+0x67/0x220 [ 960.326270] ? lock_sock_nested+0x9a/0x120 [ 960.330624] ? __local_bh_enable_ip+0x15a/0x270 [ 960.335311] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 960.340882] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 960.346212] sctp_sendmsg+0x125a/0x17d0 [ 960.350329] ? sctp_id2assoc+0x2d0/0x2d0 [ 960.354408] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 960.359814] ? _copy_from_user+0xdd/0x150 [ 960.364001] inet_sendmsg+0x141/0x5d0 [ 960.367820] ? ipip_gro_receive+0x100/0x100 [ 960.372158] sock_sendmsg+0xd7/0x130 [ 960.375890] ___sys_sendmsg+0x803/0x920 [ 960.379887] ? copy_msghdr_from_user+0x430/0x430 [ 960.384668] ? lock_downgrade+0x880/0x880 [ 960.388840] ? kasan_check_read+0x11/0x20 [ 960.393023] ? __fget+0x367/0x540 [ 960.396601] ? __fget_light+0x1a9/0x230 [ 960.400595] ? __fdget+0x1b/0x20 [ 960.403992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 960.409540] __sys_sendmsg+0x105/0x1d0 [ 960.413571] ? __ia32_sys_shutdown+0x80/0x80 [ 960.418080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 960.422833] ? do_syscall_64+0x26/0x620 [ 960.426805] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 960.432186] ? do_syscall_64+0x26/0x620 [ 960.436163] __x64_sys_sendmsg+0x78/0xb0 [ 960.440225] do_syscall_64+0xfd/0x620 [ 960.444063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 960.449289] RIP: 0033:0x45b399 [ 960.452482] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 960.471389] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 960.479103] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7400, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 960.486534] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 960.493826] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 960.501193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 960.508579] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000002e 07:25:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2804000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a440, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 960.694963] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2c00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f600000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:26 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7a00, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:26 executing program 3 (fault-call:5 fault-nth:47): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2e04000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 961.020843] FAULT_INJECTION: forcing a failure. [ 961.020843] name failslab, interval 1, probability 0, space 0, times 0 [ 961.058968] CPU: 1 PID: 16771 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 961.066994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.076880] Call Trace: [ 961.079493] dump_stack+0x197/0x210 [ 961.083142] should_fail.cold+0xa/0x1b [ 961.087064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 961.092196] ? sctp_bind_addr_state+0x1ab/0x340 [ 961.097175] ? find_held_lock+0x35/0x130 [ 961.101272] __should_failslab+0x121/0x190 [ 961.105527] should_failslab+0x9/0x14 [ 961.109349] kmem_cache_alloc_trace+0x4b/0x760 [ 961.113955] ? kasan_check_read+0x11/0x20 [ 961.118256] sctp_add_bind_addr+0x79/0x370 [ 961.122641] sctp_copy_local_addr_list+0x385/0x530 [ 961.127590] ? sctp_defaults_init+0xbe0/0xbe0 [ 961.132104] ? get_random_bytes+0x35/0x40 [ 961.136277] ? _get_random_bytes+0x197/0x400 [ 961.140707] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 961.145913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 961.151474] sctp_copy_one_addr+0x5f/0x170 [ 961.155736] ? sctp_copy_one_addr+0x5f/0x170 [ 961.160281] sctp_bind_addr_copy+0xfc/0x2c8 [ 961.164627] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 961.170200] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 961.174894] ? mark_held_locks+0xb1/0x100 [ 961.179108] ? sctp_autobind+0x1e0/0x1e0 [ 961.183503] ? lockdep_hardirqs_on+0x415/0x5d0 [ 961.188104] ? lock_sock_nested+0x9a/0x120 [ 961.192354] ? trace_hardirqs_on+0x67/0x220 [ 961.196691] ? lock_sock_nested+0x9a/0x120 [ 961.200949] ? __local_bh_enable_ip+0x15a/0x270 [ 961.205630] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 961.211422] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 961.216894] sctp_sendmsg+0x125a/0x17d0 [ 961.220895] ? sctp_id2assoc+0x2d0/0x2d0 [ 961.225151] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 961.230804] ? _copy_from_user+0xdd/0x150 [ 961.235009] inet_sendmsg+0x141/0x5d0 [ 961.238839] ? ipip_gro_receive+0x100/0x100 [ 961.243533] sock_sendmsg+0xd7/0x130 [ 961.247271] ___sys_sendmsg+0x803/0x920 [ 961.251271] ? copy_msghdr_from_user+0x430/0x430 [ 961.256051] ? lock_downgrade+0x880/0x880 [ 961.260219] ? kasan_check_read+0x11/0x20 [ 961.264387] ? __fget+0x367/0x540 [ 961.267873] ? __fget_light+0x1a9/0x230 [ 961.271863] ? __fdget+0x1b/0x20 [ 961.275368] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 961.281456] __sys_sendmsg+0x105/0x1d0 [ 961.285399] ? __ia32_sys_shutdown+0x80/0x80 [ 961.289893] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 961.294705] ? do_syscall_64+0x26/0x620 [ 961.298693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.304073] ? do_syscall_64+0x26/0x620 [ 961.308168] __x64_sys_sendmsg+0x78/0xb0 [ 961.312260] do_syscall_64+0xfd/0x620 [ 961.316088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.321392] RIP: 0033:0x45b399 [ 961.324607] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 961.343610] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 961.351337] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 961.358615] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 07:25:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a441, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:26 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x21) [ 961.363704] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 961.365891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 961.365900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 961.365909] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000002f 07:25:26 executing program 3 (fault-call:5 fault-nth:48): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8a03, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 961.537600] FAULT_INJECTION: forcing a failure. [ 961.537600] name failslab, interval 1, probability 0, space 0, times 0 [ 961.591688] CPU: 1 PID: 16783 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 961.600399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.609862] Call Trace: [ 961.612468] dump_stack+0x197/0x210 [ 961.616528] should_fail.cold+0xa/0x1b [ 961.620450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 961.625669] ? sctp_bind_addr_state+0x1ab/0x340 [ 961.630406] ? find_held_lock+0x35/0x130 [ 961.634492] __should_failslab+0x121/0x190 [ 961.638744] should_failslab+0x9/0x14 [ 961.642559] kmem_cache_alloc_trace+0x4b/0x760 [ 961.647158] ? kasan_check_read+0x11/0x20 [ 961.652398] sctp_add_bind_addr+0x79/0x370 [ 961.656653] sctp_copy_local_addr_list+0x385/0x530 [ 961.661804] ? sctp_defaults_init+0xbe0/0xbe0 [ 961.666505] ? get_random_bytes+0x35/0x40 [ 961.670709] ? _get_random_bytes+0x197/0x400 [ 961.675132] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 961.680426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 961.686001] sctp_copy_one_addr+0x5f/0x170 [ 961.690256] ? sctp_copy_one_addr+0x5f/0x170 [ 961.694686] sctp_bind_addr_copy+0xfc/0x2c8 [ 961.699030] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 961.704592] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 961.709212] ? mark_held_locks+0xb1/0x100 [ 961.713380] ? sctp_autobind+0x1e0/0x1e0 [ 961.717459] ? lockdep_hardirqs_on+0x415/0x5d0 [ 961.722058] ? lock_sock_nested+0x9a/0x120 [ 961.726312] ? trace_hardirqs_on+0x67/0x220 [ 961.730661] ? lock_sock_nested+0x9a/0x120 [ 961.735156] ? __local_bh_enable_ip+0x15a/0x270 [ 961.739842] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 961.745396] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 961.750604] sctp_sendmsg+0x125a/0x17d0 [ 961.754610] ? sctp_id2assoc+0x2d0/0x2d0 [ 961.758704] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 961.764091] ? _copy_from_user+0xdd/0x150 [ 961.768279] inet_sendmsg+0x141/0x5d0 [ 961.772095] ? ipip_gro_receive+0x100/0x100 [ 961.776449] sock_sendmsg+0xd7/0x130 [ 961.780380] ___sys_sendmsg+0x803/0x920 [ 961.784394] ? copy_msghdr_from_user+0x430/0x430 [ 961.789439] ? lock_downgrade+0x880/0x880 [ 961.796230] ? kasan_check_read+0x11/0x20 [ 961.800400] ? __fget+0x367/0x540 [ 961.803890] ? __fget_light+0x1a9/0x230 [ 961.807879] ? __fdget+0x1b/0x20 [ 961.811278] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 961.817025] __sys_sendmsg+0x105/0x1d0 [ 961.821042] ? __ia32_sys_shutdown+0x80/0x80 [ 961.826330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 961.831165] ? do_syscall_64+0x26/0x620 [ 961.835177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.840557] ? do_syscall_64+0x26/0x620 [ 961.844563] __x64_sys_sendmsg+0x78/0xb0 [ 961.848641] do_syscall_64+0xfd/0x620 [ 961.852474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.857690] RIP: 0033:0x45b399 [ 961.860893] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 961.879810] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 961.887535] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 961.897781] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 961.905067] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 961.912625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 961.919933] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000030 07:25:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a442, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2f04000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f700000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:27 executing program 3 (fault-call:5 fault-nth:49): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xec25, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 962.066837] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 962.094780] FAULT_INJECTION: forcing a failure. [ 962.094780] name failslab, interval 1, probability 0, space 0, times 0 [ 962.112432] CPU: 1 PID: 16795 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 962.120343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.129706] Call Trace: [ 962.132321] dump_stack+0x197/0x210 [ 962.135987] should_fail.cold+0xa/0x1b [ 962.139903] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 962.145029] ? sctp_bind_addr_state+0x1ab/0x340 [ 962.149717] ? find_held_lock+0x35/0x130 [ 962.153799] __should_failslab+0x121/0x190 [ 962.158140] should_failslab+0x9/0x14 [ 962.161963] kmem_cache_alloc_trace+0x4b/0x760 [ 962.166564] ? kasan_check_read+0x11/0x20 [ 962.170742] sctp_add_bind_addr+0x79/0x370 [ 962.175003] sctp_copy_local_addr_list+0x385/0x530 [ 962.179964] ? sctp_defaults_init+0xbe0/0xbe0 [ 962.184483] ? get_random_bytes+0x35/0x40 [ 962.188645] ? _get_random_bytes+0x197/0x400 [ 962.193071] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 962.198283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.203847] sctp_copy_one_addr+0x5f/0x170 [ 962.208103] ? sctp_copy_one_addr+0x5f/0x170 [ 962.212526] sctp_bind_addr_copy+0xfc/0x2c8 [ 962.216868] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 962.222423] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 962.227032] ? mark_held_locks+0xb1/0x100 [ 962.231214] ? sctp_autobind+0x1e0/0x1e0 [ 962.235293] ? lockdep_hardirqs_on+0x415/0x5d0 [ 962.239889] ? lock_sock_nested+0x9a/0x120 [ 962.244130] ? trace_hardirqs_on+0x67/0x220 [ 962.248475] ? lock_sock_nested+0x9a/0x120 [ 962.252728] ? __local_bh_enable_ip+0x15a/0x270 [ 962.257415] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 962.262967] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 962.268171] sctp_sendmsg+0x125a/0x17d0 [ 962.272167] ? sctp_id2assoc+0x2d0/0x2d0 [ 962.276253] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 962.281643] ? _copy_from_user+0xdd/0x150 [ 962.285830] inet_sendmsg+0x141/0x5d0 [ 962.289645] ? ipip_gro_receive+0x100/0x100 [ 962.293979] sock_sendmsg+0xd7/0x130 [ 962.297709] ___sys_sendmsg+0x803/0x920 [ 962.301700] ? copy_msghdr_from_user+0x430/0x430 [ 962.306475] ? lock_downgrade+0x880/0x880 [ 962.310643] ? kasan_check_read+0x11/0x20 [ 962.314811] ? __fget+0x367/0x540 [ 962.318299] ? __fget_light+0x1a9/0x230 [ 962.322288] ? __fdget+0x1b/0x20 [ 962.325662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.331221] __sys_sendmsg+0x105/0x1d0 [ 962.335650] ? __ia32_sys_shutdown+0x80/0x80 [ 962.340085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 962.344866] ? do_syscall_64+0x26/0x620 [ 962.348862] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.354239] ? do_syscall_64+0x26/0x620 [ 962.358230] __x64_sys_sendmsg+0x78/0xb0 [ 962.362307] do_syscall_64+0xfd/0x620 [ 962.366125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.371336] RIP: 0033:0x45b399 [ 962.374545] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 962.393457] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 962.401185] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 962.408548] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 07:25:27 executing program 3 (fault-call:5 fault-nth:50): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 962.415832] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 962.423385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 962.430667] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000031 07:25:27 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x22) 07:25:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3004000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 962.579583] FAULT_INJECTION: forcing a failure. [ 962.579583] name failslab, interval 1, probability 0, space 0, times 0 [ 962.596112] CPU: 0 PID: 16802 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 962.604029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.613394] Call Trace: [ 962.616007] dump_stack+0x197/0x210 [ 962.619658] should_fail.cold+0xa/0x1b [ 962.623567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 962.628682] ? sctp_bind_addr_state+0x1ab/0x340 [ 962.633369] ? find_held_lock+0x35/0x130 [ 962.637454] __should_failslab+0x121/0x190 [ 962.641702] should_failslab+0x9/0x14 [ 962.645601] kmem_cache_alloc_trace+0x4b/0x760 [ 962.650200] ? kasan_check_read+0x11/0x20 [ 962.654371] sctp_add_bind_addr+0x79/0x370 [ 962.658623] sctp_copy_local_addr_list+0x385/0x530 [ 962.663577] ? sctp_defaults_init+0xbe0/0xbe0 [ 962.668085] ? get_random_bytes+0x35/0x40 [ 962.672295] ? _get_random_bytes+0x197/0x400 [ 962.676725] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 962.681934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.687493] sctp_copy_one_addr+0x5f/0x170 [ 962.691738] ? sctp_copy_one_addr+0x5f/0x170 [ 962.696166] sctp_bind_addr_copy+0xfc/0x2c8 [ 962.700513] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 962.706070] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 962.710672] ? mark_held_locks+0xb1/0x100 [ 962.714836] ? sctp_autobind+0x1e0/0x1e0 [ 962.718906] ? lockdep_hardirqs_on+0x415/0x5d0 [ 962.723500] ? lock_sock_nested+0x9a/0x120 [ 962.727755] ? trace_hardirqs_on+0x67/0x220 [ 962.732092] ? lock_sock_nested+0x9a/0x120 [ 962.736354] ? __local_bh_enable_ip+0x15a/0x270 [ 962.741040] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 962.746597] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 962.751812] sctp_sendmsg+0x125a/0x17d0 [ 962.755810] ? sctp_id2assoc+0x2d0/0x2d0 [ 962.759896] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 962.765284] ? _copy_from_user+0xdd/0x150 [ 962.769473] inet_sendmsg+0x141/0x5d0 [ 962.773395] ? ipip_gro_receive+0x100/0x100 [ 962.777736] sock_sendmsg+0xd7/0x130 [ 962.781466] ___sys_sendmsg+0x803/0x920 [ 962.785460] ? copy_msghdr_from_user+0x430/0x430 [ 962.790234] ? lock_downgrade+0x880/0x880 [ 962.794404] ? kasan_check_read+0x11/0x20 [ 962.798571] ? __fget+0x367/0x540 [ 962.802055] ? __fget_light+0x1a9/0x230 [ 962.806051] ? __fdget+0x1b/0x20 [ 962.809437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.814989] __sys_sendmsg+0x105/0x1d0 [ 962.818897] ? __ia32_sys_shutdown+0x80/0x80 [ 962.823342] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 962.828130] ? do_syscall_64+0x26/0x620 [ 962.832128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.838552] ? do_syscall_64+0x26/0x620 [ 962.842558] __x64_sys_sendmsg+0x78/0xb0 [ 962.846643] do_syscall_64+0xfd/0x620 [ 962.850472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.855673] RIP: 0033:0x45b399 [ 962.858880] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 962.877891] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 962.885617] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 962.892900] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 962.900289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 962.907567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 962.914855] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000032 07:25:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a443, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:28 executing program 3 (fault-call:5 fault-nth:51): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000003f800000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xedc0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 963.065887] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 963.069663] FAULT_INJECTION: forcing a failure. [ 963.069663] name failslab, interval 1, probability 0, space 0, times 0 [ 963.108021] CPU: 0 PID: 16817 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 963.115957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.125322] Call Trace: [ 963.127925] dump_stack+0x197/0x210 [ 963.131575] should_fail.cold+0xa/0x1b [ 963.135476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 963.140594] ? sctp_bind_addr_state+0x1ab/0x340 [ 963.145275] ? find_held_lock+0x35/0x130 [ 963.149356] __should_failslab+0x121/0x190 [ 963.153605] should_failslab+0x9/0x14 [ 963.157418] kmem_cache_alloc_trace+0x4b/0x760 [ 963.162015] ? kasan_check_read+0x11/0x20 [ 963.166185] sctp_add_bind_addr+0x79/0x370 [ 963.170438] sctp_copy_local_addr_list+0x385/0x530 [ 963.175380] ? sctp_defaults_init+0xbe0/0xbe0 [ 963.179882] ? get_random_bytes+0x35/0x40 [ 963.184044] ? _get_random_bytes+0x197/0x400 [ 963.188463] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 963.193663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 963.199232] sctp_copy_one_addr+0x5f/0x170 [ 963.203489] ? sctp_copy_one_addr+0x5f/0x170 [ 963.207916] sctp_bind_addr_copy+0xfc/0x2c8 [ 963.212261] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 963.217815] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 963.222411] ? mark_held_locks+0xb1/0x100 [ 963.226575] ? sctp_autobind+0x1e0/0x1e0 [ 963.230643] ? lockdep_hardirqs_on+0x415/0x5d0 [ 963.235238] ? lock_sock_nested+0x9a/0x120 [ 963.239483] ? trace_hardirqs_on+0x67/0x220 [ 963.243815] ? lock_sock_nested+0x9a/0x120 [ 963.248064] ? __local_bh_enable_ip+0x15a/0x270 [ 963.252740] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 963.258289] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 963.263493] sctp_sendmsg+0x125a/0x17d0 [ 963.267489] ? sctp_id2assoc+0x2d0/0x2d0 [ 963.271559] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 963.276935] ? _copy_from_user+0xdd/0x150 [ 963.281116] inet_sendmsg+0x141/0x5d0 [ 963.284927] ? ipip_gro_receive+0x100/0x100 [ 963.289256] sock_sendmsg+0xd7/0x130 [ 963.292979] ___sys_sendmsg+0x803/0x920 [ 963.296965] ? copy_msghdr_from_user+0x430/0x430 [ 963.301737] ? lock_downgrade+0x880/0x880 [ 963.305900] ? kasan_check_read+0x11/0x20 [ 963.310061] ? __fget+0x367/0x540 [ 963.313541] ? __fget_light+0x1a9/0x230 [ 963.317529] ? __fdget+0x1b/0x20 [ 963.320909] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 963.326459] __sys_sendmsg+0x105/0x1d0 [ 963.330358] ? __ia32_sys_shutdown+0x80/0x80 [ 963.334805] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 963.339577] ? do_syscall_64+0x26/0x620 [ 963.343570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.348943] ? do_syscall_64+0x26/0x620 [ 963.352931] __x64_sys_sendmsg+0x78/0xb0 [ 963.357006] do_syscall_64+0xfd/0x620 [ 963.360819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.366017] RIP: 0033:0x45b399 [ 963.369218] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 963.388130] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 963.395986] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:28 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x24) 07:25:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3104000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 963.403380] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 963.410673] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 963.417954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 963.425232] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000033 07:25:28 executing program 3 (fault-call:5 fault-nth:52): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a444, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 963.541542] FAULT_INJECTION: forcing a failure. [ 963.541542] name failslab, interval 1, probability 0, space 0, times 0 [ 963.585106] CPU: 1 PID: 16829 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 963.593033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.602518] Call Trace: [ 963.605134] dump_stack+0x197/0x210 [ 963.608798] should_fail.cold+0xa/0x1b [ 963.612711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 963.617836] ? sctp_bind_addr_state+0x1ab/0x340 [ 963.622524] ? find_held_lock+0x35/0x130 [ 963.626613] __should_failslab+0x121/0x190 [ 963.630875] should_failslab+0x9/0x14 [ 963.639296] kmem_cache_alloc_trace+0x4b/0x760 [ 963.643916] ? kasan_check_read+0x11/0x20 [ 963.648093] sctp_add_bind_addr+0x79/0x370 [ 963.652347] sctp_copy_local_addr_list+0x385/0x530 [ 963.657301] ? sctp_defaults_init+0xbe0/0xbe0 [ 963.661808] ? get_random_bytes+0x35/0x40 [ 963.665980] ? _get_random_bytes+0x197/0x400 [ 963.670399] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 963.675605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 963.681160] sctp_copy_one_addr+0x5f/0x170 [ 963.685410] ? sctp_copy_one_addr+0x5f/0x170 [ 963.689834] sctp_bind_addr_copy+0xfc/0x2c8 [ 963.694180] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 963.699738] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 963.704341] ? mark_held_locks+0xb1/0x100 [ 963.708510] ? sctp_autobind+0x1e0/0x1e0 [ 963.712594] ? lockdep_hardirqs_on+0x415/0x5d0 [ 963.717187] ? lock_sock_nested+0x9a/0x120 [ 963.721431] ? trace_hardirqs_on+0x67/0x220 [ 963.725762] ? lock_sock_nested+0x9a/0x120 [ 963.730012] ? __local_bh_enable_ip+0x15a/0x270 [ 963.734702] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 963.740254] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 963.745460] sctp_sendmsg+0x125a/0x17d0 [ 963.749462] ? sctp_id2assoc+0x2d0/0x2d0 [ 963.753541] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 963.758918] ? _copy_from_user+0xdd/0x150 [ 963.763541] inet_sendmsg+0x141/0x5d0 [ 963.767350] ? ipip_gro_receive+0x100/0x100 [ 963.771687] sock_sendmsg+0xd7/0x130 [ 963.775420] ___sys_sendmsg+0x803/0x920 [ 963.779409] ? copy_msghdr_from_user+0x430/0x430 [ 963.784189] ? lock_downgrade+0x880/0x880 [ 963.788351] ? kasan_check_read+0x11/0x20 [ 963.792517] ? __fget+0x367/0x540 [ 963.796004] ? __fget_light+0x1a9/0x230 [ 963.799990] ? __fdget+0x1b/0x20 [ 963.803373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 963.808926] __sys_sendmsg+0x105/0x1d0 [ 963.812984] ? __ia32_sys_shutdown+0x80/0x80 [ 963.817430] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 963.822210] ? do_syscall_64+0x26/0x620 [ 963.826206] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.831594] ? do_syscall_64+0x26/0x620 [ 963.835596] __x64_sys_sendmsg+0x78/0xb0 [ 963.839673] do_syscall_64+0xfd/0x620 [ 963.843491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.848692] RIP: 0033:0x45b399 [ 963.851898] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 963.870813] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 963.878540] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a445, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xff0f, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f800000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 963.885822] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 963.893105] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 963.900386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 963.907747] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000034 