r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r9, &(0x7f0000000000), 0x10) bind(r9, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 15:25:56 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001380)={0x5, &(0x7f0000000080)=[{0x8, 0x47, 0x3f, 0x5}, {0x0, 0x3, 0x0, 0x3}, {0x6, 0x1, 0x6, 0xeefd}, {0x8, 0x3f, 0x2, 0xfffffffa}, {0x81, 0x0, 0xc3, 0x101}]}) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}, 0x1, 0x0, 0x0, 0xfffffffd}}, 0xfffffffffffffc40) [ 3370.137291] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3370.148617] CPU: 1 PID: 21819 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3370.156471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3370.165842] Call Trace: [ 3370.168449] dump_stack+0x197/0x210 [ 3370.172098] sysfs_warn_dup.cold+0x1c/0x31 [ 3370.176363] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3370.181750] sysfs_create_link+0x65/0xc0 [ 3370.185836] device_add+0x7ce/0x1760 [ 3370.189578] ? get_device_parent.isra.0+0x570/0x570 [ 3370.194606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.200173] wiphy_register+0x16fa/0x21d0 [ 3370.204482] ? show_schedstat+0x832/0xbb0 [ 3370.208656] ? wiphy_unregister+0xfd0/0xfd0 [ 3370.213017] ? rcu_read_lock_sched_held+0x110/0x130 [ 3370.218055] ? __kmalloc+0x5e1/0x750 [ 3370.221881] ? trace_hardirqs_on+0x67/0x220 [ 3370.226220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.231766] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3370.236711] ieee80211_register_hw+0x156e/0x3800 [ 3370.241492] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3370.246345] ? hrtimer_init+0x8b/0x300 [ 3370.250242] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3370.255360] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3370.260405] ? cred_has_capability+0x193/0x320 [ 3370.265007] ? hwsim_exit_net+0xc50/0xc50 [ 3370.269168] ? __mutex_lock+0xa67/0x1300 [ 3370.273249] hwsim_new_radio_nl+0x5eb/0x893 [ 3370.277662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.283204] ? security_capable+0x92/0xc0 [ 3370.287361] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3370.292567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.298109] ? nla_parse+0x1fc/0x2f0 [ 3370.301840] genl_family_rcv_msg+0x6db/0xd30 [ 3370.306274] ? genl_unregister_family+0x790/0x790 [ 3370.311144] ? __local_bh_enable_ip+0x15a/0x270 [ 3370.315829] ? __dev_queue_xmit+0x892/0x2fe0 [ 3370.320263] genl_rcv_msg+0xca/0x170 [ 3370.323987] netlink_rcv_skb+0x17d/0x460 [ 3370.328068] ? genl_family_rcv_msg+0xd30/0xd30 [ 3370.332659] ? netlink_ack+0xb30/0xb30 [ 3370.336568] genl_rcv+0x29/0x40 [ 3370.339855] netlink_unicast+0x53a/0x730 [ 3370.343931] ? netlink_attachskb+0x770/0x770 [ 3370.348359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.353905] netlink_sendmsg+0x8ae/0xd70 [ 3370.357979] ? netlink_unicast+0x730/0x730 [ 3370.362227] ? selinux_socket_sendmsg+0x36/0x40 [ 3370.366905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.372451] ? security_socket_sendmsg+0x8d/0xc0 [ 3370.377215] ? netlink_unicast+0x730/0x730 [ 3370.381469] sock_sendmsg+0xd7/0x130 [ 3370.385213] ___sys_sendmsg+0x803/0x920 [ 3370.389197] ? copy_msghdr_from_user+0x430/0x430 [ 3370.393964] ? lock_downgrade+0x880/0x880 [ 3370.398123] ? kasan_check_read+0x11/0x20 [ 3370.402286] ? __fget+0x367/0x540 [ 3370.405749] ? iterate_fd+0x360/0x360 [ 3370.409574] ? lock_downgrade+0x880/0x880 [ 3370.413751] ? __fget_light+0x1a9/0x230 [ 3370.417735] ? __fdget+0x1b/0x20 [ 3370.421108] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3370.426750] __sys_sendmsg+0x105/0x1d0 [ 3370.430652] ? __ia32_sys_shutdown+0x80/0x80 [ 3370.435084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3370.439848] ? do_syscall_64+0x26/0x620 [ 3370.443833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3370.449207] ? do_syscall_64+0x26/0x620 [ 3370.453288] __x64_sys_sendmsg+0x78/0xb0 [ 3370.457371] do_syscall_64+0xfd/0x620 [ 3370.461219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3370.466513] RIP: 0033:0x45a6f9 [ 