Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. 2021/04/28 20:57:53 fuzzer started 2021/04/28 20:57:53 dialing manager at 10.128.0.163:46869 2021/04/28 20:57:54 syscalls: 1982 2021/04/28 20:57:54 code coverage: enabled 2021/04/28 20:57:54 comparison tracing: enabled 2021/04/28 20:57:54 extra coverage: enabled 2021/04/28 20:57:54 setuid sandbox: enabled 2021/04/28 20:57:54 namespace sandbox: enabled 2021/04/28 20:57:54 Android sandbox: enabled 2021/04/28 20:57:54 fault injection: enabled 2021/04/28 20:57:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/04/28 20:57:54 net packet injection: /dev/net/tun does not exist 2021/04/28 20:57:54 net device setup: enabled 2021/04/28 20:57:54 concurrency sanitizer: enabled 2021/04/28 20:57:54 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/04/28 20:57:54 USB emulation: /dev/raw-gadget does not exist 2021/04/28 20:57:54 hci packet injection: /dev/vhci does not exist 2021/04/28 20:57:54 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/04/28 20:57:54 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/04/28 20:57:54 suppressing KCSAN reports in functions: 'step_into' 'generic_write_end' 'ext4_writepages' 2021/04/28 20:57:54 fetching corpus: 0, signal 0/2000 (executing program) 2021/04/28 20:57:54 fetching corpus: 50, signal 16728/19837 (executing program) 2021/04/28 20:57:54 fetching corpus: 100, signal 30101/33745 (executing program) 2021/04/28 20:57:54 fetching corpus: 148, signal 35931/40193 (executing program) 2021/04/28 20:57:54 fetching corpus: 197, signal 42487/46941 (executing program) 2021/04/28 20:57:55 fetching corpus: 247, signal 46411/51123 (executing program) 2021/04/28 20:57:55 fetching corpus: 297, signal 50199/55047 (executing program) 2021/04/28 20:57:55 fetching corpus: 347, signal 54069/58820 (executing program) 2021/04/28 20:57:55 fetching corpus: 397, signal 58318/62621 (executing program) 2021/04/28 20:57:55 fetching corpus: 446, signal 60197/64501 (executing program) 2021/04/28 20:57:55 fetching corpus: 496, signal 63643/67376 (executing program) 2021/04/28 20:57:55 fetching corpus: 546, signal 66210/69440 (executing program) 2021/04/28 20:57:55 fetching corpus: 596, signal 69079/71630 (executing program) 2021/04/28 20:57:56 fetching corpus: 646, signal 70893/72977 (executing program) 2021/04/28 20:57:56 fetching corpus: 696, signal 73441/74805 (executing program) 2021/04/28 20:57:56 fetching corpus: 746, signal 74694/75696 (executing program) 2021/04/28 20:57:56 fetching corpus: 787, signal 76987/77342 (executing program) 2021/04/28 20:57:56 fetching corpus: 787, signal 76989/77359 (executing program) 2021/04/28 20:57:56 fetching corpus: 787, signal 76989/77375 (executing program) 2021/04/28 20:57:56 fetching corpus: 787, signal 76989/77390 (executing program) 2021/04/28 20:57:56 fetching corpus: 787, signal 76989/77411 (executing program) 2021/04/28 20:57:56 fetching corpus: 791, signal 76998/77437 (executing program) 2021/04/28 20:57:56 fetching corpus: 791, signal 76998/77461 (executing program) 2021/04/28 20:57:56 fetching corpus: 791, signal 76998/77498 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77048/77543 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77048/77560 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77048/77581 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77048/77602 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77628 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77654 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77677 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77702 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77727 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77765 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77792 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77811 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77834 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77854 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77882 (executing program) 2021/04/28 20:57:56 fetching corpus: 792, signal 77049/77882 (executing program) 2021/04/28 20:57:57 starting 6 fuzzer processes 20:57:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}) 20:57:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 20:57:57 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:57:57 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "6d3e800916c06a07"}) 20:57:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)={0x0, 0x800, 0xffffffb8}) 