07:25:29 executing program 3 (fault-call:5 fault-nth:53): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3204000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 964.063277] FAULT_INJECTION: forcing a failure. [ 964.063277] name failslab, interval 1, probability 0, space 0, times 0 [ 964.095499] CPU: 1 PID: 16846 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 964.103422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.112790] Call Trace: [ 964.115396] dump_stack+0x197/0x210 [ 964.119046] should_fail.cold+0xa/0x1b [ 964.122953] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.128070] ? sctp_bind_addr_state+0x1ab/0x340 [ 964.132767] ? find_held_lock+0x35/0x130 [ 964.136849] __should_failslab+0x121/0x190 [ 964.141094] should_failslab+0x9/0x14 [ 964.144902] kmem_cache_alloc_trace+0x4b/0x760 [ 964.149504] ? kasan_check_read+0x11/0x20 [ 964.153687] sctp_add_bind_addr+0x79/0x370 [ 964.157942] sctp_copy_local_addr_list+0x385/0x530 [ 964.162887] ? sctp_defaults_init+0xbe0/0xbe0 [ 964.167394] ? get_random_bytes+0x35/0x40 [ 964.171556] ? _get_random_bytes+0x197/0x400 [ 964.175973] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 964.181173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 964.186726] sctp_copy_one_addr+0x5f/0x170 [ 964.190968] ? sctp_copy_one_addr+0x5f/0x170 [ 964.195394] sctp_bind_addr_copy+0xfc/0x2c8 [ 964.199842] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 964.205400] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 964.209997] ? mark_held_locks+0xb1/0x100 [ 964.214161] ? sctp_autobind+0x1e0/0x1e0 [ 964.218234] ? lockdep_hardirqs_on+0x415/0x5d0 [ 964.222831] ? lock_sock_nested+0x9a/0x120 [ 964.226704] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 964.227079] ? trace_hardirqs_on+0x67/0x220 [ 964.240056] ? lock_sock_nested+0x9a/0x120 [ 964.244315] ? __local_bh_enable_ip+0x15a/0x270 [ 964.248998] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 964.254556] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 964.259761] sctp_sendmsg+0x125a/0x17d0 [ 964.263757] ? sctp_id2assoc+0x2d0/0x2d0 [ 964.267834] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 964.273219] ? _copy_from_user+0xdd/0x150 [ 964.277405] inet_sendmsg+0x141/0x5d0 [ 964.281219] ? ipip_gro_receive+0x100/0x100 [ 964.285553] sock_sendmsg+0xd7/0x130 [ 964.289277] ___sys_sendmsg+0x803/0x920 [ 964.293271] ? copy_msghdr_from_user+0x430/0x430 [ 964.298046] ? lock_downgrade+0x880/0x880 [ 964.302206] ? kasan_check_read+0x11/0x20 [ 964.306365] ? __fget+0x367/0x540 [ 964.309850] ? __fget_light+0x1a9/0x230 [ 964.313835] ? __fdget+0x1b/0x20 [ 964.317213] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 964.322771] __sys_sendmsg+0x105/0x1d0 [ 964.326670] ? __ia32_sys_shutdown+0x80/0x80 [ 964.331104] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 964.335871] ? do_syscall_64+0x26/0x620 [ 964.339856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.345237] ? do_syscall_64+0x26/0x620 [ 964.349237] __x64_sys_sendmsg+0x78/0xb0 [ 964.353317] do_syscall_64+0xfd/0x620 [ 964.357138] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:25:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a446, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 964.362334] RIP: 0033:0x45b399 [ 964.365624] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.384535] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 964.392259] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 964.399538] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 964.406816] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:29 executing program 3 (fault-call:5 fault-nth:54): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 964.414100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 964.421378] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000035 07:25:29 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x25) 07:25:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x20000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 964.527213] FAULT_INJECTION: forcing a failure. [ 964.527213] name failslab, interval 1, probability 0, space 0, times 0 [ 964.562188] CPU: 1 PID: 16855 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 964.570111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.579473] Call Trace: [ 964.582080] dump_stack+0x197/0x210 [ 964.585725] should_fail.cold+0xa/0x1b [ 964.589640] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.594762] ? sctp_bind_addr_state+0x1ab/0x340 [ 964.599449] ? find_held_lock+0x35/0x130 [ 964.603525] __should_failslab+0x121/0x190 [ 964.607767] should_failslab+0x9/0x14 [ 964.611576] kmem_cache_alloc_trace+0x4b/0x760 [ 964.616174] ? kasan_check_read+0x11/0x20 [ 964.620339] sctp_add_bind_addr+0x79/0x370 [ 964.624589] sctp_copy_local_addr_list+0x385/0x530 [ 964.629540] ? sctp_defaults_init+0xbe0/0xbe0 [ 964.634043] ? get_random_bytes+0x35/0x40 [ 964.638204] ? _get_random_bytes+0x197/0x400 [ 964.642626] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 964.647831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 964.653383] sctp_copy_one_addr+0x5f/0x170 [ 964.658156] ? sctp_copy_one_addr+0x5f/0x170 [ 964.662587] sctp_bind_addr_copy+0xfc/0x2c8 [ 964.666935] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 964.672552] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 964.677160] ? mark_held_locks+0xb1/0x100 [ 964.681324] ? sctp_autobind+0x1e0/0x1e0 [ 964.685498] ? lockdep_hardirqs_on+0x415/0x5d0 [ 964.690078] ? lock_sock_nested+0x9a/0x120 [ 964.694311] ? trace_hardirqs_on+0x67/0x220 [ 964.698632] ? lock_sock_nested+0x9a/0x120 [ 964.702862] ? __local_bh_enable_ip+0x15a/0x270 [ 964.707530] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 964.713070] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 964.718258] sctp_sendmsg+0x125a/0x17d0 [ 964.722356] ? sctp_id2assoc+0x2d0/0x2d0 [ 964.726422] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 964.731788] ? _copy_from_user+0xdd/0x150 [ 964.735957] inet_sendmsg+0x141/0x5d0 [ 964.739767] ? ipip_gro_receive+0x100/0x100 [ 964.744090] sock_sendmsg+0xd7/0x130 [ 964.747797] ___sys_sendmsg+0x803/0x920 [ 964.751768] ? copy_msghdr_from_user+0x430/0x430 [ 964.756531] ? lock_downgrade+0x880/0x880 [ 964.760686] ? kasan_check_read+0x11/0x20 [ 964.764839] ? __fget+0x367/0x540 [ 964.770215] ? __fget_light+0x1a9/0x230 [ 964.774192] ? __fdget+0x1b/0x20 [ 964.777551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 964.783093] __sys_sendmsg+0x105/0x1d0 [ 964.787026] ? __ia32_sys_shutdown+0x80/0x80 [ 964.791451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 964.796292] ? do_syscall_64+0x26/0x620 [ 964.800259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.805626] ? do_syscall_64+0x26/0x620 [ 964.809600] __x64_sys_sendmsg+0x78/0xb0 [ 964.813667] do_syscall_64+0xfd/0x620 [ 964.817489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.822674] RIP: 0033:0x45b399 [ 964.825876] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.844775] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 964.852493] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 964.859754] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 964.867014] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266f900000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3304000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 964.874283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 964.881540] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000036 07:25:30 executing program 3 (fault-call:5 fault-nth:55): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 965.016115] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a447, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 965.106488] FAULT_INJECTION: forcing a failure. [ 965.106488] name failslab, interval 1, probability 0, space 0, times 0 [ 965.118413] CPU: 0 PID: 16871 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 965.126303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.135663] Call Trace: [ 965.138269] dump_stack+0x197/0x210 [ 965.141917] should_fail.cold+0xa/0x1b [ 965.145829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.150949] ? sctp_bind_addr_state+0x1ab/0x340 [ 965.155639] ? find_held_lock+0x35/0x130 [ 965.159717] __should_failslab+0x121/0x190 [ 965.163966] should_failslab+0x9/0x14 [ 965.167788] kmem_cache_alloc_trace+0x4b/0x760 [ 965.172382] ? kasan_check_read+0x11/0x20 [ 965.176548] sctp_add_bind_addr+0x79/0x370 [ 965.180799] sctp_copy_local_addr_list+0x385/0x530 [ 965.185746] ? sctp_defaults_init+0xbe0/0xbe0 [ 965.190246] ? get_random_bytes+0x35/0x40 [ 965.194404] ? _get_random_bytes+0x197/0x400 [ 965.198819] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 965.204021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 965.209574] sctp_copy_one_addr+0x5f/0x170 [ 965.213816] ? sctp_copy_one_addr+0x5f/0x170 [ 965.218238] sctp_bind_addr_copy+0xfc/0x2c8 [ 965.222575] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 965.228125] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 965.232751] ? mark_held_locks+0xb1/0x100 [ 965.236914] ? sctp_autobind+0x1e0/0x1e0 [ 965.240987] ? lockdep_hardirqs_on+0x415/0x5d0 [ 965.245579] ? lock_sock_nested+0x9a/0x120 [ 965.249820] ? trace_hardirqs_on+0x67/0x220 [ 965.254148] ? lock_sock_nested+0x9a/0x120 [ 965.258393] ? __local_bh_enable_ip+0x15a/0x270 [ 965.263075] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 965.268620] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 965.273823] sctp_sendmsg+0x125a/0x17d0 [ 965.277818] ? sctp_id2assoc+0x2d0/0x2d0 [ 965.281888] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 965.287262] ? _copy_from_user+0xdd/0x150 [ 965.291444] inet_sendmsg+0x141/0x5d0 [ 965.295253] ? ipip_gro_receive+0x100/0x100 [ 965.299581] sock_sendmsg+0xd7/0x130 [ 965.303305] ___sys_sendmsg+0x803/0x920 [ 965.307287] ? copy_msghdr_from_user+0x430/0x430 [ 965.312058] ? lock_downgrade+0x880/0x880 [ 965.316220] ? kasan_check_read+0x11/0x20 [ 965.320383] ? __fget+0x367/0x540 [ 965.323860] ? __fget_light+0x1a9/0x230 [ 965.327840] ? __fdget+0x1b/0x20 [ 965.331214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 965.336782] __sys_sendmsg+0x105/0x1d0 [ 965.340692] ? __ia32_sys_shutdown+0x80/0x80 [ 965.345130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 965.349896] ? do_syscall_64+0x26/0x620 [ 965.353888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.359273] ? do_syscall_64+0x26/0x620 [ 965.363266] __x64_sys_sendmsg+0x78/0xb0 [ 965.367341] do_syscall_64+0xfd/0x620 [ 965.371161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.376360] RIP: 0033:0x45b399 [ 965.379564] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 965.398472] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3404000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266fa00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 965.406187] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 965.413466] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 965.420742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 965.428013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 965.435288] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000037 07:25:30 executing program 3 (fault-call:5 fault-nth:56): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:30 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x26) 07:25:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 965.514636] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 965.547648] FAULT_INJECTION: forcing a failure. [ 965.547648] name failslab, interval 1, probability 0, space 0, times 0 [ 965.576354] CPU: 0 PID: 16881 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 965.584285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.593646] Call Trace: [ 965.596253] dump_stack+0x197/0x210 [ 965.599902] should_fail.cold+0xa/0x1b [ 965.603806] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.609040] ? sctp_bind_addr_state+0x1ab/0x340 [ 965.613732] ? find_held_lock+0x35/0x130 [ 965.617821] __should_failslab+0x121/0x190 [ 965.622080] should_failslab+0x9/0x14 [ 965.625891] kmem_cache_alloc_trace+0x4b/0x760 [ 965.630492] ? kasan_check_read+0x11/0x20 [ 965.634663] sctp_add_bind_addr+0x79/0x370 [ 965.638924] sctp_copy_local_addr_list+0x385/0x530 [ 965.643872] ? sctp_defaults_init+0xbe0/0xbe0 [ 965.648388] ? get_random_bytes+0x35/0x40 [ 965.652551] ? _get_random_bytes+0x197/0x400 [ 965.656970] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 965.662175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 965.667735] sctp_copy_one_addr+0x5f/0x170 [ 965.671978] ? sctp_copy_one_addr+0x5f/0x170 [ 965.676402] sctp_bind_addr_copy+0xfc/0x2c8 [ 965.680771] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 965.686326] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 965.690924] ? mark_held_locks+0xb1/0x100 [ 965.695087] ? sctp_autobind+0x1e0/0x1e0 [ 965.699156] ? lockdep_hardirqs_on+0x415/0x5d0 [ 965.703749] ? lock_sock_nested+0x9a/0x120 [ 965.707990] ? trace_hardirqs_on+0x67/0x220 [ 965.712322] ? lock_sock_nested+0x9a/0x120 [ 965.716567] ? __local_bh_enable_ip+0x15a/0x270 [ 965.721265] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 965.726825] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 965.732045] sctp_sendmsg+0x125a/0x17d0 [ 965.736057] ? sctp_id2assoc+0x2d0/0x2d0 [ 965.740143] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 965.745522] ? _copy_from_user+0xdd/0x150 [ 965.749710] inet_sendmsg+0x141/0x5d0 [ 965.753526] ? ipip_gro_receive+0x100/0x100 [ 965.757863] sock_sendmsg+0xd7/0x130 [ 965.761586] ___sys_sendmsg+0x803/0x920 [ 965.765571] ? copy_msghdr_from_user+0x430/0x430 [ 965.770344] ? lock_downgrade+0x880/0x880 [ 965.774508] ? kasan_check_read+0x11/0x20 [ 965.778672] ? __fget+0x367/0x540 [ 965.782153] ? __fget_light+0x1a9/0x230 [ 965.786145] ? __fdget+0x1b/0x20 [ 965.789523] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 965.795077] __sys_sendmsg+0x105/0x1d0 [ 965.798976] ? __ia32_sys_shutdown+0x80/0x80 [ 965.803412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 965.808178] ? do_syscall_64+0x26/0x620 [ 965.812180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.817552] ? do_syscall_64+0x26/0x620 [ 965.821540] __x64_sys_sendmsg+0x78/0xb0 [ 965.825616] do_syscall_64+0xfd/0x620 [ 965.829438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.834630] RIP: 0033:0x45b399 [ 965.837839] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 965.856759] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 965.864504] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 965.871792] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 965.879073] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 965.886353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 965.893632] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000038 07:25:31 executing program 3 (fault-call:5 fault-nth:57): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3504000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x407ff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 966.017746] FAULT_INJECTION: forcing a failure. [ 966.017746] name failslab, interval 1, probability 0, space 0, times 0 [ 966.056869] CPU: 0 PID: 16891 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 966.064802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.074165] Call Trace: [ 966.076809] dump_stack+0x197/0x210 [ 966.080518] should_fail.cold+0xa/0x1b [ 966.084447] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.089571] ? sctp_bind_addr_state+0x1ab/0x340 [ 966.094269] ? find_held_lock+0x35/0x130 [ 966.098356] __should_failslab+0x121/0x190 [ 966.102614] should_failslab+0x9/0x14 [ 966.106428] kmem_cache_alloc_trace+0x4b/0x760 [ 966.111035] ? kasan_check_read+0x11/0x20 [ 966.115213] sctp_add_bind_addr+0x79/0x370 [ 966.119469] sctp_copy_local_addr_list+0x385/0x530 [ 966.124529] ? sctp_defaults_init+0xbe0/0xbe0 [ 966.129047] ? get_random_bytes+0x35/0x40 [ 966.133222] ? _get_random_bytes+0x197/0x400 [ 966.137664] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 966.142875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.148480] sctp_copy_one_addr+0x5f/0x170 [ 966.152745] ? sctp_copy_one_addr+0x5f/0x170 [ 966.157192] sctp_bind_addr_copy+0xfc/0x2c8 [ 966.161544] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 966.167116] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 966.171717] ? mark_held_locks+0xb1/0x100 [ 966.175885] ? sctp_autobind+0x1e0/0x1e0 [ 966.179961] ? lockdep_hardirqs_on+0x415/0x5d0 [ 966.184562] ? lock_sock_nested+0x9a/0x120 [ 966.188810] ? trace_hardirqs_on+0x67/0x220 [ 966.193152] ? lock_sock_nested+0x9a/0x120 [ 966.197546] ? __local_bh_enable_ip+0x15a/0x270 [ 966.202239] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 966.207797] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 966.213008] sctp_sendmsg+0x125a/0x17d0 [ 966.217012] ? sctp_id2assoc+0x2d0/0x2d0 [ 966.221090] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 966.226474] ? _copy_from_user+0xdd/0x150 [ 966.230687] inet_sendmsg+0x141/0x5d0 [ 966.234511] ? ipip_gro_receive+0x100/0x100 [ 966.238848] sock_sendmsg+0xd7/0x130 [ 966.242588] ___sys_sendmsg+0x803/0x920 [ 966.246587] ? copy_msghdr_from_user+0x430/0x430 [ 966.251366] ? lock_downgrade+0x880/0x880 [ 966.255527] ? kasan_check_read+0x11/0x20 [ 966.259699] ? __fget+0x367/0x540 [ 966.263454] ? __fget_light+0x1a9/0x230 [ 966.267446] ? __fdget+0x1b/0x20 [ 966.270892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 966.276452] __sys_sendmsg+0x105/0x1d0 [ 966.280356] ? __ia32_sys_shutdown+0x80/0x80 [ 966.284796] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 966.289564] ? do_syscall_64+0x26/0x620 [ 966.293556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.298935] ? do_syscall_64+0x26/0x620 [ 966.302934] __x64_sys_sendmsg+0x78/0xb0 [ 966.307023] do_syscall_64+0xfd/0x620 [ 966.310842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.316053] RIP: 0033:0x45b399 [ 966.319276] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 966.338190] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 966.345923] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 966.353211] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 966.360504] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:31 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x28) [ 966.367787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 966.375069] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000039 07:25:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a448, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266fb00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:31 executing program 3 (fault-call:5 fault-nth:58): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3604000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 966.573347] FAULT_INJECTION: forcing a failure. [ 966.573347] name failslab, interval 1, probability 0, space 0, times 0 [ 966.607594] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40800, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 966.619838] CPU: 0 PID: 16909 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 966.627890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.637355] Call Trace: [ 966.639958] dump_stack+0x197/0x210 [ 966.643611] should_fail.cold+0xa/0x1b [ 966.647528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.652654] ? sctp_bind_addr_state+0x1ab/0x340 [ 966.657440] ? find_held_lock+0x35/0x130 [ 966.661530] __should_failslab+0x121/0x190 [ 966.665927] should_failslab+0x9/0x14 [ 966.669743] kmem_cache_alloc_trace+0x4b/0x760 [ 966.674357] ? kasan_check_read+0x11/0x20 [ 966.678528] sctp_add_bind_addr+0x79/0x370 [ 966.682799] sctp_copy_local_addr_list+0x385/0x530 [ 966.687759] ? sctp_defaults_init+0xbe0/0xbe0 [ 966.692272] ? get_random_bytes+0x35/0x40 [ 966.696453] ? _get_random_bytes+0x197/0x400 [ 966.700877] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 966.706110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.711679] sctp_copy_one_addr+0x5f/0x170 [ 966.715931] ? sctp_copy_one_addr+0x5f/0x170 [ 966.720472] sctp_bind_addr_copy+0xfc/0x2c8 [ 966.724938] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 966.730515] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 966.735124] ? mark_held_locks+0xb1/0x100 [ 966.739312] ? sctp_autobind+0x1e0/0x1e0 [ 966.743393] ? lockdep_hardirqs_on+0x415/0x5d0 [ 966.747994] ? lock_sock_nested+0x9a/0x120 [ 966.752247] ? trace_hardirqs_on+0x67/0x220 [ 966.756602] ? lock_sock_nested+0x9a/0x120 [ 966.760955] ? __local_bh_enable_ip+0x15a/0x270 [ 966.765756] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 966.771313] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 966.776529] sctp_sendmsg+0x125a/0x17d0 [ 966.780538] ? sctp_id2assoc+0x2d0/0x2d0 [ 966.784620] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 966.790000] ? _copy_from_user+0xdd/0x150 [ 966.794204] inet_sendmsg+0x141/0x5d0 [ 966.798028] ? ipip_gro_receive+0x100/0x100 [ 966.802377] sock_sendmsg+0xd7/0x130 [ 966.806112] ___sys_sendmsg+0x803/0x920 [ 966.810114] ? copy_msghdr_from_user+0x430/0x430 [ 966.814889] ? lock_downgrade+0x880/0x880 [ 966.819060] ? kasan_check_read+0x11/0x20 [ 966.823229] ? __fget+0x367/0x540 [ 966.826723] ? __fget_light+0x1a9/0x230 [ 966.830713] ? __fdget+0x1b/0x20 [ 966.834181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 966.839743] __sys_sendmsg+0x105/0x1d0 [ 966.844633] ? __ia32_sys_shutdown+0x80/0x80 [ 966.849199] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 966.853977] ? do_syscall_64+0x26/0x620 [ 966.858017] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.863407] ? do_syscall_64+0x26/0x620 [ 966.867445] __x64_sys_sendmsg+0x78/0xb0 [ 966.871541] do_syscall_64+0xfd/0x620 [ 966.875385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.880593] RIP: 0033:0x45b399 [ 966.883800] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 966.902921] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 966.910644] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 966.917924] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 966.925205] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 966.932485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 966.939768] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000003a 07:25:32 executing program 3 (fault-call:5 fault-nth:59): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2a449, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266fc00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 967.083279] FAULT_INJECTION: forcing a failure. [ 967.083279] name failslab, interval 1, probability 0, space 0, times 0 [ 967.096628] CPU: 1 PID: 16918 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 967.104547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 967.114023] Call Trace: [ 967.116630] dump_stack+0x197/0x210 [ 967.120294] should_fail.cold+0xa/0x1b [ 967.124214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 967.129343] ? sctp_bind_addr_state+0x1ab/0x340 [ 967.134035] ? find_held_lock+0x35/0x130 [ 967.138121] __should_failslab+0x121/0x190 [ 967.142380] should_failslab+0x9/0x14 [ 967.146191] kmem_cache_alloc_trace+0x4b/0x760 [ 967.150794] ? kasan_check_read+0x11/0x20 [ 967.154970] sctp_add_bind_addr+0x79/0x370 [ 967.159233] sctp_copy_local_addr_list+0x385/0x530 [ 967.164176] ? sctp_defaults_init+0xbe0/0xbe0 [ 967.168684] ? get_random_bytes+0x35/0x40 [ 967.172854] ? _get_random_bytes+0x197/0x400 [ 967.177281] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 967.182515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.188096] sctp_copy_one_addr+0x5f/0x170 [ 967.192341] ? sctp_copy_one_addr+0x5f/0x170 [ 967.196768] sctp_bind_addr_copy+0xfc/0x2c8 [ 967.201122] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 967.206687] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 967.211315] ? mark_held_locks+0xb1/0x100 [ 967.215493] ? sctp_autobind+0x1e0/0x1e0 [ 967.219685] ? lockdep_hardirqs_on+0x415/0x5d0 [ 967.224279] ? lock_sock_nested+0x9a/0x120 [ 967.228538] ? trace_hardirqs_on+0x67/0x220 [ 967.232882] ? lock_sock_nested+0x9a/0x120 [ 967.237132] ? __local_bh_enable_ip+0x15a/0x270 [ 967.241824] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 967.247388] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 967.252619] sctp_sendmsg+0x125a/0x17d0 [ 967.256617] ? sctp_id2assoc+0x2d0/0x2d0 [ 967.260802] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 967.266289] ? _copy_from_user+0xdd/0x150 [ 967.270480] inet_sendmsg+0x141/0x5d0 [ 967.274292] ? ipip_gro_receive+0x100/0x100 [ 967.278626] sock_sendmsg+0xd7/0x130 [ 967.282364] ___sys_sendmsg+0x803/0x920 [ 967.286364] ? copy_msghdr_from_user+0x430/0x430 [ 967.291139] ? lock_downgrade+0x880/0x880 [ 967.295314] ? kasan_check_read+0x11/0x20 [ 967.299480] ? __fget+0x367/0x540 [ 967.302977] ? __fget_light+0x1a9/0x230 [ 967.306980] ? __fdget+0x1b/0x20 [ 967.310359] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 967.315918] __sys_sendmsg+0x105/0x1d0 [ 967.319820] ? __ia32_sys_shutdown+0x80/0x80 [ 967.324252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 967.329038] ? do_syscall_64+0x26/0x620 [ 967.333033] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.338419] ? do_syscall_64+0x26/0x620 [ 967.342441] __x64_sys_sendmsg+0x78/0xb0 [ 967.346528] do_syscall_64+0xfd/0x620 [ 967.350350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.355555] RIP: 0033:0x45b399 [ 967.358763] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:25:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x80400, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 967.377679] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 967.385405] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 967.392686] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 967.399980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 967.407262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 967.414545] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000003b 07:25:32 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x29) 07:25:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3704000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:32 executing program 3 (fault-call:5 fault-nth:60): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 967.493690] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 967.586453] FAULT_INJECTION: forcing a failure. [ 967.586453] name failslab, interval 1, probability 0, space 0, times 0 [ 967.626064] CPU: 1 PID: 16930 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 967.634005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 967.643374] Call Trace: [ 967.645982] dump_stack+0x197/0x210 [ 967.649736] should_fail.cold+0xa/0x1b [ 967.653644] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 967.658768] ? sctp_bind_addr_state+0x1ab/0x340 [ 967.663466] ? find_held_lock+0x35/0x130 [ 967.667555] __should_failslab+0x121/0x190 [ 967.671807] should_failslab+0x9/0x14 [ 967.675622] kmem_cache_alloc_trace+0x4b/0x760 [ 967.680232] ? kasan_check_read+0x11/0x20 [ 967.684406] sctp_add_bind_addr+0x79/0x370 [ 967.688779] sctp_copy_local_addr_list+0x385/0x530 [ 967.693734] ? sctp_defaults_init+0xbe0/0xbe0 [ 967.698265] ? get_random_bytes+0x35/0x40 [ 967.702430] ? _get_random_bytes+0x197/0x400 [ 967.706859] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 967.712067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.717645] sctp_copy_one_addr+0x5f/0x170 [ 967.721903] ? sctp_copy_one_addr+0x5f/0x170 [ 967.726342] sctp_bind_addr_copy+0xfc/0x2c8 [ 967.730823] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 967.736386] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 967.740988] ? mark_held_locks+0xb1/0x100 [ 967.745159] ? sctp_autobind+0x1e0/0x1e0 [ 967.749241] ? lockdep_hardirqs_on+0x415/0x5d0 [ 967.753864] ? lock_sock_nested+0x9a/0x120 [ 967.758117] ? trace_hardirqs_on+0x67/0x220 [ 967.762452] ? lock_sock_nested+0x9a/0x120 [ 967.766708] ? __local_bh_enable_ip+0x15a/0x270 [ 967.771509] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 967.777068] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 967.782391] sctp_sendmsg+0x125a/0x17d0 07:25:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xf0ffff, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 967.786410] ? sctp_id2assoc+0x2d0/0x2d0 [ 967.790488] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 967.795872] ? _copy_from_user+0xdd/0x150 [ 967.800073] inet_sendmsg+0x141/0x5d0 [ 967.803963] ? ipip_gro_receive+0x100/0x100 [ 967.808368] sock_sendmsg+0xd7/0x130 [ 967.812109] ___sys_sendmsg+0x803/0x920 [ 967.816113] ? copy_msghdr_from_user+0x430/0x430 [ 967.820896] ? lock_downgrade+0x880/0x880 [ 967.825059] ? kasan_check_read+0x11/0x20 [ 967.829229] ? __fget+0x367/0x540 [ 967.832738] ? __fget_light+0x1a9/0x230 [ 967.836733] ? __fdget+0x1b/0x20 [ 967.840119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 967.845686] __sys_sendmsg+0x105/0x1d0 [ 967.849597] ? __ia32_sys_shutdown+0x80/0x80 [ 967.854044] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 967.858816] ? do_syscall_64+0x26/0x620 [ 967.862801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.868183] ? do_syscall_64+0x26/0x620 [ 967.872183] __x64_sys_sendmsg+0x78/0xb0 [ 967.876266] do_syscall_64+0xfd/0x620 [ 967.880093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.885295] RIP: 0033:0x45b399 [ 967.888582] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 967.907665] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 967.915401] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 967.922687] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 967.929972] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:33 executing program 3 (fault-call:5 fault-nth:61): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 967.937268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 967.944553] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000003c 07:25:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266fd00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:33 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3804000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 968.115936] FAULT_INJECTION: forcing a failure. [ 968.115936] name failslab, interval 1, probability 0, space 0, times 0 [ 968.167169] CPU: 0 PID: 16944 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 968.175103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.184583] Call Trace: [ 968.187206] dump_stack+0x197/0x210 [ 968.190865] should_fail.cold+0xa/0x1b [ 968.194810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.199946] ? sctp_bind_addr_state+0x1ab/0x340 [ 968.204639] ? find_held_lock+0x35/0x130 [ 968.208732] __should_failslab+0x121/0x190 [ 968.212984] should_failslab+0x9/0x14 [ 968.216797] kmem_cache_alloc_trace+0x4b/0x760 [ 968.221400] ? kasan_check_read+0x11/0x20 [ 968.225576] sctp_add_bind_addr+0x79/0x370 [ 968.229866] sctp_copy_local_addr_list+0x385/0x530 [ 968.234909] ? sctp_defaults_init+0xbe0/0xbe0 [ 968.239419] ? get_random_bytes+0x35/0x40 [ 968.243698] ? _get_random_bytes+0x197/0x400 [ 968.248125] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 968.253334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.258892] sctp_copy_one_addr+0x5f/0x170 [ 968.263145] ? sctp_copy_one_addr+0x5f/0x170 [ 968.267575] sctp_bind_addr_copy+0xfc/0x2c8 [ 968.271925] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 968.277586] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 968.282190] ? mark_held_locks+0xb1/0x100 [ 968.286455] ? sctp_autobind+0x1e0/0x1e0 [ 968.290638] ? lockdep_hardirqs_on+0x415/0x5d0 [ 968.295239] ? lock_sock_nested+0x9a/0x120 [ 968.299606] ? trace_hardirqs_on+0x67/0x220 [ 968.303942] ? lock_sock_nested+0x9a/0x120 [ 968.308195] ? __local_bh_enable_ip+0x15a/0x270 [ 968.312885] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 968.318443] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 968.324870] sctp_sendmsg+0x125a/0x17d0 [ 968.328878] ? sctp_id2assoc+0x2d0/0x2d0 [ 968.332958] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 968.338364] ? _copy_from_user+0xdd/0x150 [ 968.342529] inet_sendmsg+0x141/0x5d0 [ 968.346328] ? ipip_gro_receive+0x100/0x100 [ 968.350646] sock_sendmsg+0xd7/0x130 [ 968.354539] ___sys_sendmsg+0x803/0x920 [ 968.358516] ? copy_msghdr_from_user+0x430/0x430 [ 968.363278] ? lock_downgrade+0x880/0x880 [ 968.367595] ? kasan_check_read+0x11/0x20 [ 968.371751] ? __fget+0x367/0x540 [ 968.375213] ? __fget_light+0x1a9/0x230 [ 968.379190] ? __fdget+0x1b/0x20 [ 968.382562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 968.388108] __sys_sendmsg+0x105/0x1d0 [ 968.392000] ? __ia32_sys_shutdown+0x80/0x80 [ 968.396420] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 968.401180] ? do_syscall_64+0x26/0x620 [ 968.405146] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.410509] ? do_syscall_64+0x26/0x620 [ 968.414490] __x64_sys_sendmsg+0x78/0xb0 [ 968.418564] do_syscall_64+0xfd/0x620 [ 968.422362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.427666] RIP: 0033:0x45b399 [ 968.430862] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 968.449759] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 968.457462] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 968.464900] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 968.472160] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 968.479425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 968.486689] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000003d 07:25:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1fffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:34 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x2a) 07:25:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 968.555551] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:34 executing program 3 (fault-call:5 fault-nth:62): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3904000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x400000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266fe00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x2000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 968.789516] FAULT_INJECTION: forcing a failure. [ 968.789516] name failslab, interval 1, probability 0, space 0, times 0 [ 968.806720] CPU: 1 PID: 16967 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 968.814732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.824095] Call Trace: [ 968.826708] dump_stack+0x197/0x210 [ 968.830353] should_fail.cold+0xa/0x1b [ 968.834255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.839490] ? lock_downgrade+0x880/0x880 [ 968.843670] __should_failslab+0x121/0x190 [ 968.847915] should_failslab+0x9/0x14 [ 968.851762] kmem_cache_alloc_trace+0x2cc/0x760 [ 968.856490] ? sctp_copy_one_addr+0x5f/0x170 [ 968.860928] ? sctp_copy_one_addr+0x67/0x170 [ 968.865373] sctp_transport_new+0x72/0x700 [ 968.869635] sctp_assoc_add_peer+0x223/0xfc0 [ 968.874067] sctp_sendmsg_new_asoc+0x5d5/0xfd0 [ 968.878672] ? mark_held_locks+0xb1/0x100 [ 968.882983] ? sctp_autobind+0x1e0/0x1e0 [ 968.887147] ? lockdep_hardirqs_on+0x415/0x5d0 [ 968.891761] ? lock_sock_nested+0x9a/0x120 [ 968.896015] ? trace_hardirqs_on+0x67/0x220 [ 968.900353] ? lock_sock_nested+0x9a/0x120 [ 968.904608] ? __local_bh_enable_ip+0x15a/0x270 [ 968.909317] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 968.914874] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 968.920084] sctp_sendmsg+0x125a/0x17d0 [ 968.924083] ? sctp_id2assoc+0x2d0/0x2d0 [ 968.928160] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 968.933539] ? _copy_from_user+0xdd/0x150 [ 968.937740] inet_sendmsg+0x141/0x5d0 [ 968.941575] ? ipip_gro_receive+0x100/0x100 [ 968.945922] sock_sendmsg+0xd7/0x130 [ 968.949656] ___sys_sendmsg+0x803/0x920 [ 968.953649] ? copy_msghdr_from_user+0x430/0x430 [ 968.958425] ? lock_downgrade+0x880/0x880 [ 968.962714] ? kasan_check_read+0x11/0x20 [ 968.966883] ? __fget+0x367/0x540 [ 968.970370] ? __fget_light+0x1a9/0x230 [ 968.974358] ? __fdget+0x1b/0x20 [ 968.977733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 968.983296] __sys_sendmsg+0x105/0x1d0 [ 968.987218] ? __ia32_sys_shutdown+0x80/0x80 [ 968.991661] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 968.996430] ? do_syscall_64+0x26/0x620 [ 969.000421] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.005800] ? do_syscall_64+0x26/0x620 [ 969.009791] __x64_sys_sendmsg+0x78/0xb0 [ 969.013878] do_syscall_64+0xfd/0x620 [ 969.017790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.023013] RIP: 0033:0x45b399 [ 969.026222] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.045136] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 969.052959] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 969.060234] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 969.067511] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 969.074793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 969.082073] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000003e 07:25:34 executing program 3 (fault-call:5 fault-nth:63): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3f00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6b6b6b, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 969.247420] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x3000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 969.356152] FAULT_INJECTION: forcing a failure. [ 969.356152] name failslab, interval 1, probability 0, space 0, times 0 [ 969.378120] CPU: 1 PID: 16982 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 969.386049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 969.395413] Call Trace: [ 969.398036] dump_stack+0x197/0x210 [ 969.401691] should_fail.cold+0xa/0x1b [ 969.405645] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 969.410776] ? __lock_is_held+0xb6/0x140 [ 969.414887] __should_failslab+0x121/0x190 [ 969.419263] should_failslab+0x9/0x14 [ 969.423079] kmem_cache_alloc+0x47/0x700 [ 969.427160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 969.432730] dst_alloc+0x10e/0x1d0 [ 969.436297] ? rt_acct_proc_show+0x370/0x370 [ 969.440726] rt_dst_alloc+0x83/0x3f0 [ 969.444469] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 969.449780] ? ip_route_input_noref+0x280/0x280 [ 969.454520] ? kasan_check_read+0x11/0x20 [ 969.458731] ip_route_output_key_hash+0x212/0x380 [ 969.463611] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 969.469159] ? mark_held_locks+0xb1/0x100 [ 969.473381] ? lockdep_hardirqs_on+0x415/0x5d0 [ 969.477981] ? trace_hardirqs_on+0x67/0x220 [ 969.482330] ip_route_output_flow+0x28/0xc0 [ 969.486788] sctp_v4_get_dst+0x540/0x1470 [ 969.490950] ? memset+0x32/0x40 [ 969.494270] ? memzero_explicit+0xe/0x10 [ 969.498502] ? sctp_v4_copy_addrlist+0x5a0/0x5a0 [ 969.503288] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 969.508852] sctp_transport_route+0x12d/0x360 [ 969.513367] ? sctp_transport_route+0x12d/0x360 [ 969.518073] sctp_assoc_add_peer+0x53e/0xfc0 [ 969.522522] sctp_sendmsg_new_asoc+0x5d5/0xfd0 [ 969.527132] ? mark_held_locks+0xb1/0x100 [ 969.531303] ? sctp_autobind+0x1e0/0x1e0 [ 969.535383] ? lockdep_hardirqs_on+0x415/0x5d0 [ 969.540119] ? lock_sock_nested+0x9a/0x120 [ 969.544377] ? trace_hardirqs_on+0x67/0x220 [ 969.548716] ? lock_sock_nested+0x9a/0x120 [ 969.552966] ? __local_bh_enable_ip+0x15a/0x270 [ 969.557812] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 969.563488] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 969.568704] sctp_sendmsg+0x125a/0x17d0 [ 969.572705] ? sctp_id2assoc+0x2d0/0x2d0 [ 969.576899] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 969.582279] ? _copy_from_user+0xdd/0x150 [ 969.586553] inet_sendmsg+0x141/0x5d0 [ 969.590364] ? ipip_gro_receive+0x100/0x100 [ 969.594930] sock_sendmsg+0xd7/0x130 [ 969.598659] ___sys_sendmsg+0x803/0x920 [ 969.602765] ? copy_msghdr_from_user+0x430/0x430 [ 969.607538] ? lock_downgrade+0x880/0x880 [ 969.611713] ? kasan_check_read+0x11/0x20 [ 969.615880] ? __fget+0x367/0x540 [ 969.619372] ? __fget_light+0x1a9/0x230 [ 969.623380] ? __fdget+0x1b/0x20 [ 969.626764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 969.632349] __sys_sendmsg+0x105/0x1d0 [ 969.636258] ? __ia32_sys_shutdown+0x80/0x80 [ 969.640705] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 969.645482] ? do_syscall_64+0x26/0x620 [ 969.649472] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.654847] ? do_syscall_64+0x26/0x620 [ 969.658843] __x64_sys_sendmsg+0x78/0xb0 [ 969.662920] do_syscall_64+0xfd/0x620 [ 969.666779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.672105] RIP: 0033:0x45b399 [ 969.675304] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.694216] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4000000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:35 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x2c) [ 969.701944] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 969.709224] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 969.716505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 969.723788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 969.731073] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000003f 07:25:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8000a0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:35 executing program 3 (fault-call:5 fault-nth:64): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0000fffe00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x4000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4001000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 970.021572] FAULT_INJECTION: forcing a failure. [ 970.021572] name failslab, interval 1, probability 0, space 0, times 0 [ 970.038343] CPU: 1 PID: 17003 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 970.046390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.055757] Call Trace: [ 970.058371] dump_stack+0x197/0x210 [ 970.062028] should_fail.cold+0xa/0x1b [ 970.065947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 970.071073] ? __lock_acquire+0x6ee/0x49c0 [ 970.075319] ? ___sys_sendmsg+0x803/0x920 [ 970.079478] ? __sys_sendmsg+0x105/0x1d0 [ 970.083561] __should_failslab+0x121/0x190 [ 970.087812] should_failslab+0x9/0x14 [ 970.091626] __kmalloc+0x71/0x750 [ 970.095104] ? mark_held_locks+0x100/0x100 [ 970.099360] ? sctp_bind_addrs_to_raw+0x125/0x370 [ 970.104225] sctp_bind_addrs_to_raw+0x125/0x370 [ 970.108914] ? sctp_del_bind_addr+0x280/0x280 [ 970.113438] ? is_bpf_text_address+0xac/0x170 [ 970.117954] sctp_make_init+0x136/0xd20 [ 970.121953] ? kasan_check_read+0x11/0x20 [ 970.126123] ? sctp_init_cause+0x240/0x240 [ 970.130371] ? kernel_text_address+0x73/0xf0 [ 970.134793] ? __kernel_text_address+0xd/0x40 [ 970.139402] ? unwind_get_return_address+0x61/0xa0 [ 970.144347] ? __save_stack_trace+0x99/0x100 [ 970.148773] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 970.153981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 970.159532] ? sctp_sm_lookup_event+0x134/0x48d [ 970.164216] ? dccp_diag_dump+0x40/0x40 [ 970.168307] sctp_sf_do_prm_asoc+0xc2/0x350 [ 970.172650] sctp_do_sm+0x121/0x5380 [ 970.176423] ? sctp_stream_init_ext+0x4d/0x200 [ 970.181058] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 970.185917] ? sctp_sendmsg+0x109a/0x17d0 [ 970.190079] ? sock_sendmsg+0xd7/0x130 [ 970.193980] ? ___sys_sendmsg+0x803/0x920 [ 970.198233] ? do_syscall_64+0xfd/0x620 [ 970.202245] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 970.208229] ? sctp_hash_transport+0xd7f/0x18a0 [ 970.212917] ? sctp_hash_transport+0xdb0/0x18a0 [ 970.217609] ? find_held_lock+0x35/0x130 [ 970.221687] ? fs_reclaim_acquire+0x20/0x20 [ 970.226030] ? __lock_is_held+0xb6/0x140 [ 970.230102] ? should_fail+0x14d/0x85c [ 970.234097] ? __lock_is_held+0xb6/0x140 [ 970.238180] ? sctp_stream_init_ext+0x4d/0x200 [ 970.242790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 970.248350] ? flex_array_get+0x1da/0x260 [ 970.252511] ? kmem_cache_alloc_trace+0x348/0x760 [ 970.257387] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 970.262177] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 970.266863] sctp_sendmsg_to_asoc+0x582/0x1850 [ 970.271468] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 970.276076] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 970.281541] ? sctp_autobind+0x1e0/0x1e0 [ 970.285617] ? lockdep_hardirqs_on+0x415/0x5d0 [ 970.290225] ? lock_sock_nested+0x9a/0x120 [ 970.294472] ? trace_hardirqs_on+0x67/0x220 [ 970.298812] ? lock_sock_nested+0x9a/0x120 [ 970.303067] ? __local_bh_enable_ip+0x15a/0x270 [ 970.307855] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 970.313410] sctp_sendmsg+0x109a/0x17d0 [ 970.317410] ? sctp_id2assoc+0x2d0/0x2d0 [ 970.321485] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 970.326866] ? _copy_from_user+0xdd/0x150 [ 970.331053] inet_sendmsg+0x141/0x5d0 [ 970.334881] ? ipip_gro_receive+0x100/0x100 [ 970.339345] sock_sendmsg+0xd7/0x130 [ 970.343211] ___sys_sendmsg+0x803/0x920 [ 970.347209] ? copy_msghdr_from_user+0x430/0x430 [ 970.351987] ? lock_downgrade+0x880/0x880 [ 970.356209] ? kasan_check_read+0x11/0x20 [ 970.360499] ? __fget+0x367/0x540 [ 970.363991] ? __fget_light+0x1a9/0x230 [ 970.367990] ? __fdget+0x1b/0x20 [ 970.371365] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 970.376918] __sys_sendmsg+0x105/0x1d0 [ 970.380851] ? __ia32_sys_shutdown+0x80/0x80 [ 970.385288] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 970.390078] ? do_syscall_64+0x26/0x620 [ 970.394065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 970.399440] ? do_syscall_64+0x26/0x620 [ 970.403434] __x64_sys_sendmsg+0x78/0xb0 [ 970.407517] do_syscall_64+0xfd/0x620 [ 970.411337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 970.416535] RIP: 0033:0x45b399 [ 970.419737] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 970.440063] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 970.447788] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 970.455072] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 970.462357] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x5000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x1000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 970.469635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 970.476913] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000040 [ 970.484647] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:35 executing program 3 (fault-call:5 fault-nth:65): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bfffffffe00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:36 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x2d) 07:25:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4800000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 970.674083] FAULT_INJECTION: forcing a failure. [ 970.674083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 970.686068] CPU: 0 PID: 17020 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 970.693958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.703311] Call Trace: [ 970.705909] dump_stack+0x197/0x210 [ 970.709548] should_fail.cold+0xa/0x1b [ 970.713444] ? kernel_text_address+0x73/0xf0 [ 970.717857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 970.722967] ? unwind_get_return_address+0x61/0xa0 [ 970.727903] ? __save_stack_trace+0x99/0x100 [ 970.732422] __alloc_pages_nodemask+0x1ee/0x750 [ 970.737092] ? __alloc_pages_slowpath+0x2870/0x2870 [ 970.742104] ? save_stack+0xa9/0xd0 [ 970.745739] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 970.750869] cache_grow_begin+0x91/0x8c0 [ 970.754954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 970.760509] ? check_preemption_disabled+0x48/0x290 [ 970.765540] __kmalloc+0x68b/0x750 [ 970.769086] ? sctp_bind_addrs_to_raw+0x125/0x370 [ 970.773928] sctp_bind_addrs_to_raw+0x125/0x370 [ 970.778714] ? sctp_del_bind_addr+0x280/0x280 [ 970.783224] ? is_bpf_text_address+0xac/0x170 [ 970.787809] sctp_make_init+0x136/0xd20 [ 970.791781] ? kasan_check_read+0x11/0x20 [ 970.795932] ? sctp_init_cause+0x240/0x240 [ 970.800159] ? kernel_text_address+0x73/0xf0 [ 970.804572] ? __kernel_text_address+0xd/0x40 [ 970.809061] ? unwind_get_return_address+0x61/0xa0 [ 970.813981] ? __save_stack_trace+0x99/0x100 [ 970.818391] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 970.823589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 970.829147] ? sctp_sm_lookup_event+0x134/0x48d [ 970.833824] ? dccp_diag_dump+0x40/0x40 [ 970.837805] sctp_sf_do_prm_asoc+0xc2/0x350 [ 970.842143] sctp_do_sm+0x121/0x5380 [ 970.845868] ? sctp_stream_init_ext+0x4d/0x200 [ 970.850451] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 970.855289] ? sctp_sendmsg+0x109a/0x17d0 [ 970.859445] ? sock_sendmsg+0xd7/0x130 [ 970.863323] ? ___sys_sendmsg+0x803/0x920 [ 970.867481] ? do_syscall_64+0xfd/0x620 [ 970.871455] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 970.877423] ? sctp_hash_transport+0xd7f/0x18a0 [ 970.882084] ? sctp_hash_transport+0xdb0/0x18a0 [ 970.886754] ? find_held_lock+0x35/0x130 [ 970.890828] ? fs_reclaim_acquire+0x20/0x20 [ 970.896203] ? __lock_is_held+0xb6/0x140 [ 970.900375] ? should_fail+0x14d/0x85c [ 970.904267] ? __lock_is_held+0xb6/0x140 [ 970.908332] ? sctp_stream_init_ext+0x4d/0x200 [ 970.913271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 970.918811] ? flex_array_get+0x1da/0x260 [ 970.922952] ? kmem_cache_alloc_trace+0x348/0x760 [ 970.927920] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 970.932678] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 