3370.469714] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3370.488717] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3370.496448] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3370.503742] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3370.511028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3370.518316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3370.525620] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3370.564102] Dev loop3: unable to read RDB block 1 15:25:56 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x100) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001300)=ANY=[@ANYRESDEC=r1], 0x1) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x43, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) ioctl$VFIO_IOMMU_MAP_DMA(r9, 0x3b71, 0x0) r10 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r10, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000040)='ppp1])GPL)\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000012c0)={r11}, 0xc) r12 = semget$private(0x0, 0x4, 0x0) semop(r12, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3370.585380] loop3: unable to read partition table [ 3370.626530] loop3: partition table beyond EOD, truncated 15:25:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x300}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:25:57 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r9, &(0x7f0000000000), 0x10) [ 3370.674184] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3370.766259] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3370.792399] CPU: 1 PID: 22136 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3370.800289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3370.809666] Call Trace: [ 3370.812287] dump_stack+0x197/0x210 [ 3370.815929] sysfs_warn_dup.cold+0x1c/0x31 [ 3370.820259] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3370.825618] sysfs_create_link+0x65/0xc0 [ 3370.829688] device_add+0x7ce/0x1760 [ 3370.833399] ? get_device_parent.isra.0+0x570/0x570 [ 3370.838403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.844626] wiphy_register+0x16fa/0x21d0 [ 3370.848867] ? show_schedstat+0x832/0xbb0 [ 3370.853021] ? wiphy_unregister+0xfd0/0xfd0 [ 3370.857337] ? rcu_read_lock_sched_held+0x110/0x130 [ 3370.862354] ? __kmalloc+0x5e1/0x750 [ 3370.866260] ? trace_hardirqs_on+0x67/0x220 [ 3370.870600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.876141] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3370.881089] ieee80211_register_hw+0x156e/0x3800 [ 3370.885878] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3370.890839] ? hrtimer_init+0x8b/0x300 [ 3370.894818] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3370.899985] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3370.905059] ? cred_has_capability+0x193/0x320 [ 3370.909697] ? hwsim_exit_net+0xc50/0xc50 [ 3370.913885] hwsim_new_radio_nl+0x5eb/0x893 [ 3370.918323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.923875] ? security_capable+0x92/0xc0 [ 3370.928121] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3370.933337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.938895] ? nla_parse+0x1fc/0x2f0 [ 3370.942631] genl_family_rcv_msg+0x6db/0xd30 [ 3370.947040] ? genl_unregister_family+0x790/0x790 [ 3370.951915] ? __local_bh_enable_ip+0x15a/0x270 [ 3370.956600] ? __dev_queue_xmit+0x892/0x2fe0 [ 3370.961035] genl_rcv_msg+0xca/0x170 [ 3370.964766] netlink_rcv_skb+0x17d/0x460 [ 3370.968830] ? genl_family_rcv_msg+0xd30/0xd30 [ 3370.973443] ? netlink_ack+0xb30/0xb30 [ 3370.977357] genl_rcv+0x29/0x40 [ 3370.980640] netlink_unicast+0x53a/0x730 [ 3370.987425] ? netlink_attachskb+0x770/0x770 [ 3370.991833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3370.997362] netlink_sendmsg+0x8ae/0xd70 [ 3371.001422] ? netlink_unicast+0x730/0x730 [ 3371.005840] ? selinux_socket_sendmsg+0x36/0x40 [ 3371.010499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3371.016023] ? security_socket_sendmsg+0x8d/0xc0 [ 3371.020945] ? netlink_unicast+0x730/0x730 [ 3371.025172] sock_sendmsg+0xd7/0x130 [ 3371.028875] ___sys_sendmsg+0x803/0x920 [ 3371.032842] ? copy_msghdr_from_user+0x430/0x430 [ 3371.037591] ? lock_downgrade+0x880/0x880 [ 3371.041741] ? kasan_check_read+0x11/0x20 [ 3371.045880] ? __fget+0x367/0x540 [ 3371.049322] ? iterate_fd+0x360/0x360 [ 3371.053117] ? lock_downgrade+0x880/0x880 [ 3371.057266] ? __fget_light+0x1a9/0x230 [ 3371.061232] ? __fdget+0x1b/0x20 [ 3371.064604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3371.070135] __sys_sendmsg+0x105/0x1d0 [ 3371.074101] ? __ia32_sys_shutdown+0x80/0x80 [ 3371.078518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3371.083262] ? do_syscall_64+0x26/0x620 [ 3371.087242] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3371.092627] ? do_syscall_64+0x26/0x620 [ 3371.096625] __x64_sys_sendmsg+0x78/0xb0 [ 3371.100692] do_syscall_64+0xfd/0x620 [ 3371.104508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3371.109704] RIP: 0033:0x45a6f9 [ 3371.112892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3371.131869] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3371.139567] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3371.146836] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3371.154108] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3371.161453] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3371.168708] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:25:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x25, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:25:57 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000007480f0656250", 0x40, 0x1c0}]) [ 3371.339040] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3371.363047] CPU: 0 PID: 22337 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3371.371259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3371.380632] Call Trace: [ 3371.383241] dump_stack+0x197/0x210 [ 3371.386885] sysfs_warn_dup.cold+0x1c/0x31 [ 3371.391138] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3371.396511] sysfs_create_link+0x65/0xc0 [ 3371.400587] device_add+0x7ce/0x1760 [ 3371.404335] ? get_device_parent.isra.0+0x570/0x570 [ 3371.409380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3371.414953] wiphy_register+0x16fa/0x21d0 [ 3371.419134] ? show_schedstat+0x832/0xbb0 [ 3371.423306] ? wiphy_unregister+0xfd0/0xfd0 [ 3371.427641] ? rcu_read_lock_sched_held+0x110/0x130 [ 3371.432662] ? __kmalloc+0x5e1/0x750 [ 3371.436382] ? trace_hardirqs_on+0x67/0x220 [ 3371.440717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3371.446265] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3371.451231] ieee80211_register_hw+0x156e/0x3800 [ 3371.456020] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3371.461416] ? hrtimer_init+0x8b/0x300 [ 3371.465314] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3371.470435] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3371.475466] ? cred_has_capability+0x193/0x320 [ 3371.480074] ? hwsim_exit_net+0xc50/0xc50 [ 3371.484258] ? __mutex_lock+0xa67/0x1300 [ 3371.488510] hwsim_new_radio_nl+0x5eb/0x893 [ 3371.492851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3371.498394] ? security_capable+0x92/0xc0 [ 3371.502562] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3371.507795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3371.513340] ? nla_parse+0x1fc/0x2f0 [ 3371.517138] genl_family_rcv_msg+0x6db/0xd30 [ 3371.521564] ? genl_unregister_family+0x790/0x790 [ 3371.526420] ? __local_bh_enable_ip+0x15a/0x270 [ 3371.531099] ? __dev_queue_xmit+0x892/0x2fe0 [ 3371.535537] genl_rcv_msg+0xca/0x170 [ 3371.539263] netlink_rcv_skb+0x17d/0x460 [ 3371.543331] ? genl_family_rcv_msg+0xd30/0xd30 [ 3371.547953] ? netlink_ack+0xb30/0xb30 [ 3371.551866] genl_rcv+0x29/0x40 [ 3371.555167] netlink_unicast+0x53a/0x730 [ 3371.559243] ? netlink_attachskb+0x770/0x770 [ 3371.564533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3371.570088] netlink_sendmsg+0x8ae/0xd70 [ 3371.574425] ? netlink_unicast+0x730/0x730 [ 3371.578939] ? selinux_socket_sendmsg+0x36/0x40 [ 3371.583616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3371.590123] ? security_socket_sendmsg+0x8d/0xc0 [ 