20:57:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) [ 21.672062][ T25] audit: type=1400 audit(1619643477.865:8): avc: denied { execmem } for pid=1753 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 21.827259][ T1758] cgroup: Unknown subsys name 'perf_event' [ 21.833745][ T1758] cgroup: Unknown subsys name 'net_cls' [ 21.855529][ T1759] cgroup: Unknown subsys name 'perf_event' [ 21.858752][ T1760] cgroup: Unknown subsys name 'perf_event' [ 21.861517][ T1759] cgroup: Unknown subsys name 'net_cls' [ 21.874441][ T1760] cgroup: Unknown subsys name 'net_cls' [ 21.880835][ T1761] cgroup: Unknown subsys name 'perf_event' [ 21.891189][ T1761] cgroup: Unknown subsys name 'net_cls' [ 21.891782][ T1765] cgroup: Unknown subsys name 'perf_event' [ 21.897929][ T1764] cgroup: Unknown subsys name 'perf_event' [ 21.903637][ T1765] cgroup: Unknown subsys name 'net_cls' [ 21.913522][ T1764] cgroup: Unknown subsys name 'net_cls' 20:58:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)={0x0, 0x800, 0xffffffb8}) 20:58:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 20:58:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)={0x0, 0x800, 0xffffffb8}) 20:58:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 20:58:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)={0x0, 0x800, 0xffffffb8}) 20:58:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) [ 25.866714][ T4491] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000006,,errors=continue. Quota mode: none. 20:58:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}) 20:58:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "6d3e800916c06a07"}) 20:58:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) 20:58:02 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 20:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) [ 25.922815][ T4516] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000006,,errors=continue. Quota mode: none. 20:58:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) 20:58:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "6d3e800916c06a07"}) 20:58:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) 20:58:02 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 20:58:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}) 20:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "6d3e800916c06a07"}) 20:58:02 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 26.031175][ T4545] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000006,,errors=continue. Quota mode: none. [ 26.044165][ T4546] EXT4-fs (sda1): Cannot specify journal on remount [ 26.063302][ T4557] EXT4-fs (sda1): Cannot specify journal on remount 20:58:02 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 20:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="160800ab6cf49ffe3111364fe87d0cee75"], 0x2}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x15) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x39) 20:58:02 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 20:58:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}) 20:58:02 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 26.143771][ T4566] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000006,,errors=continue. Quota mode: none. [ 26.156059][ T4568] EXT4-fs (sda1): Cannot specify journal on remount [ 26.177910][ T4580] EXT4-fs (sda1): Cannot specify journal on remount 20:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 26.191659][ T4581] EXT4-fs (sda1): Cannot specify journal on remount 20:58:02 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 20:58:02 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 20:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:58:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 26.232852][ T4596] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000006,,errors=continue. Quota mode: none. 20:58:02 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0x54}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x447feb, 0x0) 20:58:02 executing program 3: unshare(0x2a000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) 20:58:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:58:05 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2923cc4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a320a0, &(0x7f0000000940)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 20:58:05 executing program 5: open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000240)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) creat(0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:58:05 