970.937360] sctp_sendmsg_to_asoc+0x582/0x1850 [ 970.941963] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 970.946564] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 970.952027] ? sctp_autobind+0x1e0/0x1e0 [ 970.956091] ? lockdep_hardirqs_on+0x415/0x5d0 [ 970.960672] ? lock_sock_nested+0x9a/0x120 [ 970.964914] ? trace_hardirqs_on+0x67/0x220 [ 970.969229] ? lock_sock_nested+0x9a/0x120 [ 970.973467] ? __local_bh_enable_ip+0x15a/0x270 [ 970.978137] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 970.983674] sctp_sendmsg+0x109a/0x17d0 [ 970.987655] ? sctp_id2assoc+0x2d0/0x2d0 [ 970.991715] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 970.997094] ? _copy_from_user+0xdd/0x150 [ 971.001336] inet_sendmsg+0x141/0x5d0 [ 971.005164] ? ipip_gro_receive+0x100/0x100 [ 971.009486] sock_sendmsg+0xd7/0x130 [ 971.013209] ___sys_sendmsg+0x803/0x920 [ 971.017182] ? copy_msghdr_from_user+0x430/0x430 [ 971.021962] ? lock_downgrade+0x880/0x880 [ 971.026117] ? kasan_check_read+0x11/0x20 [ 971.030263] ? __fget+0x367/0x540 [ 971.033724] ? __fget_light+0x1a9/0x230 [ 971.037705] ? __fdget+0x1b/0x20 [ 971.041068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 971.046612] __sys_sendmsg+0x105/0x1d0 [ 971.050494] ? __ia32_sys_shutdown+0x80/0x80 [ 971.054926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 971.059694] ? do_syscall_64+0x26/0x620 [ 971.063671] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.069044] ? do_syscall_64+0x26/0x620 [ 971.073017] __x64_sys_sendmsg+0x78/0xb0 [ 971.077081] do_syscall_64+0xfd/0x620 [ 971.080898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.086080] RIP: 0033:0x45b399 [ 971.089266] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.108178] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 971.116015] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x2000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 971.123283] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 971.130672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 971.137945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 971.145215] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000041 [ 971.165909] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x6000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:36 executing program 3 (fault-call:5 fault-nth:66): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4c00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000004ff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 971.342000] FAULT_INJECTION: forcing a failure. [ 971.342000] name failslab, interval 1, probability 0, space 0, times 0 [ 971.368139] CPU: 1 PID: 17035 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 971.376058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.385420] Call Trace: [ 971.388024] dump_stack+0x197/0x210 [ 971.391675] should_fail.cold+0xa/0x1b [ 971.395602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 971.400718] ? save_stack+0xa9/0xd0 [ 971.404359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.409910] ? should_fail+0x14d/0x85c [ 971.413816] __should_failslab+0x121/0x190 [ 971.418240] should_failslab+0x9/0x14 [ 971.422065] kmem_cache_alloc_node_trace+0x5a/0x720 [ 971.427098] ? __alloc_skb+0xd5/0x5f0 [ 971.430924] __kmalloc_node_track_caller+0x3d/0x80 [ 971.435881] __kmalloc_reserve.isra.0+0x40/0xf0 [ 971.440575] __alloc_skb+0x10b/0x5f0 [ 971.444409] ? skb_trim+0x190/0x190 [ 971.448060] ? sctp_del_bind_addr+0x280/0x280 [ 971.452592] _sctp_make_chunk+0x5e/0x280 [ 971.456686] sctp_make_init+0x72b/0xd20 [ 971.460688] ? sctp_init_cause+0x240/0x240 [ 971.464970] ? kernel_text_address+0x73/0xf0 [ 971.469390] ? __kernel_text_address+0xd/0x40 [ 971.473908] ? unwind_get_return_address+0x61/0xa0 [ 971.478858] ? arch_ptrace+0x170/0x8b0 [ 971.482770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.488330] ? sctp_sm_lookup_event+0x134/0x48d [ 971.493012] ? dccp_diag_dump+0x40/0x40 [ 971.497000] sctp_sf_do_prm_asoc+0xc2/0x350 [ 971.501697] sctp_do_sm+0x121/0x5380 [ 971.505436] ? sctp_stream_init_ext+0x4d/0x200 [ 971.510233] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 971.515101] ? sctp_sendmsg+0x109a/0x17d0 [ 971.519266] ? sock_sendmsg+0xd7/0x130 [ 971.523166] ? ___sys_sendmsg+0x803/0x920 [ 971.527338] ? do_syscall_64+0xfd/0x620 [ 971.531340] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 971.537339] ? sctp_hash_transport+0xd7f/0x18a0 [ 971.542030] ? sctp_hash_transport+0xdb0/0x18a0 [ 971.546753] ? find_held_lock+0x35/0x130 [ 971.550832] ? fs_reclaim_acquire+0x20/0x20 [ 971.555182] ? __lock_is_held+0xb6/0x140 [ 971.559261] ? should_fail+0x14d/0x85c [ 971.563174] ? __lock_is_held+0xb6/0x140 [ 971.567254] ? sctp_stream_init_ext+0x4d/0x200 [ 971.571859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.577422] ? flex_array_get+0x1da/0x260 [ 971.581596] ? kmem_cache_alloc_trace+0x348/0x760 [ 971.586467] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 971.591262] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 971.595968] sctp_sendmsg_to_asoc+0x582/0x1850 [ 971.600573] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 971.605195] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 971.610683] ? sctp_autobind+0x1e0/0x1e0 [ 971.614765] ? lockdep_hardirqs_on+0x415/0x5d0 [ 971.619365] ? lock_sock_nested+0x9a/0x120 [ 971.623621] ? trace_hardirqs_on+0x67/0x220 [ 971.627952] ? lock_sock_nested+0x9a/0x120 [ 971.632726] ? __local_bh_enable_ip+0x15a/0x270 [ 971.637420] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 971.642989] sctp_sendmsg+0x109a/0x17d0 [ 971.646994] ? sctp_id2assoc+0x2d0/0x2d0 [ 971.651075] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 971.656672] ? _copy_from_user+0xdd/0x150 [ 971.660873] inet_sendmsg+0x141/0x5d0 [ 971.665478] ? ipip_gro_receive+0x100/0x100 [ 971.669823] sock_sendmsg+0xd7/0x130 [ 971.673568] ___sys_sendmsg+0x803/0x920 [ 971.677569] ? copy_msghdr_from_user+0x430/0x430 [ 971.682362] ? lock_downgrade+0x880/0x880 [ 971.686539] ? kasan_check_read+0x11/0x20 [ 971.690722] ? __fget+0x367/0x540 [ 971.694209] ? __fget_light+0x1a9/0x230 [ 971.698197] ? __fdget+0x1b/0x20 [ 971.701584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 971.707142] __sys_sendmsg+0x105/0x1d0 [ 971.711051] ? __ia32_sys_shutdown+0x80/0x80 [ 971.715496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 971.720366] ? do_syscall_64+0x26/0x620 [ 971.724368] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.729745] ? do_syscall_64+0x26/0x620 [ 971.733881] __x64_sys_sendmsg+0x78/0xb0 [ 971.737966] do_syscall_64+0xfd/0x620 [ 971.741792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.747006] RIP: 0033:0x45b399 [ 971.750212] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.769213] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 971.776935] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 971.776987] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x3000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:37 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x2e) 07:25:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x7000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:37 executing program 3 (fault-call:5 fault-nth:67): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 971.784328] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 971.784338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 971.784346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 971.784356] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000042 07:25:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b00000fff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6800000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 972.026830] FAULT_INJECTION: forcing a failure. [ 972.026830] name failslab, interval 1, probability 0, space 0, times 0 [ 972.050119] CPU: 0 PID: 17054 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 972.058026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.063446] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 972.067613] Call Trace: [ 972.067640] dump_stack+0x197/0x210 [ 972.067666] should_fail.cold+0xa/0x1b [ 972.067678] ? should_fail+0x14d/0x85c [ 972.067701] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 972.095364] ? __lock_is_held+0xb6/0x140 [ 972.099453] __should_failslab+0x121/0x190 [ 972.103707] should_failslab+0x9/0x14 [ 972.107529] kmem_cache_alloc_node+0x56/0x710 [ 972.112041] ? __kmalloc+0x5e1/0x750 [ 972.115779] ? mark_held_locks+0x100/0x100 [ 972.120113] __alloc_skb+0xd5/0x5f0 [ 972.123776] ? skb_trim+0x190/0x190 [ 972.127423] ? sctp_del_bind_addr+0x280/0x280 [ 972.131953] _sctp_make_chunk+0x5e/0x280 [ 972.136033] sctp_make_init+0x72b/0xd20 [ 972.140039] ? sctp_init_cause+0x240/0x240 [ 972.144286] ? kernel_text_address+0x73/0xf0 [ 972.148718] ? __kernel_text_address+0xd/0x40 [ 972.153251] ? unwind_get_return_address+0x61/0xa0 [ 972.158206] ? arch_ptrace+0x170/0x8b0 [ 972.162116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.167683] ? sctp_sm_lookup_event+0x134/0x48d [ 972.172374] ? dccp_diag_dump+0x40/0x40 [ 972.176374] sctp_sf_do_prm_asoc+0xc2/0x350 [ 972.180760] sctp_do_sm+0x121/0x5380 [ 972.184497] ? sctp_stream_init_ext+0x4d/0x200 [ 972.189099] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 972.193956] ? sctp_sendmsg+0x109a/0x17d0 [ 972.198120] ? sock_sendmsg+0xd7/0x130 [ 972.202018] ? ___sys_sendmsg+0x803/0x920 [ 972.206183] ? do_syscall_64+0xfd/0x620 [ 972.210178] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 972.216169] ? sctp_hash_transport+0xd7f/0x18a0 [ 972.220861] ? sctp_hash_transport+0xdb0/0x18a0 [ 972.225606] ? find_held_lock+0x35/0x130 [ 972.229686] ? fs_reclaim_acquire+0x20/0x20 [ 972.234070] ? __lock_is_held+0xb6/0x140 [ 972.238163] ? should_fail+0x14d/0x85c [ 972.242079] ? __lock_is_held+0xb6/0x140 [ 972.246158] ? sctp_stream_init_ext+0x4d/0x200 [ 972.250755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.256307] ? flex_array_get+0x1da/0x260 [ 972.260496] ? kmem_cache_alloc_trace+0x348/0x760 [ 972.265363] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 972.270146] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 972.274849] sctp_sendmsg_to_asoc+0x582/0x1850 [ 972.279444] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 972.284063] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 972.289647] ? sctp_autobind+0x1e0/0x1e0 [ 972.293720] ? lockdep_hardirqs_on+0x415/0x5d0 [ 972.298424] ? lock_sock_nested+0x9a/0x120 [ 972.302676] ? trace_hardirqs_on+0x67/0x220 [ 972.307013] ? lock_sock_nested+0x9a/0x120 [ 972.311270] ? __local_bh_enable_ip+0x15a/0x270 [ 972.316213] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 972.321779] sctp_sendmsg+0x109a/0x17d0 [ 972.326133] ? sctp_id2assoc+0x2d0/0x2d0 [ 972.330211] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 972.335633] ? _copy_from_user+0xdd/0x150 [ 972.339822] inet_sendmsg+0x141/0x5d0 [ 972.343647] ? ipip_gro_receive+0x100/0x100 [ 972.347991] sock_sendmsg+0xd7/0x130 [ 972.351721] ___sys_sendmsg+0x803/0x920 [ 972.355713] ? copy_msghdr_from_user+0x430/0x430 [ 972.360493] ? lock_downgrade+0x880/0x880 [ 972.364662] ? kasan_check_read+0x11/0x20 [ 972.368834] ? __fget+0x367/0x540 [ 972.372349] ? __fget_light+0x1a9/0x230 [ 972.376348] ? __fdget+0x1b/0x20 [ 972.379726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 972.385285] __sys_sendmsg+0x105/0x1d0 [ 972.389304] ? __ia32_sys_shutdown+0x80/0x80 [ 972.393736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 972.398613] ? do_syscall_64+0x26/0x620 [ 972.402602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.407986] ? do_syscall_64+0x26/0x620 [ 972.412010] __x64_sys_sendmsg+0x78/0xb0 [ 972.416093] do_syscall_64+0xfd/0x620 [ 972.419923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.425135] RIP: 0033:0x45b399 [ 972.428344] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 972.448217] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 972.456064] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 972.463364] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 972.470647] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x8000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 972.477930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 972.485501] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000043 07:25:37 executing program 3 (fault-call:5 fault-nth:68): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x30a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6c00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b000266ff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 972.634298] FAULT_INJECTION: forcing a failure. [ 972.634298] name failslab, interval 1, probability 0, space 0, times 0 07:25:38 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x30) [ 972.689146] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 972.701161] CPU: 1 PID: 17064 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 972.709075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.718450] Call Trace: [ 972.721169] dump_stack+0x197/0x210 [ 972.724830] should_fail.cold+0xa/0x1b [ 972.728765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 972.733890] ? save_stack+0xa9/0xd0 [ 972.737547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.743106] ? should_fail+0x14d/0x85c [ 972.747107] __should_failslab+0x121/0x190 [ 972.751385] should_failslab+0x9/0x14 [ 972.755206] kmem_cache_alloc_node_trace+0x5a/0x720 [ 972.760251] ? __alloc_skb+0xd5/0x5f0 [ 972.764077] __kmalloc_node_track_caller+0x3d/0x80 [ 972.769143] __kmalloc_reserve.isra.0+0x40/0xf0 [ 972.773823] __alloc_skb+0x10b/0x5f0 [ 972.777656] ? skb_trim+0x190/0x190 [ 972.781292] ? sctp_del_bind_addr+0x280/0x280 [ 972.785797] _sctp_make_chunk+0x5e/0x280 [ 972.789857] sctp_make_init+0x72b/0xd20 [ 972.793832] ? sctp_init_cause+0x240/0x240 [ 972.798094] ? kernel_text_address+0x73/0xf0 [ 972.802519] ? __kernel_text_address+0xd/0x40 [ 972.807074] ? unwind_get_return_address+0x61/0xa0 [ 972.812021] ? arch_ptrace+0x170/0x8b0 [ 972.815921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.821462] ? sctp_sm_lookup_event+0x134/0x48d [ 972.826148] ? dccp_diag_dump+0x40/0x40 [ 972.830130] sctp_sf_do_prm_asoc+0xc2/0x350 [ 972.834450] sctp_do_sm+0x121/0x5380 [ 972.838196] ? sctp_stream_init_ext+0x4d/0x200 [ 972.842777] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 972.847620] ? sctp_sendmsg+0x109a/0x17d0 [ 972.851777] ? sock_sendmsg+0xd7/0x130 [ 972.855657] ? ___sys_sendmsg+0x803/0x920 [ 972.859814] ? do_syscall_64+0xfd/0x620 [ 972.863792] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 972.869772] ? sctp_hash_transport+0xd7f/0x18a0 [ 972.874437] ? sctp_hash_transport+0xdb0/0x18a0 [ 972.879123] ? find_held_lock+0x35/0x130 [ 972.883180] ? fs_reclaim_acquire+0x20/0x20 [ 972.887510] ? __lock_is_held+0xb6/0x140 [ 972.891593] ? should_fail+0x14d/0x85c [ 972.895489] ? __lock_is_held+0xb6/0x140 [ 972.899549] ? sctp_stream_init_ext+0x4d/0x200 [ 972.904138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.909693] ? flex_array_get+0x1da/0x260 [ 972.913846] ? kmem_cache_alloc_trace+0x348/0x760 [ 972.918697] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 972.923464] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 972.928751] sctp_sendmsg_to_asoc+0x582/0x1850 [ 972.933452] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 972.938044] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 972.943523] ? sctp_autobind+0x1e0/0x1e0 [ 972.947592] ? lockdep_hardirqs_on+0x415/0x5d0 [ 972.952177] ? lock_sock_nested+0x9a/0x120 [ 972.956424] ? trace_hardirqs_on+0x67/0x220 [ 972.960753] ? lock_sock_nested+0x9a/0x120 [ 972.965077] ? __local_bh_enable_ip+0x15a/0x270 [ 972.969769] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 972.975312] sctp_sendmsg+0x109a/0x17d0 [ 972.979303] ? sctp_id2assoc+0x2d0/0x2d0 [ 972.983388] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 972.988771] ? _copy_from_user+0xdd/0x150 [ 972.992930] inet_sendmsg+0x141/0x5d0 [ 972.996740] ? ipip_gro_receive+0x100/0x100 [ 973.001072] sock_sendmsg+0xd7/0x130 [ 973.004781] ___sys_sendmsg+0x803/0x920 [ 973.008748] ? copy_msghdr_from_user+0x430/0x430 [ 973.013514] ? lock_downgrade+0x880/0x880 [ 973.017672] ? kasan_check_read+0x11/0x20 [ 973.021829] ? __fget+0x367/0x540 [ 973.025288] ? __fget_light+0x1a9/0x230 [ 973.029296] ? __fdget+0x1b/0x20 [ 973.032754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.038296] __sys_sendmsg+0x105/0x1d0 [ 973.042176] ? __ia32_sys_shutdown+0x80/0x80 [ 973.046605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 973.051377] ? do_syscall_64+0x26/0x620 [ 973.055347] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.060707] ? do_syscall_64+0x26/0x620 [ 973.064689] __x64_sys_sendmsg+0x78/0xb0 [ 973.068749] do_syscall_64+0xfd/0x620 [ 973.072574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.077756] RIP: 0033:0x45b399 [ 973.080943] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.099842] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 973.107565] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 973.114840] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 973.122106] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 973.129377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:25:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x9000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 973.136659] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000044 07:25:38 executing program 3 (fault-call:5 fault-nth:69): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 973.204015] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 973.240573] FAULT_INJECTION: forcing a failure. [ 973.240573] name failslab, interval 1, probability 0, space 0, times 0 [ 973.263451] CPU: 1 PID: 17080 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 973.271375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 973.280734] Call Trace: [ 973.283338] dump_stack+0x197/0x210 [ 973.287009] should_fail.cold+0xa/0x1b [ 973.290915] ? __alloc_skb+0xd5/0x5f0 [ 973.294735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 973.299863] ? __kmalloc_node_track_caller+0x51/0x80 [ 973.304991] __should_failslab+0x121/0x190 [ 973.309242] should_failslab+0x9/0x14 [ 973.313050] kmem_cache_alloc+0x47/0x700 [ 973.317147] ? skb_trim+0x190/0x190 [ 973.320801] sctp_chunkify+0x4b/0x290 [ 973.324616] _sctp_make_chunk+0x15a/0x280 [ 973.328780] sctp_make_init+0x72b/0xd20 [ 973.332773] ? sctp_init_cause+0x240/0x240 [ 973.337018] ? kernel_text_address+0x73/0xf0 [ 973.341443] ? __kernel_text_address+0xd/0x40 [ 973.345945] ? unwind_get_return_address+0x61/0xa0 [ 973.351036] ? arch_ptrace+0x170/0x8b0 [ 973.354939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.360487] ? sctp_sm_lookup_event+0x134/0x48d [ 973.365171] ? dccp_diag_dump+0x40/0x40 [ 973.369180] sctp_sf_do_prm_asoc+0xc2/0x350 [ 973.373524] sctp_do_sm+0x121/0x5380 [ 973.377253] ? sctp_stream_init_ext+0x4d/0x200 [ 973.381859] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 973.386720] ? sctp_sendmsg+0x109a/0x17d0 [ 973.390893] ? sock_sendmsg+0xd7/0x130 [ 973.394796] ? ___sys_sendmsg+0x803/0x920 [ 973.398959] ? do_syscall_64+0xfd/0x620 [ 973.402974] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 973.408964] ? sctp_hash_transport+0xd7f/0x18a0 [ 973.413646] ? sctp_hash_transport+0xdb0/0x18a0 [ 973.418332] ? find_held_lock+0x35/0x130 [ 973.422401] ? fs_reclaim_acquire+0x20/0x20 [ 973.426875] ? __lock_is_held+0xb6/0x140 [ 973.430952] ? should_fail+0x14d/0x85c [ 973.434869] ? __lock_is_held+0xb6/0x140 [ 973.438946] ? sctp_stream_init_ext+0x4d/0x200 [ 973.443552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.449115] ? flex_array_get+0x1da/0x260 [ 973.453276] ? kmem_cache_alloc_trace+0x348/0x760 [ 973.458225] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 973.463001] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 973.467697] sctp_sendmsg_to_asoc+0x582/0x1850 [ 973.472295] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 973.477040] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 973.482513] ? sctp_autobind+0x1e0/0x1e0 [ 973.486596] ? lockdep_hardirqs_on+0x415/0x5d0 [ 973.491215] ? lock_sock_nested+0x9a/0x120 [ 973.495482] ? trace_hardirqs_on+0x67/0x220 [ 973.499822] ? lock_sock_nested+0x9a/0x120 [ 973.504076] ? __local_bh_enable_ip+0x15a/0x270 [ 973.508848] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 973.514408] sctp_sendmsg+0x109a/0x17d0 [ 973.518412] ? sctp_id2assoc+0x2d0/0x2d0 [ 973.522487] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 973.527874] ? _copy_from_user+0xdd/0x150 [ 973.532068] inet_sendmsg+0x141/0x5d0 [ 973.535885] ? ipip_gro_receive+0x100/0x100 [ 973.540225] sock_sendmsg+0xd7/0x130 [ 973.543983] ___sys_sendmsg+0x803/0x920 [ 973.547973] ? copy_msghdr_from_user+0x430/0x430 [ 973.552745] ? lock_downgrade+0x880/0x880 [ 973.556913] ? kasan_check_read+0x11/0x20 [ 973.561095] ? __fget+0x367/0x540 [ 973.564593] ? __fget_light+0x1a9/0x230 [ 973.568843] ? __fdget+0x1b/0x20 [ 973.572229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.577796] __sys_sendmsg+0x105/0x1d0 [ 973.581702] ? __ia32_sys_shutdown+0x80/0x80 [ 973.586336] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 973.591111] ? do_syscall_64+0x26/0x620 [ 973.595204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.600576] ? do_syscall_64+0x26/0x620 [ 973.604577] __x64_sys_sendmsg+0x78/0xb0 [ 973.608655] do_syscall_64+0xfd/0x620 [ 973.612484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.617700] RIP: 0033:0x45b399 [ 973.620909] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.639828] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 973.647556] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 973.654837] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 07:25:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b00007fff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 973.662116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 973.669402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 973.676687] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000045 07:25:39 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x31) 07:25:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7400000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xa000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x4000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:39 executing program 3 (fault-call:5 fault-nth:70): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 973.789953] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 973.860180] FAULT_INJECTION: forcing a failure. [ 973.860180] name failslab, interval 1, probability 0, space 0, times 0 [ 973.872023] CPU: 1 PID: 17095 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 973.880034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 973.889394] Call Trace: [ 973.892002] dump_stack+0x197/0x210 [ 973.895663] should_fail.cold+0xa/0x1b [ 973.899573] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 973.904808] ? __nf_conntrack_find_get+0xe45/0x1960 [ 973.909852] __should_failslab+0x121/0x190 [ 973.914109] should_failslab+0x9/0x14 [ 973.918005] kmem_cache_alloc+0x47/0x700 [ 973.922083] ? kasan_check_read+0x11/0x20 [ 973.926291] __nf_conntrack_alloc+0xdb/0x680 [ 973.930734] init_conntrack+0xfd4/0x1340 [ 973.934817] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 973.940072] ? nf_conntrack_alloc+0x50/0x50 [ 973.944415] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 973.949462] nf_conntrack_in+0x98b/0xe90 [ 973.953552] ? nf_conntrack_update+0x990/0x990 [ 973.958326] ? __do_replace+0x910/0x910 [ 973.962339] ? save_stack+0x45/0xd0 [ 973.965986] ? __kasan_slab_free+0x102/0x150 [ 973.970413] ? kasan_slab_free+0xe/0x10 [ 973.974425] ? kmem_cache_free+0x86/0x260 [ 973.978596] ipv4_conntrack_local+0x1bb/0x280 [ 973.983142] nf_hook_slow+0xbc/0x1e0 [ 973.986914] __ip_local_out+0x409/0x840 [ 973.990915] ? ip_finish_output+0xce0/0xce0 [ 973.995260] ? lock_downgrade+0x880/0x880 [ 973.999532] ? ip_append_data.part.0+0x180/0x180 [ 974.004305] ? __lock_is_held+0xb6/0x140 [ 974.008391] ip_local_out+0x2d/0x190 [ 974.012139] __ip_queue_xmit+0x86f/0x1bc0 [ 974.016304] ? sctp_chunk_put+0x1ef/0x280 [ 974.020533] ? rcu_read_lock_sched_held+0x110/0x130 [ 974.025595] sctp_v4_xmit+0x1a8/0x200 [ 974.029519] sctp_packet_transmit+0x1b69/0x3620 [ 974.034223] ? sctp_packet_config+0xf90/0xf90 [ 974.038740] ? sctp_packet_append_chunk+0x954/0xdb0 [ 974.043771] ? sctp_outq_select_transport+0x21a/0x790 [ 974.048988] sctp_outq_flush_ctrl.constprop.0+0x73c/0xd30 [ 974.054553] ? sctp_prsctp_prune_sent.isra.0+0x960/0x960 [ 974.060023] ? lock_downgrade+0x880/0x880 [ 974.064196] ? add_timer+0x450/0xbe0 [ 974.067931] ? find_held_lock+0x35/0x130 [ 974.072018] ? add_timer+0x463/0xbe0 [ 974.075757] sctp_outq_flush+0xe8/0x27a0 [ 974.079846] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 974.084966] ? add_timer+0x463/0xbe0 [ 974.088695] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 974.093815] ? lockdep_hardirqs_on+0x415/0x5d0 [ 974.098433] ? trace_hardirqs_on+0x67/0x220 [ 974.102779] ? __sctp_outq_teardown+0xc60/0xc60 [ 974.107481] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 974.113133] ? sctp_outq_tail+0x687/0x930 [ 974.117301] sctp_outq_uncork+0x6c/0x80 [ 974.121307] sctp_do_sm+0x516/0x5380 [ 974.125041] ? sctp_stream_init_ext+0x4d/0x200 [ 974.129639] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 974.134522] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 974.140510] ? sctp_hash_transport+0xd7f/0x18a0 [ 974.145192] ? sctp_hash_transport+0xdb0/0x18a0 [ 974.149990] ? find_held_lock+0x35/0x130 [ 974.154072] ? fs_reclaim_acquire+0x20/0x20 [ 974.158590] ? __lock_is_held+0xb6/0x140 [ 974.162704] ? should_fail+0x14d/0x85c [ 974.166621] ? __lock_is_held+0xb6/0x140 [ 974.170704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.176263] ? flex_array_get+0x1da/0x260 [ 974.180432] ? kmem_cache_alloc_trace+0x348/0x760 [ 974.185305] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 974.190078] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 974.194875] sctp_sendmsg_to_asoc+0x582/0x1850 [ 974.199467] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 974.204196] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 974.209647] ? sctp_autobind+0x1e0/0x1e0 [ 974.213706] ? lockdep_hardirqs_on+0x415/0x5d0 [ 974.218300] ? lock_sock_nested+0x9a/0x120 [ 974.222539] ? trace_hardirqs_on+0x67/0x220 [ 974.226864] ? lock_sock_nested+0x9a/0x120 [ 974.231103] ? __local_bh_enable_ip+0x15a/0x270 [ 974.235950] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 974.241490] sctp_sendmsg+0x109a/0x17d0 [ 974.245472] ? sctp_id2assoc+0x2d0/0x2d0 [ 974.249531] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 974.254908] ? _copy_from_user+0xdd/0x150 [ 974.259074] inet_sendmsg+0x141/0x5d0 [ 974.262872] ? ipip_gro_receive+0x100/0x100 [ 974.267201] sock_sendmsg+0xd7/0x130 [ 974.270909] ___sys_sendmsg+0x803/0x920 [ 974.274877] ? copy_msghdr_from_user+0x430/0x430 [ 974.279635] ? lock_downgrade+0x880/0x880 [ 974.283788] ? kasan_check_read+0x11/0x20 [ 974.287938] ? __fget+0x367/0x540 [ 974.291524] ? __fget_light+0x1a9/0x230 [ 974.295497] ? __fdget+0x1b/0x20 [ 974.298864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.304420] __sys_sendmsg+0x105/0x1d0 [ 974.308304] ? __ia32_sys_shutdown+0x80/0x80 [ 974.312716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 974.317475] ? do_syscall_64+0x26/0x620 [ 974.321446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.326810] ? do_syscall_64+0x26/0x620 [ 974.330794] __x64_sys_sendmsg+0x78/0xb0 [ 974.334861] do_syscall_64+0xfd/0x620 [ 974.338685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.343873] RIP: 0033:0x45b399 07:25:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7701000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x40a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 974.347066] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.366092] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 974.373800] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 974.381071] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 974.388341] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 974.395616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 974.402982] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000046 07:25:39 executing program 3 (fault-call:5 fault-nth:71): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7a00000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 974.575893] FAULT_INJECTION: forcing a failure. [ 974.575893] name failslab, interval 1, probability 0, space 0, times 0 07:25:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x5000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 974.683199] CPU: 0 PID: 17108 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 974.691136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.700502] Call Trace: [ 974.703119] dump_stack+0x197/0x210 [ 974.706778] should_fail.cold+0xa/0x1b [ 974.710690] ? mark_held_locks+0x100/0x100 [ 974.714948] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 974.720065] ? should_fail+0x14d/0x85c [ 974.723976] __should_failslab+0x121/0x190 [ 974.728231] should_failslab+0x9/0x14 07:25:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xb000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 974.732058] __kmalloc_track_caller+0x6d/0x750 [ 974.736678] ? lock_downgrade+0x880/0x880 [ 974.740912] ? nf_ct_ext_add+0x2a9/0x62f [ 974.744993] __krealloc+0x71/0xc0 [ 974.748575] nf_ct_ext_add+0x2a9/0x62f [ 974.752491] init_conntrack+0x5f4/0x1340 [ 974.756574] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 974.761793] ? nf_conntrack_alloc+0x50/0x50 [ 974.766143] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 974.771189] nf_conntrack_in+0x98b/0xe90 [ 974.775287] ? nf_conntrack_update+0x990/0x990 [ 974.779886] ? __do_replace+0x910/0x910 [ 974.783890] ? save_stack+0x45/0xd0 [ 974.787537] ? __kasan_slab_free+0x102/0x150 [ 974.791972] ? kasan_slab_free+0xe/0x10 [ 974.796060] ? kmem_cache_free+0x86/0x260 [ 974.800257] ipv4_conntrack_local+0x1bb/0x280 [ 974.804778] nf_hook_slow+0xbc/0x1e0 [ 974.808520] __ip_local_out+0x409/0x840 [ 974.812512] ? ip_finish_output+0xce0/0xce0 [ 974.816854] ? lock_downgrade+0x880/0x880 [ 974.821029] ? ip_append_data.part.0+0x180/0x180 [ 974.825806] ? __lock_is_held+0xb6/0x140 [ 974.829889] ip_local_out+0x2d/0x190 [ 974.833630] __ip_queue_xmit+0x86f/0x1bc0 [ 974.837791] ? sctp_chunk_put+0x1ef/0x280 [ 974.842002] ? rcu_read_lock_sched_held+0x110/0x130 [ 974.847042] sctp_v4_xmit+0x1a8/0x200 [ 974.850869] sctp_packet_transmit+0x1b69/0x3620 [ 974.855728] ? sctp_packet_config+0xf90/0xf90 [ 974.860249] ? sctp_packet_append_chunk+0x954/0xdb0 [ 974.865286] ? sctp_outq_select_transport+0x21a/0x790 [ 974.870512] sctp_outq_flush_ctrl.constprop.0+0x73c/0xd30 [ 974.876077] ? sctp_prsctp_prune_sent.isra.0+0x960/0x960 [ 974.881549] ? lock_downgrade+0x880/0x880 [ 974.885716] ? add_timer+0x450/0xbe0 [ 974.889449] ? find_held_lock+0x35/0x130 [ 974.893536] ? add_timer+0x463/0xbe0 [ 974.897267] sctp_outq_flush+0xe8/0x27a0 [ 974.901346] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 974.906464] ? add_timer+0x463/0xbe0 [ 974.910199] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 974.915926] ? lockdep_hardirqs_on+0x415/0x5d0 [ 974.920541] ? trace_hardirqs_on+0x67/0x220 [ 974.924883] ? __sctp_outq_teardown+0xc60/0xc60 [ 974.929582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 974.935223] ? sctp_outq_tail+0x687/0x930 [ 974.939399] sctp_outq_uncork+0x6c/0x80 [ 974.943416] sctp_do_sm+0x516/0x5380 [ 974.947143] ? sctp_stream_init_ext+0x4d/0x200 [ 974.951742] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 974.956625] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 974.962614] ? sctp_hash_transport+0xd7f/0x18a0 [ 974.967292] ? sctp_hash_transport+0xdb0/0x18a0 [ 974.971988] ? find_held_lock+0x35/0x130 [ 974.976072] ? fs_reclaim_acquire+0x20/0x20 [ 974.980424] ? __lock_is_held+0xb6/0x140 [ 974.984501] ? should_fail+0x14d/0x85c [ 974.988413] ? __lock_is_held+0xb6/0x140 [ 974.992506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.998071] ? flex_array_get+0x1da/0x260 [ 975.002235] ? kmem_cache_alloc_trace+0x348/0x760 [ 975.007097] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 975.011882] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 975.016602] sctp_sendmsg_to_asoc+0x582/0x1850 [ 975.021205] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 975.025828] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 975.031302] ? sctp_autobind+0x1e0/0x1e0 [ 975.035407] ? lockdep_hardirqs_on+0x415/0x5d0 [ 975.040023] ? lock_sock_nested+0x9a/0x120 [ 975.044274] ? trace_hardirqs_on+0x67/0x220 [ 975.048619] ? lock_sock_nested+0x9a/0x120 [ 975.052898] ? __local_bh_enable_ip+0x15a/0x270 [ 975.057700] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 975.063267] sctp_sendmsg+0x109a/0x17d0 [ 975.067267] ? sctp_id2assoc+0x2d0/0x2d0 [ 975.071357] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 975.076750] ? _copy_from_user+0xdd/0x150 [ 975.080943] inet_sendmsg+0x141/0x5d0 [ 975.084765] ? ipip_gro_receive+0x100/0x100 [ 975.089106] sock_sendmsg+0xd7/0x130 [ 975.092839] ___sys_sendmsg+0x803/0x920 [ 975.096843] ? copy_msghdr_from_user+0x430/0x430 [ 975.101624] ? lock_downgrade+0x880/0x880 [ 975.105795] ? kasan_check_read+0x11/0x20 [ 975.109969] ? __fget+0x367/0x540 [ 975.113453] ? __fget_light+0x1a9/0x230 [ 975.117461] ? __fdget+0x1b/0x20 [ 975.120845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 975.126450] __sys_sendmsg+0x105/0x1d0 [ 975.130473] ? __ia32_sys_shutdown+0x80/0x80 [ 975.134916] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 975.140052] ? do_syscall_64+0x26/0x620 [ 975.144094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.149561] ? do_syscall_64+0x26/0x620 [ 975.153648] __x64_sys_sendmsg+0x78/0xb0 [ 975.157731] do_syscall_64+0xfd/0x620 [ 975.161557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.166758] RIP: 0033:0x45b399 [ 975.169970] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.188882] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 975.196603] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 975.203892] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 975.211177] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 975.218458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 975.225735] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000047 07:25:40 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x32) 07:25:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b001fffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8000000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:40 executing program 3 (fault-call:5 fault-nth:72): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x50a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 975.507721] FAULT_INJECTION: forcing a failure. [ 975.507721] name failslab, interval 1, probability 0, space 0, times 0 [ 975.565116] CPU: 1 PID: 17128 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 975.573041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.582403] Call Trace: [ 975.585019] dump_stack+0x197/0x210 [ 975.588676] should_fail.cold+0xa/0x1b [ 975.592593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 975.597720] ? __nf_conntrack_find_get+0xe45/0x1960 [ 975.602760] __should_failslab+0x121/0x190 [ 975.607013] should_failslab+0x9/0x14 [ 975.610827] kmem_cache_alloc+0x47/0x700 [ 975.614918] ? kasan_check_read+0x11/0x20 [ 975.619103] __nf_conntrack_alloc+0xdb/0x680 [ 975.623531] init_conntrack+0xfd4/0x1340 [ 975.627603] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 975.632818] ? nf_conntrack_alloc+0x50/0x50 [ 975.637158] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 975.642196] nf_conntrack_in+0x98b/0xe90 [ 975.646308] ? nf_conntrack_update+0x990/0x990 [ 975.647389] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 975.650904] ? __do_replace+0x910/0x910 [ 975.650926] ? save_stack+0x45/0xd0 [ 975.650941] ? __kasan_slab_free+0x102/0x150 [ 975.650957] ? kasan_slab_free+0xe/0x10 [ 975.650971] ? kmem_cache_free+0x86/0x260 [ 975.650993] ipv4_conntrack_local+0x1bb/0x280 [ 975.651010] nf_hook_slow+0xbc/0x1e0 [ 975.651032] __ip_local_out+0x409/0x840 [ 975.651050] ? ip_finish_output+0xce0/0xce0 [ 975.651067] ? lock_downgrade+0x880/0x880 [ 975.651093] ? ip_append_data.part.0+0x180/0x180 [ 975.705235] ? __lock_is_held+0xb6/0x140 [ 975.709330] ip_local_out+0x2d/0x190 [ 975.713082] __ip_queue_xmit+0x86f/0x1bc0 [ 975.717251] ? sctp_chunk_put+0x1ef/0x280 [ 975.721420] ? rcu_read_lock_sched_held+0x110/0x130 [ 975.726468] sctp_v4_xmit+0x1a8/0x200 [ 975.730293] sctp_packet_transmit+0x1b69/0x3620 [ 975.735008] ? sctp_packet_config+0xf90/0xf90 [ 975.739546] ? sctp_packet_append_chunk+0x954/0xdb0 [ 975.744580] ? sctp_outq_select_transport+0x21a/0x790 [ 975.749805] sctp_outq_flush_ctrl.constprop.0+0x73c/0xd30 [ 975.755484] ? sctp_prsctp_prune_sent.isra.0+0x960/0x960 [ 975.760957] ? lock_downgrade+0x880/0x880 [ 975.765135] ? add_timer+0x450/0xbe0 [ 975.768869] ? find_held_lock+0x35/0x130 [ 975.772950] ? add_timer+0x463/0xbe0 [ 975.776682] sctp_outq_flush+0xe8/0x27a0 [ 975.780787] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 975.785901] ? add_timer+0x463/0xbe0 [ 975.789627] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 975.794905] ? lockdep_hardirqs_on+0x415/0x5d0 [ 975.799511] ? trace_hardirqs_on+0x67/0x220 [ 975.803853] ? __sctp_outq_teardown+0xc60/0xc60 [ 975.808557] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 975.814207] ? sctp_outq_tail+0x687/0x930 [ 975.818375] sctp_outq_uncork+0x6c/0x80 [ 975.822365] sctp_do_sm+0x516/0x5380 [ 975.826095] ? sctp_stream_init_ext+0x4d/0x200 [ 975.830696] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 975.835568] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 975.841552] ? rcu_read_unlock_special+0x679/0xea0 [ 975.846504] ? sctp_hash_transport+0xdb0/0x18a0 [ 975.851195] ? find_held_lock+0x35/0x130 [ 975.855275] ? fs_reclaim_acquire+0x20/0x20 [ 975.859630] ? __lock_is_held+0xb6/0x140 [ 975.863708] ? should_fail+0x14d/0x85c [ 975.867636] ? __lock_is_held+0xb6/0x140 [ 975.871871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 975.877445] ? flex_array_get+0x1da/0x260 [ 975.881603] ? kmem_cache_alloc_trace+0x348/0x760 [ 975.886467] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 975.891251] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 975.896005] sctp_sendmsg_to_asoc+0x582/0x1850 [ 975.900602] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 975.905217] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 975.910688] ? sctp_autobind+0x1e0/0x1e0 [ 975.914770] ? lockdep_hardirqs_on+0x415/0x5d0 [ 975.919400] ? lock_sock_nested+0x9a/0x120 [ 975.923650] ? trace_hardirqs_on+0x67/0x220 [ 975.927990] ? lock_sock_nested+0x9a/0x120 [ 975.932247] ? __local_bh_enable_ip+0x15a/0x270 [ 975.936929] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 975.942498] sctp_sendmsg+0x109a/0x17d0 [ 975.946505] ? sctp_id2assoc+0x2d0/0x2d0 [ 975.950582] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 975.956084] ? _copy_from_user+0xdd/0x150 [ 975.960274] inet_sendmsg+0x141/0x5d0 [ 975.964100] ? ipip_gro_receive+0x100/0x100 [ 975.968439] sock_sendmsg+0xd7/0x130 [ 975.972171] ___sys_sendmsg+0x803/0x920 [ 975.976161] ? copy_msghdr_from_user+0x430/0x430 [ 975.980945] ? lock_downgrade+0x880/0x880 [ 975.985119] ? kasan_check_read+0x11/0x20 [ 975.989318] ? __fget+0x367/0x540 [ 975.992826] ? __fget_light+0x1a9/0x230 [ 975.996902] ? __fdget+0x1b/0x20 [ 976.000287] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 976.005843] __sys_sendmsg+0x105/0x1d0 [ 976.009756] ? __ia32_sys_shutdown+0x80/0x80 [ 976.014227] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 976.019004] ? do_syscall_64+0x26/0x620 [ 976.023003] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.028381] ? do_syscall_64+0x26/0x620 [ 976.032386] __x64_sys_sendmsg+0x78/0xb0 [ 976.036471] do_syscall_64+0xfd/0x620 [ 976.040302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.045518] RIP: 0033:0x45b399 [ 976.048740] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 976.067665] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 976.075399] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 976.082687] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 976.089988] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 976.097266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 976.104631] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000048 07:25:41 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x34) 07:25:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xc000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:41 executing program 3 (fault-call:5 fault-nth:73): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8a03000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b88a8ffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 976.234598] FAULT_INJECTION: forcing a failure. [ 976.234598] name failslab, interval 1, probability 0, space 0, times 0 [ 976.283882] CPU: 0 PID: 17140 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 976.291797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.301161] Call Trace: [ 976.303773] dump_stack+0x197/0x210 [ 976.307431] should_fail.cold+0xa/0x1b [ 976.311337] ? mark_held_locks+0x100/0x100 [ 976.315587] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 976.320710] ? should_fail+0x14d/0x85c [ 976.324625] __should_failslab+0x121/0x190 [ 976.328870] should_failslab+0x9/0x14 [ 976.332804] __kmalloc_track_caller+0x6d/0x750 [ 976.337503] ? lock_downgrade+0x880/0x880 [ 976.341669] ? nf_ct_ext_add+0x2a9/0x62f [ 976.345750] __krealloc+0x71/0xc0 [ 976.349229] nf_ct_ext_add+0x2a9/0x62f [ 976.353144] init_conntrack+0x5f4/0x1340 [ 976.357216] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 976.362421] ? nf_conntrack_alloc+0x50/0x50 [ 976.366773] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 976.371816] nf_conntrack_in+0x98b/0xe90 [ 976.375913] ? nf_conntrack_update+0x990/0x990 [ 976.380515] ? __do_replace+0x910/0x910 [ 976.384614] ? save_stack+0x45/0xd0 [ 976.388249] ? __kasan_slab_free+0x102/0x150 [ 976.392671] ? kasan_slab_free+0xe/0x10 [ 976.396661] ? kmem_cache_free+0x86/0x260 [ 976.400838] ipv4_conntrack_local+0x1bb/0x280 [ 976.405355] nf_hook_slow+0xbc/0x1e0 [ 976.409090] __ip_local_out+0x409/0x840 [ 976.413097] ? ip_finish_output+0xce0/0xce0 [ 976.417443] ? lock_downgrade+0x880/0x880 [ 976.421615] ? ip_append_data.part.0+0x180/0x180 [ 976.426413] ? __lock_is_held+0xb6/0x140 [ 976.430501] ip_local_out+0x2d/0x190 [ 976.434234] __ip_queue_xmit+0x86f/0x1bc0 [ 976.438416] ? sctp_chunk_put+0x1ef/0x280 [ 976.442583] ? rcu_read_lock_sched_held+0x110/0x130 [ 976.447620] sctp_v4_xmit+0x1a8/0x200 [ 976.451438] sctp_packet_transmit+0x1b69/0x3620 [ 976.456149] ? sctp_packet_config+0xf90/0xf90 [ 976.460672] ? sctp_packet_append_chunk+0x954/0xdb0 [ 976.465703] ? sctp_outq_select_transport+0x21a/0x790 [ 976.470925] sctp_outq_flush_ctrl.constprop.0+0x73c/0xd30 [ 976.476497] ? sctp_prsctp_prune_sent.isra.0+0x960/0x960 [ 976.481968] ? lock_downgrade+0x880/0x880 [ 976.486134] ? add_timer+0x450/0xbe0 [ 976.489861] ? find_held_lock+0x35/0x130 [ 976.493939] ? add_timer+0x463/0xbe0 [ 976.497681] sctp_outq_flush+0xe8/0x27a0 [ 976.501809] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 976.506946] ? add_timer+0x463/0xbe0 [ 976.510672] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 976.515865] ? lockdep_hardirqs_on+0x415/0x5d0 [ 976.520463] ? trace_hardirqs_on+0x67/0x220 [ 976.524846] ? __sctp_outq_teardown+0xc60/0xc60 [ 976.529545] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 976.535099] ? sctp_outq_tail+0x687/0x930 [ 976.539273] sctp_outq_uncork+0x6c/0x80 [ 976.543276] sctp_do_sm+0x516/0x5380 [ 976.547005] ? sctp_stream_init_ext+0x4d/0x200 [ 976.551604] ? sctp_sendmsg_to_asoc+0x12c4/0x1850 [ 976.556482] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 976.562471] ? sctp_hash_transport+0xd7f/0x18a0 [ 976.567162] ? sctp_hash_transport+0xdb0/0x18a0 [ 976.571853] ? find_held_lock+0x35/0x130 [ 976.575933] ? fs_reclaim_acquire+0x20/0x20 [ 976.580298] ? __lock_is_held+0xb6/0x140 [ 976.584372] ? should_fail+0x14d/0x85c [ 976.588281] ? __lock_is_held+0xb6/0x140 [ 976.592365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 976.597920] ? flex_array_get+0x1da/0x260 [ 976.602085] ? kmem_cache_alloc_trace+0x348/0x760 [ 976.606985] ? sctp_sched_fcfs_init_sid+0x9/0x10 [ 976.611769] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 976.616468] sctp_sendmsg_to_asoc+0x582/0x1850 [ 976.621069] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 976.625702] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 976.631177] ? sctp_autobind+0x1e0/0x1e0 [ 976.635347] ? lockdep_hardirqs_on+0x415/0x5d0 [ 976.639949] ? lock_sock_nested+0x9a/0x120 [ 976.644205] ? trace_hardirqs_on+0x67/0x220 [ 976.649065] ? lock_sock_nested+0x9a/0x120 [ 976.653323] ? __local_bh_enable_ip+0x15a/0x270 [ 976.658077] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 976.663638] sctp_sendmsg+0x109a/0x17d0 [ 976.667644] ? sctp_id2assoc+0x2d0/0x2d0 [ 976.671728] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 976.677120] ? _copy_from_user+0xdd/0x150 [ 976.681373] inet_sendmsg+0x141/0x5d0 [ 976.685204] ? ipip_gro_receive+0x100/0x100 [ 976.689548] sock_sendmsg+0xd7/0x130 [ 976.693276] ___sys_sendmsg+0x803/0x920 [ 976.697313] ? copy_msghdr_from_user+0x430/0x430 [ 976.702093] ? lock_downgrade+0x880/0x880 [ 976.706272] ? kasan_check_read+0x11/0x20 [ 976.710435] ? __fget+0x367/0x540 [ 976.713940] ? __fget_light+0x1a9/0x230 [ 976.717957] ? __fdget+0x1b/0x20 [ 976.721343] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 976.726907] __sys_sendmsg+0x105/0x1d0 [ 976.730816] ? __ia32_sys_shutdown+0x80/0x80 [ 976.735270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 976.740053] ? do_syscall_64+0x26/0x620 [ 976.744050] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.749424] ? do_syscall_64+0x26/0x620 [ 976.753534] __x64_sys_sendmsg+0x78/0xb0 [ 976.757618] do_syscall_64+0xfd/0x620 [ 976.761447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.766646] RIP: 0033:0x45b399 [ 976.769848] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 976.788852] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 976.796569] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 976.803842] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 976.811118] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 976.818394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 976.825669] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000049 07:25:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x6000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 976.849990] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:42 executing program 3 (fault-call:5 fault-nth:74): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x8cffffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0xe000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x60a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:42 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x3a) [ 977.059153] FAULT_INJECTION: forcing a failure. [ 977.059153] name failslab, interval 1, probability 0, space 0, times 0 [ 977.070600] CPU: 0 PID: 17155 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 977.078618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.087985] Call Trace: [ 977.090593] dump_stack+0x197/0x210 [ 977.094244] should_fail.cold+0xa/0x1b [ 977.098155] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.103277] ? lock_downgrade+0x880/0x880 [ 977.107448] __should_failslab+0x121/0x190 [ 977.111697] should_failslab+0x9/0x14 [ 977.115508] kmem_cache_alloc_node_trace+0x274/0x720 [ 977.120629] ? __alloc_skb+0xd5/0x5f0 [ 977.124450] __kmalloc_node_track_caller+0x3d/0x80 [ 977.129396] __kmalloc_reserve.isra.0+0x40/0xf0 [ 977.134080] __alloc_skb+0x10b/0x5f0 [ 977.137806] ? skb_trim+0x190/0x190 [ 977.141444] ? should_fail+0x14d/0x85c [ 977.145354] _sctp_make_chunk+0x5e/0x280 [ 977.149431] sctp_make_datafrag_empty+0x183/0x250 [ 977.154288] ? sctp_make_ecne+0x120/0x120 [ 977.158461] sctp_datamsg_from_user+0x636/0x11c0 [ 977.163249] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 977.167849] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 977.172463] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 977.177930] ? sctp_autobind+0x1e0/0x1e0 [ 977.182003] ? lockdep_hardirqs_on+0x415/0x5d0 [ 977.186594] ? lock_sock_nested+0x9a/0x120 [ 977.190838] ? trace_hardirqs_on+0x67/0x220 [ 977.195179] ? lock_sock_nested+0x9a/0x120 [ 977.199428] ? __local_bh_enable_ip+0x15a/0x270 [ 977.204243] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 977.209804] sctp_sendmsg+0x109a/0x17d0 [ 977.213801] ? sctp_id2assoc+0x2d0/0x2d0 [ 977.217872] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 977.223252] ? _copy_from_user+0xdd/0x150 [ 977.227434] inet_sendmsg+0x141/0x5d0 [ 977.231247] ? ipip_gro_receive+0x100/0x100 [ 977.235583] sock_sendmsg+0xd7/0x130 [ 977.239309] ___sys_sendmsg+0x803/0x920 [ 977.243296] ? copy_msghdr_from_user+0x430/0x430 [ 977.248072] ? lock_downgrade+0x880/0x880 [ 977.252237] ? kasan_check_read+0x11/0x20 [ 977.256403] ? __fget+0x367/0x540 [ 977.259886] ? __fget_light+0x1a9/0x230 [ 977.263877] ? __fdget+0x1b/0x20 [ 977.267254] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 977.272805] __sys_sendmsg+0x105/0x1d0 [ 977.276704] ? __ia32_sys_shutdown+0x80/0x80 [ 977.281135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 977.285906] ? do_syscall_64+0x26/0x620 [ 977.289896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.295277] ? do_syscall_64+0x26/0x620 [ 977.299297] __x64_sys_sendmsg+0x78/0xb0 [ 977.303371] do_syscall_64+0xfd/0x620 [ 977.307197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.312396] RIP: 0033:0x45b399 [ 977.315727] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.334644] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 977.342382] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 977.349666] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 977.356958] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 977.364235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 977.371516] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000004a 07:25:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b00f0ffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x10000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:42 executing program 3 (fault-call:5 fault-nth:75): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xeb25000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 977.498321] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 977.577294] FAULT_INJECTION: forcing a failure. [ 977.577294] name failslab, interval 1, probability 0, space 0, times 0 [ 977.594406] CPU: 1 PID: 17177 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 977.602313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.611678] Call Trace: [ 977.614284] dump_stack+0x197/0x210 [ 977.617933] should_fail.cold+0xa/0x1b [ 977.621846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.626967] ? lock_downgrade+0x880/0x880 [ 977.631136] __should_failslab+0x121/0x190 [ 977.635388] should_failslab+0x9/0x14 [ 977.639203] kmem_cache_alloc_node_trace+0x274/0x720 [ 977.644317] ? __alloc_skb+0xd5/0x5f0 [ 977.648139] __kmalloc_node_track_caller+0x3d/0x80 [ 977.653085] __kmalloc_reserve.isra.0+0x40/0xf0 [ 977.657774] __alloc_skb+0x10b/0x5f0 [ 977.661512] ? skb_trim+0x190/0x190 [ 977.665153] ? should_fail+0x14d/0x85c [ 977.669068] _sctp_make_chunk+0x5e/0x280 [ 977.673143] sctp_make_datafrag_empty+0x183/0x250 [ 977.677998] ? sctp_make_ecne+0x120/0x120 [ 977.682171] sctp_datamsg_from_user+0x636/0x11c0 [ 977.686956] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 977.691548] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 977.696157] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 977.701613] ? sctp_autobind+0x1e0/0x1e0 [ 977.705693] ? lockdep_hardirqs_on+0x415/0x5d0 [ 977.710282] ? lock_sock_nested+0x9a/0x120 [ 977.714523] ? trace_hardirqs_on+0x67/0x220 [ 977.718868] ? lock_sock_nested+0x9a/0x120 [ 977.723124] ? __local_bh_enable_ip+0x15a/0x270 [ 977.727811] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 977.733382] sctp_sendmsg+0x109a/0x17d0 [ 977.737386] ? sctp_id2assoc+0x2d0/0x2d0 [ 977.741463] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 977.746838] ? _copy_from_user+0xdd/0x150 [ 977.751022] inet_sendmsg+0x141/0x5d0 [ 977.754839] ? ipip_gro_receive+0x100/0x100 [ 977.759183] sock_sendmsg+0xd7/0x130 [ 977.762911] ___sys_sendmsg+0x803/0x920 [ 977.766897] ? copy_msghdr_from_user+0x430/0x430 [ 977.771669] ? lock_downgrade+0x880/0x880 [ 977.775828] ? kasan_check_read+0x11/0x20 [ 977.779994] ? __fget+0x367/0x540 [ 977.783484] ? __fget_light+0x1a9/0x230 [ 977.787466] ? __fdget+0x1b/0x20 [ 977.790838] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 977.796387] __sys_sendmsg+0x105/0x1d0 [ 977.800284] ? __ia32_sys_shutdown+0x80/0x80 [ 977.804717] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 977.809491] ? do_syscall_64+0x26/0x620 [ 977.813479] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.818858] ? do_syscall_64+0x26/0x620 [ 977.822861] __x64_sys_sendmsg+0x78/0xb0 [ 977.827045] do_syscall_64+0xfd/0x620 [ 977.830865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.836063] RIP: 0033:0x45b399 [ 977.839443] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.858355] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 977.866075] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x11a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x7000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 977.873350] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 977.880624] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 977.887898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 977.895287] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000004b 07:25:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b7fffffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf0ffffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:43 executing program 3 (fault-call:5 fault-nth:76): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x70a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 978.066451] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 978.084909] FAULT_INJECTION: forcing a failure. [ 978.084909] name failslab, interval 1, probability 0, space 0, times 0 [ 978.096609] CPU: 1 PID: 17193 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 978.104517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.113899] Call Trace: [ 978.116503] dump_stack+0x197/0x210 [ 978.120152] should_fail.cold+0xa/0x1b [ 978.124059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 978.129176] ? lock_downgrade+0x880/0x880 [ 978.133344] __should_failslab+0x121/0x190 [ 978.137595] should_failslab+0x9/0x14 [ 978.141417] kmem_cache_alloc_node_trace+0x274/0x720 [ 978.146547] ? __alloc_skb+0xd5/0x5f0 [ 978.150378] __kmalloc_node_track_caller+0x3d/0x80 [ 978.155325] __kmalloc_reserve.isra.0+0x40/0xf0 [ 978.160012] __alloc_skb+0x10b/0x5f0 [ 978.163739] ? skb_trim+0x190/0x190 [ 978.167383] ? should_fail+0x14d/0x85c [ 978.171404] _sctp_make_chunk+0x5e/0x280 [ 978.175499] sctp_make_datafrag_empty+0x183/0x250 [ 978.180353] ? sctp_make_ecne+0x120/0x120 [ 978.184527] sctp_datamsg_from_user+0x636/0x11c0 [ 978.189319] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 978.193916] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 978.198526] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 978.203988] ? sctp_autobind+0x1e0/0x1e0 [ 978.208060] ? lockdep_hardirqs_on+0x415/0x5d0 [ 978.212657] ? lock_sock_nested+0x9a/0x120 [ 978.216902] ? trace_hardirqs_on+0x67/0x220 [ 978.221258] ? lock_sock_nested+0x9a/0x120 [ 978.225516] ? __local_bh_enable_ip+0x15a/0x270 [ 978.230198] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 978.235761] sctp_sendmsg+0x109a/0x17d0 [ 978.239851] ? sctp_id2assoc+0x2d0/0x2d0 [ 978.243924] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 978.249301] ? _copy_from_user+0xdd/0x150 [ 978.253486] inet_sendmsg+0x141/0x5d0 [ 978.257299] ? ipip_gro_receive+0x100/0x100 [ 978.261639] sock_sendmsg+0xd7/0x130 [ 978.265367] ___sys_sendmsg+0x803/0x920 [ 978.269359] ? copy_msghdr_from_user+0x430/0x430 [ 978.274143] ? lock_downgrade+0x880/0x880 [ 978.278310] ? kasan_check_read+0x11/0x20 [ 978.282476] ? __fget+0x367/0x540 [ 978.285984] ? __fget_light+0x1a9/0x230 [ 978.289968] ? __fdget+0x1b/0x20 [ 978.293344] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 978.298897] __sys_sendmsg+0x105/0x1d0 [ 978.302799] ? __ia32_sys_shutdown+0x80/0x80 [ 978.307235] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 978.312004] ? do_syscall_64+0x26/0x620 [ 978.315989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.321364] ? do_syscall_64+0x26/0x620 [ 978.325356] __x64_sys_sendmsg+0x78/0xb0 [ 978.329432] do_syscall_64+0xfd/0x620 [ 978.333245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.338537] RIP: 0033:0x45b399 [ 978.341739] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:25:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x12a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 978.360644] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 978.368360] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 978.375636] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 978.382909] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 978.390186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 978.397460] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000004c 07:25:43 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x3e) 07:25:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b9effffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf5ffffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x80a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:44 executing program 3 (fault-call:5 fault-nth:77): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 978.656238] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 978.708127] FAULT_INJECTION: forcing a failure. [ 978.708127] name failslab, interval 1, probability 0, space 0, times 0 [ 978.724194] CPU: 0 PID: 17213 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 978.732129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.741491] Call Trace: [ 978.744099] dump_stack+0x197/0x210 [ 978.747746] should_fail.cold+0xa/0x1b [ 978.751651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 978.756767] ? lock_downgrade+0x880/0x880 [ 978.760938] __should_failslab+0x121/0x190 [ 978.765185] should_failslab+0x9/0x14 [ 978.769007] kmem_cache_alloc_node_trace+0x274/0x720 [ 978.774123] ? __alloc_skb+0xd5/0x5f0 [ 978.777947] __kmalloc_node_track_caller+0x3d/0x80 [ 978.782904] __kmalloc_reserve.isra.0+0x40/0xf0 [ 978.787598] __alloc_skb+0x10b/0x5f0 [ 978.791333] ? skb_trim+0x190/0x190 [ 978.794971] ? should_fail+0x14d/0x85c [ 978.798886] _sctp_make_chunk+0x5e/0x280 [ 978.802970] sctp_make_datafrag_empty+0x183/0x250 [ 978.807829] ? sctp_make_ecne+0x120/0x120 [ 978.811999] sctp_datamsg_from_user+0x636/0x11c0 [ 978.816788] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 978.821380] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 978.826075] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 978.831562] ? sctp_autobind+0x1e0/0x1e0 [ 978.835639] ? lockdep_hardirqs_on+0x415/0x5d0 [ 978.840229] ? lock_sock_nested+0x9a/0x120 [ 978.844493] ? trace_hardirqs_on+0x67/0x220 [ 978.848836] ? lock_sock_nested+0x9a/0x120 [ 978.853085] ? __local_bh_enable_ip+0x15a/0x270 [ 978.857763] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 978.863319] sctp_sendmsg+0x109a/0x17d0 [ 978.867313] ? sctp_id2assoc+0x2d0/0x2d0 [ 978.871393] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 978.876767] ? _copy_from_user+0xdd/0x150 [ 978.881059] inet_sendmsg+0x141/0x5d0 [ 978.884884] ? ipip_gro_receive+0x100/0x100 [ 978.889221] sock_sendmsg+0xd7/0x130 [ 978.892951] ___sys_sendmsg+0x803/0x920 [ 978.896943] ? copy_msghdr_from_user+0x430/0x430 [ 978.901716] ? lock_downgrade+0x880/0x880 [ 978.905878] ? kasan_check_read+0x11/0x20 [ 978.910045] ? __fget+0x367/0x540 [ 978.913532] ? __fget_light+0x1a9/0x230 [ 978.917519] ? __fdget+0x1b/0x20 [ 978.920894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 978.926453] __sys_sendmsg+0x105/0x1d0 [ 978.930366] ? __ia32_sys_shutdown+0x80/0x80 [ 978.934801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 978.939575] ? do_syscall_64+0x26/0x620 [ 978.943559] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.948932] ? do_syscall_64+0x26/0x620 [ 978.952925] __x64_sys_sendmsg+0x78/0xb0 [ 978.957002] do_syscall_64+0xfd/0x620 [ 978.960909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.966135] RIP: 0033:0x45b399 [ 978.969348] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 978.988257] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 978.995977] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x13a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 979.003255] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 979.010533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 979.017813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 979.025094] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000004d 07:25:44 executing program 3 (fault-call:5 fault-nth:78): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf6ffffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 979.144011] FAULT_INJECTION: forcing a failure. [ 979.144011] name failslab, interval 1, probability 0, space 0, times 0 [ 979.173358] CPU: 1 PID: 17220 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 979.181289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.191625] Call Trace: [ 979.194232] dump_stack+0x197/0x210 [ 979.197881] should_fail.cold+0xa/0x1b [ 979.201808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 979.207368] ? lock_downgrade+0x880/0x880 [ 979.211547] __should_failslab+0x121/0x190 [ 979.215806] should_failslab+0x9/0x14 [ 979.219631] kmem_cache_alloc_node_trace+0x274/0x720 [ 979.224753] ? __alloc_skb+0xd5/0x5f0 [ 979.228571] __kmalloc_node_track_caller+0x3d/0x80 [ 979.233518] __kmalloc_reserve.isra.0+0x40/0xf0 [ 979.238204] __alloc_skb+0x10b/0x5f0 [ 979.241933] ? skb_trim+0x190/0x190 [ 979.245581] ? lock_downgrade+0x880/0x880 [ 979.249745] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 979.254773] ? iov_iter_advance+0x261/0xe30 [ 979.259111] _sctp_make_chunk+0x5e/0x280 [ 979.263188] sctp_make_datafrag_empty+0x183/0x250 [ 979.268043] ? sctp_make_ecne+0x120/0x120 [ 979.272202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 979.278023] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 979.282968] sctp_datamsg_from_user+0x636/0x11c0 [ 979.287764] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 979.292359] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 979.296972] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 979.302443] ? sctp_autobind+0x1e0/0x1e0 [ 979.306520] ? lockdep_hardirqs_on+0x415/0x5d0 [ 979.311113] ? lock_sock_nested+0x9a/0x120 [ 979.315361] ? trace_hardirqs_on+0x67/0x220 [ 979.319692] ? lock_sock_nested+0x9a/0x120 [ 979.323942] ? __local_bh_enable_ip+0x15a/0x270 [ 979.328624] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 979.334180] sctp_sendmsg+0x109a/0x17d0 [ 979.338173] ? sctp_id2assoc+0x2d0/0x2d0 [ 979.342242] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 979.347621] ? _copy_from_user+0xdd/0x150 [ 979.351834] inet_sendmsg+0x141/0x5d0 [ 979.355652] ? ipip_gro_receive+0x100/0x100 [ 979.359982] sock_sendmsg+0xd7/0x130 [ 979.363706] ___sys_sendmsg+0x803/0x920 [ 979.367692] ? copy_msghdr_from_user+0x430/0x430 [ 979.372466] ? lock_downgrade+0x880/0x880 [ 979.376626] ? kasan_check_read+0x11/0x20 [ 979.380792] ? __fget+0x367/0x540 [ 979.384271] ? __fget_light+0x1a9/0x230 [ 979.388255] ? __fdget+0x1b/0x20 [ 979.391628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 979.397439] __sys_sendmsg+0x105/0x1d0 [ 979.401338] ? __ia32_sys_shutdown+0x80/0x80 [ 979.405775] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 979.410545] ? do_syscall_64+0x26/0x620 [ 979.414527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.419902] ? do_syscall_64+0x26/0x620 [ 979.423895] __x64_sys_sendmsg+0x78/0xb0 [ 979.427974] do_syscall_64+0xfd/0x620 [ 979.431807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.437008] RIP: 0033:0x45b399 [ 979.440213] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.459123] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 979.466848] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 979.474132] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 979.482281] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:25:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x9000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 979.489679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 979.497006] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000004e 07:25:44 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x42) 07:25:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bc3ffffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:45 executing program 3 (fault-call:5 fault-nth:79): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x14a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfcfdffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 979.645526] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x90a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 979.739364] FAULT_INJECTION: forcing a failure. [ 979.739364] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 979.751215] CPU: 0 PID: 17239 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 979.759090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.768439] Call Trace: [ 979.771027] dump_stack+0x197/0x210 [ 979.774665] should_fail.cold+0xa/0x1b [ 979.778549] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 979.783658] ? mark_held_locks+0x100/0x100 [ 979.787896] ? _sctp_make_chunk+0x5e/0x280 [ 979.792124] ? sctp_make_datafrag_empty+0x183/0x250 [ 979.797136] __alloc_pages_nodemask+0x1ee/0x750 [ 979.801798] ? do_syscall_64+0xfd/0x620 [ 979.805768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.811127] ? __alloc_pages_slowpath+0x2870/0x2870 [ 979.816143] cache_grow_begin+0x91/0x8c0 [ 979.820195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 979.825725] ? check_preemption_disabled+0x48/0x290 [ 979.830739] kmem_cache_alloc_node_trace+0x655/0x720 [ 979.835843] __kmalloc_node_track_caller+0x3d/0x80 [ 979.840769] __kmalloc_reserve.isra.0+0x40/0xf0 [ 979.845461] __alloc_skb+0x10b/0x5f0 [ 979.849182] ? skb_trim+0x190/0x190 [ 979.852811] ? lock_downgrade+0x880/0x880 [ 979.856952] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 979.861966] ? iov_iter_advance+0x261/0xe30 [ 979.866291] _sctp_make_chunk+0x5e/0x280 [ 979.870348] sctp_make_datafrag_empty+0x183/0x250 [ 979.875191] ? sctp_make_ecne+0x120/0x120 [ 979.879344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 979.884876] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 979.889630] sctp_datamsg_from_user+0x636/0x11c0 [ 979.896474] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 979.901051] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 979.905639] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 979.911091] ? sctp_autobind+0x1e0/0x1e0 [ 979.915161] ? lockdep_hardirqs_on+0x415/0x5d0 [ 979.919735] ? lock_sock_nested+0x9a/0x120 [ 979.923962] ? trace_hardirqs_on+0x67/0x220 [ 979.928273] ? lock_sock_nested+0x9a/0x120 [ 979.932503] ? __local_bh_enable_ip+0x15a/0x270 [ 979.937207] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 979.942749] sctp_sendmsg+0x109a/0x17d0 [ 979.947769] ? sctp_id2assoc+0x2d0/0x2d0 [ 979.951825] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 979.957194] ? _copy_from_user+0xdd/0x150 [ 979.961356] inet_sendmsg+0x141/0x5d0 [ 979.965151] ? ipip_gro_receive+0x100/0x100 [ 979.969469] sock_sendmsg+0xd7/0x130 [ 979.973179] ___sys_sendmsg+0x803/0x920 [ 979.977151] ? copy_msghdr_from_user+0x430/0x430 [ 979.981907] ? lock_downgrade+0x880/0x880 [ 979.986051] ? kasan_check_read+0x11/0x20 [ 979.990197] ? __fget+0x367/0x540 [ 979.993661] ? __fget_light+0x1a9/0x230 [ 979.997635] ? __fdget+0x1b/0x20 [ 980.001003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 980.006533] __sys_sendmsg+0x105/0x1d0 [ 980.010420] ? __ia32_sys_shutdown+0x80/0x80 [ 980.014828] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 980.019576] ? do_syscall_64+0x26/0x620 [ 980.023554] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.028908] ? do_syscall_64+0x26/0x620 [ 980.032970] __x64_sys_sendmsg+0x78/0xb0 [ 980.037041] do_syscall_64+0xfd/0x620 [ 980.040854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.046037] RIP: 0033:0x45b399 [ 980.049227] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.068121] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 980.075832] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 980.083098] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 980.090382] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 980.097655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 980.104921] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000004f 07:25:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfdfdffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000be4ffffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x15a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:45 executing program 3 (fault-call:5 fault-nth:80): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x43) 07:25:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xfeffffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 980.495842] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xa0a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 980.546059] FAULT_INJECTION: forcing a failure. [ 980.546059] name failslab, interval 1, probability 0, space 0, times 0 [ 980.571195] CPU: 1 PID: 17262 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 980.579112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.588471] Call Trace: [ 980.591088] dump_stack+0x197/0x210 [ 980.594744] should_fail.cold+0xa/0x1b [ 980.598661] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 980.603793] ? lock_downgrade+0x880/0x880 [ 980.607967] __should_failslab+0x121/0x190 [ 980.612229] should_failslab+0x9/0x14 [ 980.616048] kmem_cache_alloc+0x2ae/0x700 [ 980.620221] ? skb_trim+0x190/0x190 [ 980.623868] ? lock_downgrade+0x880/0x880 [ 980.628041] sctp_chunkify+0x4b/0x290 [ 980.631854] _sctp_make_chunk+0x15a/0x280 [ 980.636021] sctp_make_datafrag_empty+0x183/0x250 [ 980.640881] ? sctp_make_ecne+0x120/0x120 [ 980.645048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 980.650603] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 980.655383] sctp_datamsg_from_user+0x636/0x11c0 [ 980.660184] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 980.664779] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 980.669405] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 980.674987] ? sctp_autobind+0x1e0/0x1e0 [ 980.679062] ? retint_kernel+0x2d/0x2d [ 980.682981] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 980.688542] sctp_sendmsg+0x109a/0x17d0 [ 980.692544] ? sctp_id2assoc+0x2d0/0x2d0 [ 980.696625] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 980.702012] ? _copy_from_user+0xdd/0x150 [ 980.706197] inet_sendmsg+0x141/0x5d0 [ 980.710016] ? ipip_gro_receive+0x100/0x100 [ 980.714358] sock_sendmsg+0xd7/0x130 [ 980.718104] ___sys_sendmsg+0x803/0x920 [ 980.722108] ? copy_msghdr_from_user+0x430/0x430 [ 980.726902] ? lock_downgrade+0x880/0x880 [ 980.731067] ? kasan_check_read+0x11/0x20 [ 980.735237] ? __fget+0x367/0x540 [ 980.738718] ? __fget_light+0x1a9/0x230 [ 980.742713] ? __fdget+0x1b/0x20 [ 980.746103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 980.751665] __sys_sendmsg+0x105/0x1d0 [ 980.755576] ? __ia32_sys_shutdown+0x80/0x80 [ 980.760105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 980.764872] ? do_syscall_64+0x26/0x620 [ 980.768858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.774354] ? do_syscall_64+0x26/0x620 [ 980.778348] __x64_sys_sendmsg+0x78/0xb0 [ 980.782441] do_syscall_64+0xfd/0x620 [ 980.786273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.791481] RIP: 0033:0x45b399 [ 980.794690] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.813609] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 980.821341] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 980.828619] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 980.835903] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 980.843186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 980.850508] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000050 07:25:46 executing program 3 (fault-call:5 fault-nth:81): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xff07040000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 981.019488] FAULT_INJECTION: forcing a failure. [ 981.019488] name failslab, interval 1, probability 0, space 0, times 0 [ 981.054371] CPU: 1 PID: 17271 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 981.062283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.071642] Call Trace: [ 981.074246] dump_stack+0x197/0x210 [ 981.077926] should_fail.cold+0xa/0x1b [ 981.081842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.086961] ? lock_downgrade+0x880/0x880 [ 981.091244] __should_failslab+0x121/0x190 [ 981.095495] should_failslab+0x9/0x14 [ 981.099307] kmem_cache_alloc+0x2ae/0x700 [ 981.103470] ? skb_trim+0x190/0x190 [ 981.107122] ? lock_downgrade+0x880/0x880 [ 981.111290] sctp_chunkify+0x4b/0x290 [ 981.115108] _sctp_make_chunk+0x15a/0x280 [ 981.119277] sctp_make_datafrag_empty+0x183/0x250 [ 981.124132] ? sctp_make_ecne+0x120/0x120 [ 981.128297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 981.133848] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 981.138771] sctp_datamsg_from_user+0x636/0x11c0 [ 981.143560] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 