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="160800ab6cf49ffe3111364fe87d0cee75"], 0x2}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x15) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x39) 20:58:05 executing program 3: unshare(0x2a000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) 20:58:05 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0x54}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x447feb, 0x0) 20:58:05 executing program 4: unshare(0x2a000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) 20:58:05 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="160800ab6cf49ffe3111364fe87d0cee75"], 0x2}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x15) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x39) 20:58:05 executing program 4: unshare(0x2a000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) 20:58:05 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="160800ab6cf49ffe3111364fe87d0cee75"], 0x2}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x15) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x39) [ 29.291148][ T4661] ================================================================== [ 29.299256][ T4661] BUG: KCSAN: data-race in ext4_free_inode / find_next_zero_bit [ 29.306890][ T4661] [ 29.309203][ T4661] write to 0xffff8881051412c8 of 8 bytes by task 1758 on cpu 0: [ 29.316816][ T4661] ext4_free_inode+0x5ce/0xa00 [ 29.321592][ T4661] ext4_evict_inode+0xb7e/0xdb0 [ 29.326441][ T4661] evict+0x1c8/0x3c0 [ 29.330325][ T4661] iput+0x433/0x590 [ 29.334131][ T4661] dentry_unlink_inode+0x23a/0x260 20:58:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:58:05 executing program 3: unshare(0x2a000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) 20:58:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:58:05 executing program 3: unshare(0x2a000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) [ 29.339232][ T4661] d_delete+0x78/0xe0 [ 29.343219][ T4661] vfs_rmdir+0x2a6/0x2c0 [ 29.347459][ T4661] do_rmdir+0x14a/0x2e0 [ 29.351606][ T4661] __x64_sys_rmdir+0x2c/0x30 [ 29.356189][ T4661] do_syscall_64+0x4a/0x90 [ 29.360600][ T4661] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 29.366488][ T4661] [ 29.368799][ T4661] read to 0xffff8881051412c8 of 8 bytes by task 4661 on cpu 1: [ 29.376331][ T4661] find_next_zero_bit+0x3a/0xf0 [ 29.381175][ T4661] find_inode_bit+0x30c/0x3a0 [ 29.385853][ T4661] __ext4_new_inode+0xc6a/0x2f10 20:58:05 executing program 5: open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000240)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) creat(0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:58:05 executing program 0: ustat(0x0, 0x0) 20:58:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000002300)=[{&(0x7f0000000180)="02de955b20f5acf576698ff1347b6426a3a1441ffa555581ee37ba06e5e12f3bc509055a4a3c221fe745c3b9657742ed2f9a4b5c51813e4b1b37", 0x3a}, {&(0x7f0000000300)="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", 0x217}], 0x2) [ 29.390788][ T4661] ext4_symlink+0x2c3/0x700 [ 29.395289][ T4661] vfs_symlink+0x23a/0x300 [ 29.399698][ T4661] do_symlinkat+0xeb/0x280 [ 29.404110][ T4661] __x64_sys_symlink+0x32/0x40 [ 29.408860][ T4661] do_syscall_64+0x4a/0x90 [ 29.413275][ T4661] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 29.419160][ T4661] [ 29.421473][ T4661] Reported by Kernel Concurrency Sanitizer on: [ 29.427606][ T4661] CPU: 1 PID: 4661 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 29.435918][ T4661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.445975][ T4661] ================================================================== 20:58:06 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0x54}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x447feb, 0x0) 20:58:06 executing program 4: unshare(0x2a000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) 20:58:06 executing program 2: open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000240)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) creat(0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:58:06 executing program 5: open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000240)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) creat(0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:58:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000002300)=[{&(0x7f0000000180)="02de955b20f5acf576698ff1347b6426a3a1441ffa555581ee37ba06e5e12f3bc509055a4a3c221fe745c3b9657742ed2f9a4b5c51813e4b1b37", 