981.148155] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 981.152775] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 981.158240] ? sctp_autobind+0x1e0/0x1e0 [ 981.162320] ? lockdep_hardirqs_on+0x415/0x5d0 [ 981.166918] ? lock_sock_nested+0x9a/0x120 [ 981.171166] ? trace_hardirqs_on+0x67/0x220 [ 981.175603] ? lock_sock_nested+0x9a/0x120 [ 981.179860] ? __local_bh_enable_ip+0x15a/0x270 [ 981.184545] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 981.190133] sctp_sendmsg+0x109a/0x17d0 [ 981.194253] ? sctp_id2assoc+0x2d0/0x2d0 [ 981.198326] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 981.203707] ? _copy_from_user+0xdd/0x150 [ 981.207892] inet_sendmsg+0x141/0x5d0 [ 981.211717] ? ipip_gro_receive+0x100/0x100 [ 981.216574] sock_sendmsg+0xd7/0x130 [ 981.220409] ___sys_sendmsg+0x803/0x920 [ 981.224399] ? copy_msghdr_from_user+0x430/0x430 [ 981.229173] ? lock_downgrade+0x880/0x880 [ 981.233344] ? kasan_check_read+0x11/0x20 [ 981.237509] ? __fget+0x367/0x540 [ 981.240988] ? __fget_light+0x1a9/0x230 [ 981.244973] ? __fdget+0x1b/0x20 [ 981.248357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 981.253926] __sys_sendmsg+0x105/0x1d0 [ 981.257857] ? __ia32_sys_shutdown+0x80/0x80 [ 981.262328] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 981.267110] ? do_syscall_64+0x26/0x620 [ 981.271102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.276578] ? do_syscall_64+0x26/0x620 [ 981.280586] __x64_sys_sendmsg+0x78/0xb0 [ 981.284695] do_syscall_64+0xfd/0x620 [ 981.288521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.293717] RIP: 0033:0x45b399 [ 981.297617] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:25:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x16a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 981.316555] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 981.324289] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 981.331568] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 981.338845] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 981.346141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 981.353431] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000051 07:25:46 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x48) 07:25:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bf0ffffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:46 executing program 3 (fault-call:5 fault-nth:82): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xff0f000000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xb0a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 981.608173] FAULT_INJECTION: forcing a failure. [ 981.608173] name failslab, interval 1, probability 0, space 0, times 0 [ 981.654042] CPU: 1 PID: 17290 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 981.661977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.671344] Call Trace: [ 981.673951] dump_stack+0x197/0x210 [ 981.677625] should_fail.cold+0xa/0x1b [ 981.681541] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.686659] ? lock_downgrade+0x880/0x880 [ 981.690831] __should_failslab+0x121/0x190 [ 981.695083] should_failslab+0x9/0x14 [ 981.698898] kmem_cache_alloc_node_trace+0x274/0x720 [ 981.704017] ? __alloc_skb+0xd5/0x5f0 [ 981.707839] __kmalloc_node_track_caller+0x3d/0x80 [ 981.712792] __kmalloc_reserve.isra.0+0x40/0xf0 [ 981.717603] __alloc_skb+0x10b/0x5f0 [ 981.721339] ? skb_trim+0x190/0x190 [ 981.724977] ? lock_downgrade+0x880/0x880 [ 981.729142] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 981.734171] ? iov_iter_advance+0x261/0xe30 [ 981.738512] _sctp_make_chunk+0x5e/0x280 [ 981.742586] sctp_make_datafrag_empty+0x183/0x250 [ 981.747444] ? sctp_make_ecne+0x120/0x120 [ 981.751601] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 981.757238] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 981.762021] sctp_datamsg_from_user+0x636/0x11c0 [ 981.766860] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 981.771470] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 981.776080] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 981.781551] ? sctp_autobind+0x1e0/0x1e0 [ 981.785633] ? lockdep_hardirqs_on+0x415/0x5d0 [ 981.790239] ? lock_sock_nested+0x9a/0x120 [ 981.794485] ? trace_hardirqs_on+0x67/0x220 [ 981.798817] ? lock_sock_nested+0x9a/0x120 [ 981.803074] ? __local_bh_enable_ip+0x15a/0x270 [ 981.807770] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 981.813328] sctp_sendmsg+0x109a/0x17d0 [ 981.817325] ? sctp_id2assoc+0x2d0/0x2d0 [ 981.821422] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 981.826803] ? _copy_from_user+0xdd/0x150 [ 981.830993] inet_sendmsg+0x141/0x5d0 [ 981.834863] ? ipip_gro_receive+0x100/0x100 [ 981.839207] sock_sendmsg+0xd7/0x130 [ 981.842940] ___sys_sendmsg+0x803/0x920 [ 981.846955] ? copy_msghdr_from_user+0x430/0x430 [ 981.851735] ? lock_downgrade+0x880/0x880 [ 981.855910] ? kasan_check_read+0x11/0x20 [ 981.860082] ? __fget+0x367/0x540 [ 981.863570] ? __fget_light+0x1a9/0x230 [ 981.867566] ? __fdget+0x1b/0x20 [ 981.870952] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 981.876509] __sys_sendmsg+0x105/0x1d0 [ 981.880416] ? __ia32_sys_shutdown+0x80/0x80 [ 981.884855] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 981.889637] ? do_syscall_64+0x26/0x620 [ 981.893646] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.899027] ? do_syscall_64+0x26/0x620 [ 981.903028] __x64_sys_sendmsg+0x78/0xb0 [ 981.907221] do_syscall_64+0xfd/0x620 [ 981.911043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.916249] RIP: 0033:0x45b399 [ 981.919455] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 981.938365] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 981.946089] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x17a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 981.953372] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 981.960654] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 981.967928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 981.975211] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000052 [ 981.982973] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:47 executing program 3 (fault-call:5 fault-nth:83): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bf5ffffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xffff1f0000000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xb260000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 982.179313] FAULT_INJECTION: forcing a failure. [ 982.179313] name failslab, interval 1, probability 0, space 0, times 0 [ 982.203441] CPU: 0 PID: 17300 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 982.211360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.220731] Call Trace: [ 982.223343] dump_stack+0x197/0x210 07:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x18000000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:47 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x49) [ 982.226998] should_fail.cold+0xa/0x1b [ 982.230908] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 982.236030] ? lock_downgrade+0x880/0x880 [ 982.240206] __should_failslab+0x121/0x190 [ 982.244539] should_failslab+0x9/0x14 [ 982.248354] kmem_cache_alloc_node_trace+0x274/0x720 [ 982.253484] ? __alloc_skb+0xd5/0x5f0 [ 982.257309] __kmalloc_node_track_caller+0x3d/0x80 [ 982.262253] __kmalloc_reserve.isra.0+0x40/0xf0 [ 982.267009] __alloc_skb+0x10b/0x5f0 [ 982.270762] ? skb_trim+0x190/0x190 [ 982.274485] ? lock_downgrade+0x880/0x880 [ 982.278662] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 982.283699] ? iov_iter_advance+0x261/0xe30 [ 982.288043] _sctp_make_chunk+0x5e/0x280 [ 982.292129] sctp_make_datafrag_empty+0x183/0x250 [ 982.296987] ? sctp_make_ecne+0x120/0x120 [ 982.301154] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 982.306705] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 982.311482] sctp_datamsg_from_user+0x636/0x11c0 [ 982.316271] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 982.320872] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 982.325492] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 982.330961] ? sctp_autobind+0x1e0/0x1e0 [ 982.335039] ? lockdep_hardirqs_on+0x415/0x5d0 [ 982.339641] ? lock_sock_nested+0x9a/0x120 [ 982.343901] ? trace_hardirqs_on+0x67/0x220 [ 982.348238] ? lock_sock_nested+0x9a/0x120 [ 982.352479] ? __local_bh_enable_ip+0x15a/0x270 [ 982.357151] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 982.362703] sctp_sendmsg+0x109a/0x17d0 [ 982.366699] ? sctp_id2assoc+0x2d0/0x2d0 [ 982.370862] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 982.376234] ? _copy_from_user+0xdd/0x150 [ 982.380407] inet_sendmsg+0x141/0x5d0 [ 982.384206] ? ipip_gro_receive+0x100/0x100 [ 982.388544] sock_sendmsg+0xd7/0x130 [ 982.392261] ___sys_sendmsg+0x803/0x920 [ 982.396231] ? copy_msghdr_from_user+0x430/0x430 [ 982.401004] ? lock_downgrade+0x880/0x880 [ 982.405162] ? kasan_check_read+0x11/0x20 [ 982.409310] ? __fget+0x367/0x540 [ 982.412767] ? __fget_light+0x1a9/0x230 [ 982.416752] ? __fdget+0x1b/0x20 [ 982.420229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 982.425776] __sys_sendmsg+0x105/0x1d0 [ 982.429673] ? __ia32_sys_shutdown+0x80/0x80 [ 982.434087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 982.438851] ? do_syscall_64+0x26/0x620 [ 982.442841] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.448224] ? do_syscall_64+0x26/0x620 [ 982.452201] __x64_sys_sendmsg+0x78/0xb0 [ 982.456254] do_syscall_64+0xfd/0x620 [ 982.460068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.465252] RIP: 0033:0x45b399 [ 982.468475] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.487384] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 982.495106] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 982.502392] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 982.509736] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 982.517008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:25:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xffffff7f00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 982.524274] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000053 [ 982.532192] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:48 executing program 3 (fault-call:5 fault-nth:84): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xffffffff00000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 982.803805] FAULT_INJECTION: forcing a failure. [ 982.803805] name failslab, interval 1, probability 0, space 0, times 0 [ 982.860618] CPU: 1 PID: 17324 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 982.868554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.877927] Call Trace: [ 982.880536] dump_stack+0x197/0x210 [ 982.884188] should_fail.cold+0xa/0x1b [ 982.888104] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 982.893228] ? lock_downgrade+0x880/0x880 [ 982.897397] __should_failslab+0x121/0x190 [ 982.901652] should_failslab+0x9/0x14 [ 982.905463] kmem_cache_alloc_node_trace+0x274/0x720 [ 982.910588] ? __alloc_skb+0xd5/0x5f0 [ 982.914409] __kmalloc_node_track_caller+0x3d/0x80 [ 982.919463] __kmalloc_reserve.isra.0+0x40/0xf0 [ 982.921239] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 982.924151] __alloc_skb+0x10b/0x5f0 [ 982.924174] ? skb_trim+0x190/0x190 [ 982.940244] ? lock_downgrade+0x880/0x880 [ 982.944456] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 982.949491] ? iov_iter_advance+0x261/0xe30 [ 982.953839] _sctp_make_chunk+0x5e/0x280 [ 982.957922] sctp_make_datafrag_empty+0x183/0x250 [ 982.962890] ? sctp_make_ecne+0x120/0x120 [ 982.967184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 982.972739] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 982.977514] sctp_datamsg_from_user+0x636/0x11c0 [ 982.982300] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 982.986983] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 982.991607] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 982.997083] ? sctp_autobind+0x1e0/0x1e0 [ 983.001167] ? lockdep_hardirqs_on+0x415/0x5d0 [ 983.005767] ? lock_sock_nested+0x9a/0x120 [ 983.010026] ? trace_hardirqs_on+0x67/0x220 [ 983.014372] ? lock_sock_nested+0x9a/0x120 [ 983.018630] ? __local_bh_enable_ip+0x15a/0x270 [ 983.023318] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 983.028919] sctp_sendmsg+0x109a/0x17d0 [ 983.032935] ? sctp_id2assoc+0x2d0/0x2d0 [ 983.037013] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 983.042397] ? _copy_from_user+0xdd/0x150 [ 983.046588] inet_sendmsg+0x141/0x5d0 [ 983.050418] ? ipip_gro_receive+0x100/0x100 [ 983.054752] sock_sendmsg+0xd7/0x130 [ 983.058482] ___sys_sendmsg+0x803/0x920 [ 983.062478] ? copy_msghdr_from_user+0x430/0x430 [ 983.067260] ? lock_downgrade+0x880/0x880 [ 983.071433] ? kasan_check_read+0x11/0x20 [ 983.075606] ? __fget+0x367/0x540 [ 983.079088] ? __fget_light+0x1a9/0x230 [ 983.083181] ? __fdget+0x1b/0x20 [ 983.086565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.092122] __sys_sendmsg+0x105/0x1d0 [ 983.096029] ? __ia32_sys_shutdown+0x80/0x80 [ 983.100471] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 983.105243] ? do_syscall_64+0x26/0x620 [ 983.109230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.114609] ? do_syscall_64+0x26/0x620 [ 983.118610] __x64_sys_sendmsg+0x78/0xb0 [ 983.122694] do_syscall_64+0xfd/0x620 [ 983.126560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.131764] RIP: 0033:0x45b399 [ 983.134980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.153899] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:48 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x4a) 07:25:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x18a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xc0a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 983.161623] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 983.168901] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 983.176181] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.183459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 983.190743] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000054 07:25:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bfeffffff00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:48 executing program 3 (fault-call:5 fault-nth:85): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xffffffffffffffff, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x19a40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 983.356257] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 983.407534] FAULT_INJECTION: forcing a failure. [ 983.407534] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 983.419486] CPU: 0 PID: 17344 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 983.427374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.436817] Call Trace: [ 983.439440] dump_stack+0x197/0x210 [ 983.443093] should_fail.cold+0xa/0x1b [ 983.447007] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 983.452135] ? mark_held_locks+0x100/0x100 [ 983.456416] ? _sctp_make_chunk+0x5e/0x280 [ 983.460745] ? sctp_make_datafrag_empty+0x183/0x250 [ 983.465766] __alloc_pages_nodemask+0x1ee/0x750 [ 983.470539] ? do_syscall_64+0xfd/0x620 [ 983.474525] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.479887] ? __alloc_pages_slowpath+0x2870/0x2870 [ 983.484907] cache_grow_begin+0x91/0x8c0 [ 983.488974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.494523] ? check_preemption_disabled+0x48/0x290 [ 983.499562] kmem_cache_alloc_node_trace+0x655/0x720 [ 983.504677] __kmalloc_node_track_caller+0x3d/0x80 [ 983.509619] __kmalloc_reserve.isra.0+0x40/0xf0 [ 983.514288] __alloc_skb+0x10b/0x5f0 [ 983.518109] ? skb_trim+0x190/0x190 [ 983.521744] ? lock_downgrade+0x880/0x880 [ 983.525964] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 983.531029] ? iov_iter_advance+0x261/0xe30 [ 983.535350] _sctp_make_chunk+0x5e/0x280 [ 983.539420] sctp_make_datafrag_empty+0x183/0x250 [ 983.544276] ? sctp_make_ecne+0x120/0x120 [ 983.548553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 983.554116] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 983.559061] sctp_datamsg_from_user+0x636/0x11c0 [ 983.563825] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 983.568455] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 983.573061] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 983.578532] ? sctp_autobind+0x1e0/0x1e0 [ 983.582606] ? lockdep_hardirqs_on+0x415/0x5d0 [ 983.587196] ? lock_sock_nested+0x9a/0x120 [ 983.591429] ? trace_hardirqs_on+0x67/0x220 [ 983.595850] ? lock_sock_nested+0x9a/0x120 [ 983.600198] ? __local_bh_enable_ip+0x15a/0x270 [ 983.604879] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 983.610430] sctp_sendmsg+0x109a/0x17d0 [ 983.614501] ? sctp_id2assoc+0x2d0/0x2d0 [ 983.618662] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 983.624034] ? _copy_from_user+0xdd/0x150 [ 983.628316] inet_sendmsg+0x141/0x5d0 [ 983.632136] ? ipip_gro_receive+0x100/0x100 [ 983.636480] sock_sendmsg+0xd7/0x130 [ 983.640223] ___sys_sendmsg+0x803/0x920 [ 983.644216] ? copy_msghdr_from_user+0x430/0x430 [ 983.649013] ? lock_downgrade+0x880/0x880 [ 983.653181] ? kasan_check_read+0x11/0x20 [ 983.657352] ? __fget+0x367/0x540 [ 983.660844] ? __fget_light+0x1a9/0x230 [ 983.664846] ? __fdget+0x1b/0x20 [ 983.672662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.678229] __sys_sendmsg+0x105/0x1d0 [ 983.682135] ? __ia32_sys_shutdown+0x80/0x80 [ 983.686569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 983.691689] ? do_syscall_64+0x26/0x620 [ 983.695688] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.701069] ? do_syscall_64+0x26/0x620 [ 983.705071] __x64_sys_sendmsg+0x78/0xb0 [ 983.709154] do_syscall_64+0xfd/0x620 [ 983.712979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.718180] RIP: 0033:0x45b399 [ 983.721386] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.740395] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 983.748116] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 983.755395] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 983.763281] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.770565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 983.777848] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000055 07:25:49 executing program 3 (fault-call:5 fault-nth:86): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b9679000001000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1aa40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xd0a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro', 0x22}]}) [ 983.989613] FAULT_INJECTION: forcing a failure. [ 983.989613] name failslab, interval 1, probability 0, space 0, times 0 [ 984.011785] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 984.021914] CPU: 1 PID: 17355 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 984.029823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.039289] Call Trace: [ 984.041895] dump_stack+0x197/0x210 [ 984.045565] should_fail.cold+0xa/0x1b [ 984.049482] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 984.054655] ? lock_downgrade+0x880/0x880 [ 984.058827] __should_failslab+0x121/0x190 [ 984.063080] should_failslab+0x9/0x14 [ 984.067108] kmem_cache_alloc_node+0x26c/0x710 [ 984.071701] ? __might_fault+0x12b/0x1e0 [ 984.075790] __alloc_skb+0xd5/0x5f0 [ 984.079446] ? skb_trim+0x190/0x190 [ 984.083096] ? lock_downgrade+0x880/0x880 [ 984.087376] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 984.092411] ? iov_iter_advance+0x261/0xe30 [ 984.096755] _sctp_make_chunk+0x5e/0x280 [ 984.100840] sctp_make_datafrag_empty+0x183/0x250 [ 984.105705] ? sctp_make_ecne+0x120/0x120 [ 984.109873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.115431] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 984.120209] sctp_datamsg_from_user+0x636/0x11c0 [ 984.125256] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 984.129862] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 984.134476] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 984.139944] ? sctp_autobind+0x1e0/0x1e0 [ 984.144026] ? lockdep_hardirqs_on+0x415/0x5d0 [ 984.148631] ? lock_sock_nested+0x9a/0x120 [ 984.152878] ? trace_hardirqs_on+0x67/0x220 [ 984.157223] ? lock_sock_nested+0x9a/0x120 [ 984.161488] ? __local_bh_enable_ip+0x15a/0x270 [ 984.166172] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 984.171739] sctp_sendmsg+0x109a/0x17d0 [ 984.175742] ? sctp_id2assoc+0x2d0/0x2d0 [ 984.179826] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 984.185206] ? _copy_from_user+0xdd/0x150 [ 984.189500] inet_sendmsg+0x141/0x5d0 [ 984.193323] ? ipip_gro_receive+0x100/0x100 [ 984.197663] sock_sendmsg+0xd7/0x130 [ 984.201400] ___sys_sendmsg+0x803/0x920 [ 984.205396] ? copy_msghdr_from_user+0x430/0x430 [ 984.210173] ? lock_downgrade+0x880/0x880 [ 984.214354] ? kasan_check_read+0x11/0x20 [ 984.218520] ? __fget+0x367/0x540 [ 984.222013] ? __fget_light+0x1a9/0x230 [ 984.226005] ? __fdget+0x1b/0x20 [ 984.229430] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.234994] __sys_sendmsg+0x105/0x1d0 [ 984.238913] ? __ia32_sys_shutdown+0x80/0x80 [ 984.243385] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 984.248262] ? do_syscall_64+0x26/0x620 [ 984.252321] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.257701] ? do_syscall_64+0x26/0x620 [ 984.261694] __x64_sys_sendmsg+0x78/0xb0 [ 984.265769] do_syscall_64+0xfd/0x620 [ 984.269591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.274919] RIP: 0033:0x45b399 [ 984.278123] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.297039] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 984.304790] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 984.312071] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 984.319351] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 984.326640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 984.333918] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000056 07:25:49 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x4c) 07:25:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xe0a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 984.374404] FAT-fs (loop5): Unrecognized mount option "nfs=nostale_ro"" or missing value 07:25:49 executing program 3 (fault-call:5 fault-nth:87): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 984.460442] FAT-fs (loop5): Unrecognized mount option "nfs=nostale_ro"" or missing value 07:25:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [], 0x2}) 07:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1ba40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 984.673282] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 984.745614] FAULT_INJECTION: forcing a failure. [ 984.745614] name failslab, interval 1, probability 0, space 0, times 0 [ 984.757795] CPU: 0 PID: 17380 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 984.765706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.775087] Call Trace: [ 984.777699] dump_stack+0x197/0x210 [ 984.781480] should_fail.cold+0xa/0x1b [ 984.785389] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 984.790509] ? lock_downgrade+0x880/0x880 [ 984.794701] __should_failslab+0x121/0x190 [ 984.798966] should_failslab+0x9/0x14 [ 984.802827] kmem_cache_alloc_node+0x26c/0x710 [ 984.807425] ? __might_fault+0x12b/0x1e0 [ 984.811523] __alloc_skb+0xd5/0x5f0 [ 984.815170] ? skb_trim+0x190/0x190 [ 984.818824] ? lock_downgrade+0x880/0x880 [ 984.822993] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 984.828032] ? iov_iter_advance+0x261/0xe30 [ 984.832464] _sctp_make_chunk+0x5e/0x280 [ 984.836564] sctp_make_datafrag_empty+0x183/0x250 [ 984.841436] ? sctp_make_ecne+0x120/0x120 [ 984.845606] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.851156] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 984.855946] sctp_datamsg_from_user+0x636/0x11c0 [ 984.860745] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 984.865450] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 984.870058] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 984.875536] ? sctp_autobind+0x1e0/0x1e0 [ 984.879707] ? lockdep_hardirqs_on+0x415/0x5d0 [ 984.884305] ? lock_sock_nested+0x9a/0x120 [ 984.888562] ? trace_hardirqs_on+0x67/0x220 [ 984.892905] ? lock_sock_nested+0x9a/0x120 [ 984.897166] ? __local_bh_enable_ip+0x15a/0x270 [ 984.901856] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 984.907423] sctp_sendmsg+0x109a/0x17d0 [ 984.911421] ? sctp_id2assoc+0x2d0/0x2d0 [ 984.915517] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 984.920902] ? _copy_from_user+0xdd/0x150 [ 984.925090] inet_sendmsg+0x141/0x5d0 [ 984.928906] ? ipip_gro_receive+0x100/0x100 [ 984.933266] sock_sendmsg+0xd7/0x130 [ 984.936996] ___sys_sendmsg+0x803/0x920 [ 984.940994] ? copy_msghdr_from_user+0x430/0x430 [ 984.945805] ? lock_downgrade+0x880/0x880 [ 984.949978] ? kasan_check_read+0x11/0x20 [ 984.954156] ? __fget+0x367/0x540 [ 984.957839] ? __fget_light+0x1a9/0x230 [ 984.961869] ? __fdget+0x1b/0x20 [ 984.965366] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.970924] __sys_sendmsg+0x105/0x1d0 [ 984.974829] ? __ia32_sys_shutdown+0x80/0x80 [ 984.979282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 984.984060] ? do_syscall_64+0x26/0x620 [ 984.988069] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.993579] ? do_syscall_64+0x26/0x620 [ 984.997582] __x64_sys_sendmsg+0x78/0xb0 [ 985.001668] do_syscall_64+0xfd/0x620 [ 985.005495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.010700] RIP: 0033:0x45b399 [ 985.013913] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 985.032925] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:25:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0000000000040000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 985.040652] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 985.047938] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 985.055226] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 985.062511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 985.069797] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000057 07:25:50 executing program 3 (fault-call:5 fault-nth:88): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:50 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x4e) 07:25:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0xf0a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 985.226437] FAT-fs (loop5): Unrecognized mount option "" or missing value 07:25:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [], 0x3}) [ 985.299592] FAT-fs (loop5): Unrecognized mount option "" or missing value [ 985.389494] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1ca40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x100a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 985.486086] FAULT_INJECTION: forcing a failure. [ 985.486086] name failslab, interval 1, probability 0, space 0, times 0 [ 985.500779] FAT-fs (loop5): Unrecognized mount option "" or missing value [ 985.531859] CPU: 1 PID: 17397 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 985.539928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.549561] Call Trace: [ 985.552342] dump_stack+0x197/0x210 [ 985.556009] should_fail.cold+0xa/0x1b [ 985.559924] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 985.565096] ? lock_downgrade+0x880/0x880 [ 985.569276] __should_failslab+0x121/0x190 [ 985.573531] should_failslab+0x9/0x14 [ 985.577344] kmem_cache_alloc_node_trace+0x274/0x720 [ 985.582473] ? __alloc_skb+0xd5/0x5f0 [ 985.586300] __kmalloc_node_track_caller+0x3d/0x80 [ 985.591255] __kmalloc_reserve.isra.0+0x40/0xf0 [ 985.596030] __alloc_skb+0x10b/0x5f0 [ 985.599765] ? skb_trim+0x190/0x190 [ 985.603456] ? lock_downgrade+0x880/0x880 [ 985.607627] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 985.612673] ? iov_iter_advance+0x261/0xe30 [ 985.617072] _sctp_make_chunk+0x5e/0x280 [ 985.621162] sctp_make_datafrag_empty+0x183/0x250 [ 985.626138] ? sctp_make_ecne+0x120/0x120 [ 985.630328] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 985.635874] ? sctp_user_addto_chunk+0x18f/0x1f0 [ 985.640761] sctp_datamsg_from_user+0x636/0x11c0 [ 985.645560] sctp_sendmsg_to_asoc+0x61a/0x1850 [ 985.650165] ? sctp_assoc_add_peer+0x1fd/0xfc0 [ 985.654865] ? sctp_transport_lookup_process+0x1d0/0x1d0 [ 985.660335] ? sctp_autobind+0x1e0/0x1e0 [ 985.664408] ? lockdep_hardirqs_on+0x415/0x5d0 [ 985.669012] ? lock_sock_nested+0x9a/0x120 [ 985.673311] ? trace_hardirqs_on+0x67/0x220 [ 985.677649] ? lock_sock_nested+0x9a/0x120 [ 985.681906] ? __local_bh_enable_ip+0x15a/0x270 [ 985.686702] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 985.692259] sctp_sendmsg+0x109a/0x17d0 [ 985.696259] ? sctp_id2assoc+0x2d0/0x2d0 [ 985.700332] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 985.705700] ? _copy_from_user+0xdd/0x150 [ 985.709861] inet_sendmsg+0x141/0x5d0 [ 985.713669] ? ipip_gro_receive+0x100/0x100 [ 985.717991] sock_sendmsg+0xd7/0x130 [ 985.721712] ___sys_sendmsg+0x803/0x920 [ 985.725681] ? copy_msghdr_from_user+0x430/0x430 [ 985.730433] ? lock_downgrade+0x880/0x880 [ 985.734585] ? kasan_check_read+0x11/0x20 [ 985.738768] ? __fget+0x367/0x540 [ 985.742254] ? __fget_light+0x1a9/0x230 [ 985.746262] ? __fdget+0x1b/0x20 [ 985.749638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 985.755300] __sys_sendmsg+0x105/0x1d0 [ 985.759197] ? __ia32_sys_shutdown+0x80/0x80 [ 985.763614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 985.768479] ? do_syscall_64+0x26/0x620 [ 985.772455] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.777822] ? do_syscall_64+0x26/0x620 [ 985.781812] __x64_sys_sendmsg+0x78/0xb0 [ 985.785885] do_syscall_64+0xfd/0x620 [ 985.789688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.794969] RIP: 0033:0x45b399 [ 985.798159] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 985.817075] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 985.824788] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 07:25:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0000000000080000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 985.832063] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 985.839327] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 985.846711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 985.854071] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000058 [ 985.929344] FAT-fs (loop5): Unrecognized mount option "" or missing value [ 985.936799] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 07:25:51 executing program 3 (fault-call:5 fault-nth:89): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x110a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [], 0x4}) 07:25:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1da40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:25:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000bffffffff87a00000", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:51 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x4f) [ 986.189484] FAULT_INJECTION: forcing a failure. [ 986.189484] name failslab, interval 1, probability 0, space 0, times 0 [ 986.200097] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 986.216952] CPU: 1 PID: 17421 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 986.224872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.234253] Call Trace: [ 986.236866] dump_stack+0x197/0x210 [ 986.240524] should_fail.cold+0xa/0x1b [ 986.244455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 986.249588] ? kasan_check_read+0x11/0x20 [ 986.253770] __should_failslab+0x121/0x190 [ 986.258024] should_failslab+0x9/0x14 [ 986.261844] __kmalloc_track_caller+0x6d/0x750 [ 986.266449] ? sctp_cmp_addr_exact+0x7d/0xb0 [ 986.270872] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 986.276079] ? sctp_process_init+0xcc1/0x2e10 [ 986.281027] kmemdup+0x27/0x60 [ 986.284242] sctp_process_init+0xcc1/0x2e10 [ 986.288594] ? sctp_verify_init+0x14a0/0x14a0 [ 986.293102] ? sctp_sf_do_5_1C_ack+0x205/0xdf0 [ 986.297702] ? sctp_sf_do_5_1B_init+0xe50/0xe50 [ 986.302400] ? mark_held_locks+0x100/0x100 [ 986.306653] sctp_do_sm+0x3b99/0x5380 [ 986.310469] ? __lock_acquire+0x6ee/0x49c0 [ 986.314739] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 986.320730] ? mark_held_locks+0x100/0x100 [ 986.324976] ? finish_wait+0x18c/0x260 [ 986.328880] ? mark_held_locks+0xb1/0x100 [ 986.333052] ? sctp_assoc_bh_rcv+0x2fc/0x660 [ 986.337487] ? find_held_lock+0x35/0x130 [ 986.341569] ? sctp_assoc_bh_rcv+0x2fc/0x660 [ 986.346014] ? kvm_clock_read+0x18/0x30 [ 986.350000] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 986.355027] ? ktime_get+0x202/0x2f0 [ 986.358759] sctp_assoc_bh_rcv+0x343/0x660 [ 986.363021] sctp_inq_push+0x1e4/0x280 [ 986.366921] sctp_backlog_rcv+0x207/0x13b0 [ 986.371206] ? _raw_spin_unlock_bh+0x31/0x40 [ 986.375772] ? __local_bh_enable_ip+0x15a/0x270 [ 986.380483] ? sctp_hash_obj+0x5f0/0x5f0 [ 986.384563] ? __release_sock+0xca/0x390 [ 986.388639] ? __local_bh_enable_ip+0x15a/0x270 [ 986.393332] __release_sock+0x129/0x390 [ 986.397344] release_sock+0x59/0x1c0 [ 986.401082] sctp_sendmsg+0x10c0/0x17d0 [ 986.405095] ? sctp_id2assoc+0x2d0/0x2d0 [ 986.409171] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 986.414555] ? _copy_from_user+0xdd/0x150 [ 986.418749] inet_sendmsg+0x141/0x5d0 [ 986.422569] ? ipip_gro_receive+0x100/0x100 [ 986.426902] sock_sendmsg+0xd7/0x130 [ 986.430615] ___sys_sendmsg+0x803/0x920 [ 986.434599] ? copy_msghdr_from_user+0x430/0x430 [ 986.439363] ? lock_downgrade+0x880/0x880 [ 986.443509] ? kasan_check_read+0x11/0x20 [ 986.447666] ? __fget+0x367/0x540 [ 986.451146] ? __fget_light+0x1a9/0x230 [ 986.455120] ? __fdget+0x1b/0x20 [ 986.458588] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 986.464133] __sys_sendmsg+0x105/0x1d0 [ 986.468019] ? __ia32_sys_shutdown+0x80/0x80 [ 986.472575] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 986.477335] ? do_syscall_64+0x26/0x620 [ 986.481320] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.486714] ? do_syscall_64+0x26/0x620 [ 986.490751] __x64_sys_sendmsg+0x78/0xb0 [ 986.494826] do_syscall_64+0xfd/0x620 [ 986.498630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.503821] RIP: 0033:0x45b399 [ 986.507009] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 986.526184] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 986.533888] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 986.541222] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 986.548503] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 986.555775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 986.563047] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 0000000000000059 07:25:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x12000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 986.591680] FAT-fs (loop5): Unrecognized mount option "" or missing value 07:25:52 executing program 3 (fault-call:5 fault-nth:90): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) 07:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1ea40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 986.695293] FAT-fs (loop5): Unrecognized mount option "" or missing value [ 986.750823] FAULT_INJECTION: forcing a failure. [ 986.750823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 986.762661] CPU: 0 PID: 17439 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 986.770550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.780019] Call Trace: [ 986.782629] dump_stack+0x197/0x210 [ 986.786295] should_fail.cold+0xa/0x1b [ 986.790213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 986.795341] ? is_bpf_text_address+0xac/0x170 [ 986.799865] ? find_held_lock+0x35/0x130 [ 986.803958] __alloc_pages_nodemask+0x1ee/0x750 [ 986.808651] ? find_held_lock+0x35/0x130 [ 986.812727] ? __alloc_pages_slowpath+0x2870/0x2870 [ 986.817762] ? lock_downgrade+0x880/0x880 [ 986.821937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 986.827078] cache_grow_begin+0x91/0x8c0 [ 986.831318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 986.836901] ? check_preemption_disabled+0x48/0x290 [ 986.841934] __kmalloc_track_caller+0x687/0x750 [ 986.846623] ? sctp_cmp_addr_exact+0x7d/0xb0 07:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x1fa40200, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 986.851048] ? sctp_process_init+0xcc1/0x2e10 [ 986.855577] kmemdup+0x27/0x60 [ 986.858785] sctp_process_init+0xcc1/0x2e10 [ 986.863149] ? sctp_verify_init+0x14a0/0x14a0 [ 986.867670] ? sctp_sf_do_5_1C_ack+0x205/0xdf0 [ 986.872283] ? sctp_sf_do_5_1B_init+0xe50/0xe50 [ 986.876979] ? mark_held_locks+0x100/0x100 [ 986.881236] sctp_do_sm+0x3b99/0x5380 [ 986.885064] ? __lock_acquire+0x6ee/0x49c0 [ 986.889344] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 986.895444] ? mark_held_locks+0x100/0x100 [ 986.899705] ? finish_wait+0x18c/0x260 [ 986.903619] ? mark_held_locks+0xb1/0x100 [ 986.907787] ? sctp_assoc_bh_rcv+0x2fc/0x660 [ 986.912214] ? find_held_lock+0x35/0x130 [ 986.916396] ? sctp_assoc_bh_rcv+0x2fc/0x660 [ 986.920836] ? kvm_clock_read+0x18/0x30 [ 986.924830] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 986.929870] ? ktime_get+0x202/0x2f0 [ 986.933702] sctp_assoc_bh_rcv+0x343/0x660 [ 986.937978] sctp_inq_push+0x1e4/0x280 [ 986.941883] sctp_backlog_rcv+0x207/0x13b0 [ 986.946140] ? _raw_spin_unlock_bh+0x31/0x40 [ 986.950561] ? __local_bh_enable_ip+0x15a/0x270 [ 986.955238] ? sctp_hash_obj+0x5f0/0x5f0 [ 986.959325] ? __release_sock+0xca/0x390 [ 986.963405] ? __local_bh_enable_ip+0x15a/0x270 [ 986.968101] __release_sock+0x129/0x390 [ 986.972108] release_sock+0x59/0x1c0 [ 986.975849] sctp_sendmsg+0x10c0/0x17d0 [ 986.979866] ? sctp_id2assoc+0x2d0/0x2d0 [ 986.983949] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 986.989336] ? _copy_from_user+0xdd/0x150 [ 986.993528] inet_sendmsg+0x141/0x5d0 [ 986.997359] ? ipip_gro_receive+0x100/0x100 [ 987.001701] sock_sendmsg+0xd7/0x130 [ 987.005439] ___sys_sendmsg+0x803/0x920 [ 987.009436] ? copy_msghdr_from_user+0x430/0x430 [ 987.014221] ? lock_downgrade+0x880/0x880 [ 987.018396] ? kasan_check_read+0x11/0x20 [ 987.022561] ? __fget+0x367/0x540 [ 987.026056] ? __fget_light+0x1a9/0x230 [ 987.030108] ? __fdget+0x1b/0x20 [ 987.033488] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 987.039044] __sys_sendmsg+0x105/0x1d0 [ 987.042952] ? __ia32_sys_shutdown+0x80/0x80 [ 987.047391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 987.052169] ? do_syscall_64+0x26/0x620 [ 987.056163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.061536] ? do_syscall_64+0x26/0x620 [ 987.065565] __x64_sys_sendmsg+0x78/0xb0 [ 987.069654] do_syscall_64+0xfd/0x620 [ 987.073477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.078684] RIP: 0033:0x45b399 [ 987.081893] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:25:52 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x50) [ 987.100902] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 987.108639] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 987.115921] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 987.123207] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 987.130491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 987.137774] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000005a 07:25:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x120a0000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 07:25:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0000000000000100", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) 07:25:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [], 0x5}) 07:25:52 executing program 3 (fault-call:5 fault-nth:91): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x34000}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) [ 987.324593] FAT-fs (loop5): Unrecognized mount option "" or missing value [ 987.358781] FAULT_INJECTION: forcing a failure. [ 987.358781] name failslab, interval 1, probability 0, space 0, times 0 [ 987.385918] CPU: 1 PID: 17454 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 987.393976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.403342] Call Trace: [ 987.405945] dump_stack+0x197/0x210 [ 987.409602] should_fail.cold+0xa/0x1b [ 987.413511] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.418902] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 987.424028] ? is_bpf_text_address+0xac/0x170 [ 987.428548] __should_failslab+0x121/0x190 [ 987.432924] should_failslab+0x9/0x14 [ 987.436744] kmem_cache_alloc_trace+0x4b/0x760 [ 987.441356] ? __lock_is_held+0xb6/0x140 [ 987.445439] flex_array_alloc+0x1f9/0x2c0 [ 987.449710] fa_alloc+0x24/0x70 [ 987.453181] sctp_stream_alloc_in+0x2e/0x2a0 [ 987.457612] sctp_stream_init+0x223/0x3c0 [ 987.461881] sctp_process_init+0x237e/0x2e10 [ 987.466320] ? sctp_verify_init+0x14a0/0x14a0 [ 987.470837] ? sctp_sf_do_5_1C_ack+0x205/0xdf0 [ 987.475431] ? sctp_sf_do_5_1B_init+0xe50/0xe50 [ 987.480120] ? mark_held_locks+0x100/0x100 [ 987.484375] sctp_do_sm+0x3b99/0x5380 [ 987.488190] ? __lock_acquire+0x6ee/0x49c0 [ 987.492450] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 987.498566] ? mark_held_locks+0x100/0x100 [ 987.502815] ? finish_wait+0x18c/0x260 [ 987.506739] ? mark_held_locks+0xb1/0x100 [ 987.510913] ? sctp_assoc_bh_rcv+0x2fc/0x660 [ 987.515777] ? find_held_lock+0x35/0x130 [ 987.519870] ? sctp_assoc_bh_rcv+0x2fc/0x660 [ 987.524316] ? kvm_clock_read+0x18/0x30 [ 987.528513] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 987.533551] ? ktime_get+0x202/0x2f0 [ 987.537287] sctp_assoc_bh_rcv+0x343/0x660 [ 987.541659] sctp_inq_push+0x1e4/0x280 [ 987.545678] sctp_backlog_rcv+0x207/0x13b0 [ 987.549938] ? _raw_spin_unlock_bh+0x31/0x40 [ 987.554369] ? __local_bh_enable_ip+0x15a/0x270 [ 987.559071] ? sctp_hash_obj+0x5f0/0x5f0 [ 987.563171] ? __release_sock+0xca/0x390 [ 987.563650] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 987.567250] ? __local_bh_enable_ip+0x15a/0x270 [ 987.567272] __release_sock+0x129/0x390 [ 987.567299] release_sock+0x59/0x1c0 [ 987.567319] sctp_sendmsg+0x10c0/0x17d0 [ 987.567342] ? sctp_id2assoc+0x2d0/0x2d0 [ 987.596370] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 987.601754] ? _copy_from_user+0xdd/0x150 [ 987.605942] inet_sendmsg+0x141/0x5d0 [ 987.609762] ? ipip_gro_receive+0x100/0x100 [ 987.614120] sock_sendmsg+0xd7/0x130 [ 987.617849] ___sys_sendmsg+0x803/0x920 [ 987.621960] ? copy_msghdr_from_user+0x430/0x430 [ 987.626741] ? lock_downgrade+0x880/0x880 [ 987.630913] ? kasan_check_read+0x11/0x20 [ 987.635083] ? __fget+0x367/0x540 [ 987.638608] ? __fget_light+0x1a9/0x230 [ 987.642617] ? __fdget+0x1b/0x20 [ 987.646012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 987.651695] __sys_sendmsg+0x105/0x1d0 [ 987.655608] ? __ia32_sys_shutdown+0x80/0x80 [ 987.660156] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 987.664929] ? do_syscall_64+0x26/0x620 [ 987.668920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.674302] ? do_syscall_64+0x26/0x620 [ 987.678299] __x64_sys_sendmsg+0x78/0xb0 [ 987.682372] do_syscall_64+0xfd/0x620 [ 987.686199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.691419] RIP: 0033:0x45b399 [ 987.694628] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 987.713544] RSP: 002b:00007f026d3b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 987.721267] RAX: ffffffffffffffda RBX: 00007f026d3b46d4 RCX: 000000000045b399 [ 987.728561] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 07:25:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x20020000, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 987.735942] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 987.743228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 987.750508] R13: 00000000000008d3 R14: 00000000004ca2ca R15: 000000000000005b [ 987.769657] kasan: CONFIG_KASAN_INLINE enabled [ 987.774782] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 987.787174] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 987.793423] CPU: 1 PID: 17453 Comm: syz-executor.3 Not tainted 4.19.100-syzkaller #0 [ 987.801325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.810698] RIP: 0010:flex_array_get+0x2d/0x260 [ 987.815364] Code: e5 41 57 41 56 41 55 41 54 41 89 f4 53 48 89 fb 48 83 ec 08 e8 a4 77 04 fe 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e c2 01 00 00 44 8b 33 31 ff 44 [ 987.835136] RSP: 0018:ffff888056317810 EFLAGS: 00010246 [ 987.840490] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff86d1c5d9 [ 987.847756] RDX: 0000000000000000 RSI: ffffffff83668cec RDI: 0000000000000000 [ 987.855021] RBP: ffff888056317840 R08: ffff88804d59e4c0 R09: 0000000000000002 [ 987.862288] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000 [ 987.869558] R13: ffff888033582ea8 R14: 0000000000000000 R15: ffff888084e86b00 [ 987.876916] FS: 00000000016d1940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 987.885137] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 987.891016] CR2: 00007f967c1aa028 CR3: 0000000040684000 CR4: 00000000001406e0 [ 987.898312] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 987.905586] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 987.912847] Call Trace: [ 987.915427] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 987.921072] sctp_sched_dequeue_done+0x207/0x2f0 [ 987.925953] __sctp_outq_teardown+0x6ef/0xc60 [ 987.930454] sctp_outq_free+0x16/0x20 [ 987.934258] sctp_association_free+0x208/0x79a [ 987.938844] sctp_do_sm+0x3bda/0x5380 [ 987.942658] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 987.948663] ? mark_held_locks+0x100/0x100 [ 987.952988] ? mark_held_locks+0x100/0x100 [ 987.957222] ? skb_dequeue+0x12e/0x180 [ 987.961108] ? find_held_lock+0x35/0x130 [ 987.965165] ? skb_dequeue+0x12e/0x180 [ 987.969043] ? mark_held_locks+0xb1/0x100 [ 987.973189] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 987.978283] ? trace_hardirqs_on+0x67/0x220 [ 987.982603] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 987.987717] sctp_primitive_SHUTDOWN+0xa0/0xd0 [ 987.992304] sctp_close+0x445/0x860 [ 987.995923] ? sctp_init_sock+0x1290/0x1290 [ 988.000253] ? lock_acquire+0x16f/0x3f0 [ 988.004227] ? ip_mc_drop_socket+0x20c/0x270 [ 988.008634] inet_release+0xe0/0x1f0 [ 988.012343] __sock_release+0xce/0x2a0 [ 988.016224] ? __sock_release+0x2a0/0x2a0 [ 988.020395] sock_close+0x1b/0x30 [ 988.023856] __fput+0x2dd/0x8b0 [ 988.027128] ____fput+0x16/0x20 [ 988.030405] task_work_run+0x145/0x1c0 [ 988.034288] exit_to_usermode_loop+0x273/0x2c0 [ 988.038870] do_syscall_64+0x53d/0x620 [ 988.042762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.047939] RIP: 0033:0x414f31 [ 988.051124] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 988.070026] RSP: 002b:00007ffee8df8a40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 988.077738] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000414f31 [ 988.085010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 988.092279] RBP: 0000000000000001 R08: 00000000b2c0ecb9 R09: 00000000b2c0ecbd [ 988.099550] R10: 00007ffee8df8b20 R11: 0000000000000293 R12: 000000000075c9a0 [ 988.106817] R13: 000000000075c9a0 R14: 0000000000760950 R15: 000000000075bf2c [ 988.114083] Modules linked in: 07:25:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xba, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d400000010003b0e0092000b0000000000000400", @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e240000050016000200ffe70500170000000000050008000000000008000600ac14141908000700e000000108005edb311f0600000900000000000000ffffdf080005000000000006000e000001000006291100000000000500170000000000", @ANYRES32, @ANYBLOB="042109ddde162b17f01554830730ed756400000002001000000108000700000000000800060000000000"], 0xd4}}, 0x0) [ 988.147771] ---[ end trace 68e3bf5a66eca5ca ]--- 07:25:53 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff034}, {0x6}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x51) 07:25:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x20000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 988.168912] RIP: 0010:flex_array_get+0x2d/0x260 [ 988.185675] Code: e5 41 57 41 56 41 55 41 54 41 89 f4 53 48 89 fb 48 83 ec 08 e8 a4 77 04 fe 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e c2 01 00 00 44 8b 33 31 ff 44 [ 988.211092] FAT-fs (loop5): Unrecognized mount option "" or missing value [ 988.233213] RSP: 0018:ffff888056317810 EFLAGS: 00010246 [ 988.240958] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff86d1c5d9 [ 988.253905] RDX: 0000000000000000 RSI: ffffffff83668cec RDI: 0000000000000000 [ 988.261504] RBP: ffff888056317840 R08: ffff88804d59e4c0 R09: 0000000000000002 07:25:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [], 0x6}) 07:25:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x400000000010804, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x22000000, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 988.278416] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000 [ 988.293441] R13: ffff888033582ea8 R14: 0000000000000000 R15: ffff888084e86b00 [ 988.306220] FS: 00000000016d1940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 988.318117] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 988.324058] CR2: 000000000075c000 CR3: 0000000040684000 CR4: 00000000001406e0 [ 988.349405] FAT-fs (loop5): Unrecognized mount option "" or missing value [ 988.353186] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 988.377951] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 988.395285] Kernel panic - not syncing: Fatal exception [ 988.401941] Kernel Offset: disabled [ 988.405571] Rebooting in 86400 seconds..