0x3a}, {&(0x7f0000000300)="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", 0x217}], 0x2) 20:58:06 executing program 0: ustat(0x0, 0x0) 20:58:06 executing program 0: ustat(0x0, 0x0) 20:58:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000002300)=[{&(0x7f0000000180)="02de955b20f5acf576698ff1347b6426a3a1441ffa555581ee37ba06e5e12f3bc509055a4a3c221fe745c3b9657742ed2f9a4b5c51813e4b1b37", 0x3a}, {&(0x7f0000000300)="484bf06089fd6ef6cd79403f60b240bdae6788ba0978909713c29810711a032a3ddf6428ada7ac46e61dedf11444483d20250585947d9d02bd03adabb8b56eaad19c6de570c22c5c25c229f55504c555c6b50f7f103e934a3eb2a86b54f00f1f6b46297180a4bc891bfb7f52c9120f23501efc6d730101a41d2cb4fd28c5d0f19b594fba6529cee0adfcde493998b981f9fca5e347f2f1717992c4f774df67341ea19ad5bbfe605eee7ee24ff5ed6b5d623d1338d44f5a3721417ebc5807ad81d444d61542e08dbd0c15b200c830ea30da9530c0e048b95e73bbc5b92293553779b7bfa6c0b0d437e5f07761c700544724047a4202afe4c38aa6a458f4fb74a57fd9c5c3bf9fb73ed2c4b0b8f924c1d1787b2efa58f4001951b31489111e2512e851395063eb76709b301686c6fbefbeca817e7368a60b3605b26bf1d183334962e62c05859e24e471584c04a650ff4302f86b158fc7c2dd08adbfac21ff8a8bfcf1ad6e798e06f1e36ef1706b86f323950e2987b1ab74c0efcc7c474f391eba512e166ae8770c417aede45e512aa4664cbb4ffcb0dc935dd1e2784370dc3afea1f352fb643529ac785f74f43339e86c8f69ddbdf4a244241753f6253c2588b6bab4be5283ef86e75b31338b071d659d7c3d9c8a9b44e29c56592d4b787c2fd1f2f0cf3989452ca9993fdf1e9d702405278fb0d4585f5f7b20fc9a1472fc68a1681701d5f9c57d7ec92ef83c93e6c272616498db9b3e50", 0x217}], 0x2) 20:58:06 executing program 4: add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="f6", 0x1, 0xfffffffffffffffc) 20:58:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000002300)=[{&(0x7f0000000180)="02de955b20f5acf576698ff1347b6426a3a1441ffa555581ee37ba06e5e12f3bc509055a4a3c221fe745c3b9657742ed2f9a4b5c51813e4b1b37", 0x3a}, {&(0x7f0000000300)="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", 0x217}], 0x2) 20:58:06 executing program 0: ustat(0x0, 0x0) 20:58:06 executing program 2: open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000240)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) creat(0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 30.122380][ C0] hrtimer: interrupt took 15999 ns 20:58:07 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0x54}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x447feb, 0x0) 20:58:07 executing program 5: open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000240)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) creat(0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:58:07 executing program 4: add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="f6", 0x1, 0xfffffffffffffffc) 20:58:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x90}, 0x0) 20:58:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc25faf53760ce03f12c2baf577ec9ca91e9a8f2000000443fdcde8856729ae91ab3f7953f009e96dfe0a98737f57c5200240a7d8523b905ba23e9c52f8867cd88370400000079d395783cc18081a0611ac1b7dfcbf5d21c2d9e68ced6d1eee2d1ee7f00151c64cfbfeeac37abc9787a56f11c08736446c8fc98af7b2edc422c7c07a0877a79c6", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:58:07 executing program 2: open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000240)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) creat(0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:58:07 executing program 4: add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="f6", 0x1, 0xfffffffffffffffc) 20:58:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x90}, 0x0) 20:58:07 executing program 4: add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="f6", 0x1, 0xfffffffffffffffc) 20:58:07 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:58:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="540100001000130700000000003257e0000001000000000000000000880400fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e00000020000000000000000000000000000000032000000ff020000000000000000000000000001fcffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000100000000000000000048000200656362286369706865725f6e756c6c29"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x900000000000000) 20:58:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) [ 31.064352][ T4778] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 31.081290][ T4778] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 31.104910][ T4789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 31.114557][ T4789] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 20:58:08 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:58:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x90}, 0x0) 20:58:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) 20:58:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="540100001000130700000000003257e0000001000000000000000000880400fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e00000020000000000000000000000000000000032000000ff020000000000000000000000000001fcffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000100000000000000000048000200656362286369706865725f6e756c6c29"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x900000000000000) [ 31.841040][ T4805] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 31.850693][ T4805] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 20:58:10 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc25faf53760ce03f12c2baf577ec9ca91e9a8f2000000443fdcde8856729ae91ab3f7953f009e96dfe0a98737f57c5200240a7d8523b905ba23e9c52f8867cd88370400000079d395783cc18081a0611ac1b7dfcbf5d21c2d9e68ced6d1eee2d1ee7f00151c64cfbfeeac37abc9787a56f11c08736446c8fc98af7b2edc422c7c07a0877a79c6", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:58:10 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="540100001000130700000000003257e0000001000000000000000000880400fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e00000020000000000000000000000000000000032000000ff020000000000000000000000000001fcffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000100000000000000000048000200656362286369706865725f6e756c6c29"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x900000000000000) 20:58:10 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:58:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) 20:58:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x90}, 0x0) 20:58:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="540100001000130700000000003257e0000001000000000000000000880400fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e00000020000000000000000000000000000000032000000ff020000000000000000000000000001fcffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000100000000000000000048000200656362286369706865725f6e756c6c29"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x900000000000000) 20:58:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) 20:58:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) 20:58:10 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:58:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="540100001000130700000000003257e0000001000000000000000000880400fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e00000020000000000000000000000000000000032000000ff020000000000000000000000000001fcffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000100000000000000000048000200656362286369706865725f6e756c6c29"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x900000000000000) 20:58:10 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) [ 33.972777][ T4823] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 33.986665][ T4826] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 33.993856][ T4823] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 20:58:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) [ 34.035165][ T4826] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc25faf53760ce03f12c2baf577ec9ca91e9a8f2000000443fdcde8856729ae91ab3f7953f009e96dfe0a98737f57c5200240a7d8523b905ba23e9c52f8867cd88370400000079d395783cc18081a0611ac1b7dfcbf5d21c2d9e68ced6d1eee2d1ee7f00151c64cfbfeeac37abc9787a56f11c08736446c8fc98af7b2edc422c7c07a0877a79c6", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:58:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="540100001000130700000000003257e0000001000000000000000000880400fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e00000020000000000000000000000000000000032000000ff020000000000000000000000000001fcffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000100000000000000000048000200656362286369706865725f6e756c6c29"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x900000000000000) 20:58:13 executing program 5: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe3b, &(0x7f0000000000)=[{&(0x7f00000000c0)="5500000018007f5f14fe01b2a4a29093020604dffffffe010405040539000900350006080100000019000b40060c1001020022dc1338d54404139b84136ef75afb83de4404000500", 0xff72}, {&(0x7f0000000040)="73005000d612110000ff0ea988", 0xd}], 0x2}, 0x0) 20:58:13 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:58:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000180)="4854e11617437d1c4c9c39b35d549265c6a80556f0783770309a7a46be4852c8d1d4a5a0cab3a3af2298f3891c03fc773e014aef0a2fef218aae2f262cfb0803051225621eab13b4e201d9fe9d3e9d2df05e48f9f82961d787d17769192cbd9d66be8b5c933f1048b5e4d7bb8c5a74c515192c92041b15039bd3d7194afc017baa0110c7a0b9291a", 0x88}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)="9cc2e3660bd268b95f60847d4a1ef6ce6cb44ea600a5", 0x16}, {&(0x7f0000000300)="ed", 0x1}, {&(0x7f0000000400)="6b70e30f3b68cc5d4fa8764c825bf9", 0xf}, {&(0x7f0000000440)="7dc0e4984598dbbb8d258c7eba5e1fd8344d699b4f4577a54850329cc49083abf0443a", 0x23}, {&(0x7f0000000500)="e58c688fcc56cb3b0d", 0x9}], 0x5}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000740)="bbfca1c53854f1991f99b0bd427dfcc13ba00ca9f7d7e850f325a6e49bcfff025aaa21d6432ecc854eb1bb24b8ba61c2900dda94", 0x34}, {&(0x7f00000007c0)="eedfb3e07e9104bfa923695fafc7911fbc633e1968e47e79dfa86b251e3685341da779378f8dbd3f8e8a57403f", 0x2d}, {&(0x7f0000000880)}], 0x3}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000bc0)}], 0x1}}], 0x4, 0x8081) 20:58:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) 20:58:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000180)="4854e11617437d1c4c9c39b35d549265c6a80556f0783770309a7a46be4852c8d1d4a5a0cab3a3af2298f3891c03fc773e014aef0a2fef218aae2f262cfb0803051225621eab13b4e201d9fe9d3e9d2df05e48f9f82961d787d17769192cbd9d66be8b5c933f1048b5e4d7bb8c5a74c515192c92041b15039bd3d7194afc017baa0110c7a0b9291a", 0x88}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)="9cc2e3660bd268b95f60847d4a1ef6ce6cb44ea600a5", 0x16}, {&(0x7f0000000300)="ed", 0x1}, {&(0x7f0000000400)="6b70e30f3b68cc5d4fa8764c825bf9", 0xf}, {&(0x7f0000000440)="7dc0e4984598dbbb8d258c7eba5e1fd8344d699b4f4577a54850329cc49083abf0443a", 0x23}, {&(0x7f0000000500)="e58c688fcc56cb3b0d", 0x9}], 0x5}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000740)="bbfca1c53854f1991f99b0bd427dfcc13ba00ca9f7d7e850f325a6e49bcfff025aaa21d6432ecc854eb1bb24b8ba61c2900dda94", 0x34}, {&(0x7f00000007c0)="eedfb3e07e9104bfa923695fafc7911fbc633e1968e47e79dfa86b251e3685341da779378f8dbd3f8e8a57403f", 0x2d}, {&(0x7f0000000880)}], 0x3}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000bc0)}], 0x1}}], 0x4, 0x8081) 20:58:13 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4d811e6cae301104ccb71f2afce02c1635cabcf4fb36b3db19ca5e75498c1a2b05b2fa65385d61205a7d1392970acafce3435cac5c7d8550e55e88dd879d38"}}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 20:58:13 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:58:13 executing program 5: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe3b, &(0x7f0000000000)=[{&(0x7f00000000c0)="5500000018007f5f14fe01b2a4a29093020604dffffffe010405040539000900350006080100000019000b40060c1001020022dc1338d54404139b84136ef75afb83de4404000500", 0xff72}, {&(0x7f0000000040)="73005000d612110000ff0ea988", 0xd}], 0x2}, 0x0) 20:58:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000180)="4854e11617437d1c4c9c39b35d549265c6a80556f0783770309a7a46be4852c8d1d4a5a0cab3a3af2298f3891c03fc773e014aef0a2fef218aae2f262cfb0803051225621eab13b4e201d9fe9d3e9d2df05e48f9f82961d787d17769192cbd9d66be8b5c933f1048b5e4d7bb8c5a74c515192c92041b15039bd3d7194afc017baa0110c7a0b9291a", 0x88}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)="9cc2e3660bd268b95f60847d4a1ef6ce6cb44ea600a5", 0x16}, {&(0x7f0000000300)="ed", 0x1}, {&(0x7f0000000400)="6b70e30f3b68cc5d4fa8764c825bf9", 0xf}, {&(0x7f0000000440)="7dc0e4984598dbbb8d258c7eba5e1fd8344d699b4f4577a54850329cc49083abf0443a", 0x23}, {&(0x7f0000000500)="e58c688fcc56cb3b0d", 0x9}], 0x5}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000740)="bbfca1c53854f1991f99b0bd427dfcc13ba00ca9f7d7e850f325a6e49bcfff025aaa21d6432ecc854eb1bb24b8ba61c2900dda94", 0x34}, {&(0x7f00000007c0)="eedfb3e07e9104bfa923695fafc7911fbc633e1968e47e79dfa86b251e3685341da779378f8dbd3f8e8a57403f", 0x2d}, {&(0x7f0000000880)}], 0x3}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000bc0)}], 0x1}}], 0x4, 0x8081) [ 37.018490][ T4873] __nla_validate_parse: 2 callbacks suppressed [ 37.018516][ T4873] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:13 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4d811e6cae301104ccb71f2afce02c1635cabcf4fb36b3db19ca5e75498c1a2b05b2fa65385d61205a7d1392970acafce3435cac5c7d8550e55e88dd879d38"}}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) [ 37.077329][ T4873] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'.