3371.595260] ? netlink_unicast+0x730/0x730 [ 3371.599519] sock_sendmsg+0xd7/0x130 [ 3371.603271] ___sys_sendmsg+0x803/0x920 [ 3371.607277] ? copy_msghdr_from_user+0x430/0x430 [ 3371.612066] ? lock_downgrade+0x880/0x880 [ 3371.616246] ? kasan_check_read+0x11/0x20 [ 3371.620429] ? __fget+0x367/0x540 [ 3371.623910] ? iterate_fd+0x360/0x360 [ 3371.627734] ? lock_downgrade+0x880/0x880 [ 3371.631916] ? __fget_light+0x1a9/0x230 [ 3371.635923] ? __fdget+0x1b/0x20 15:25:57 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e6700000000000000000000e7d1000000020000000080000000005d72d04bc1ccb4307f00000000000000000000000000000000000098ef546b537052e6eff0068e50bc18229dc1c635466d66e56765b00f53b598b26ab2c48c2eefe51fc0eb7320f3dba5c3f3"], 0x48) getpid() r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xc, 0x4000000000000800, 0x9d, 0x0, r5, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0xff, 0x100000001, 0x0, 0xff, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @local}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) r11 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x422000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000140)={r12, 0x20}) ioctl$DRM_IOCTL_GET_CTX(r11, 0xc0086423, &(0x7f0000000040)={r12, 0x3}) ioctl$DRM_IOCTL_NEW_CTX(r7, 0x40086425, &(0x7f0000000040)={r12, 0x3}) [ 3371.639307] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3371.644863] __sys_sendmsg+0x105/0x1d0 [ 3371.648772] ? __ia32_sys_shutdown+0x80/0x80 [ 3371.653221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3371.658120] ? do_syscall_64+0x26/0x620 [ 3371.662116] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3371.667491] ? do_syscall_64+0x26/0x620 [ 3371.671494] __x64_sys_sendmsg+0x78/0xb0 [ 3371.675595] do_syscall_64+0xfd/0x620 [ 3371.679416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3371.684614] RIP: 0033:0x45a6f9 [ 3371.687819] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3371.706736] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3371.714553] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3371.714563] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3371.714572] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:25:58 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x100000001, 0x4, 0x3, 0x8001, 0x7, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0x5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3371.714580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3371.714595] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3371.841487] Dev loop3: unable to read RDB block 1 [ 3371.848597] loop3: unable to read partition table [ 3371.865307] loop3: partition table beyond EOD, truncated [ 3371.883699] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:25:58 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x4000, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:25:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x26, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:25:58 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000007a80f0656250", 0x40, 0x1c0}]) [ 3372.028682] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3372.045395] CPU: 0 PID: 22475 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3372.053254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3372.053261] Call Trace: [ 3372.053282] dump_stack+0x197/0x210 [ 3372.053306] sysfs_warn_dup.cold+0x1c/0x31 [ 3372.073145] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3372.078530] sysfs_create_link+0x65/0xc0 [ 3372.082619] device_add+0x7ce/0x1760 [ 3372.086359] ? get_device_parent.isra.0+0x570/0x570 [ 3372.091393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.097469] wiphy_register+0x16fa/0x21d0 [ 3372.097487] ? show_schedstat+0x832/0xbb0 [ 3372.105776] ? wiphy_unregister+0xfd0/0xfd0 [ 3372.110121] ? rcu_read_lock_sched_held+0x110/0x130 [ 3372.115150] ? __kmalloc+0x5e1/0x750 [ 3372.118878] ? trace_hardirqs_on+0x67/0x220 [ 3372.123213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.123230] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3372.123249] ieee80211_register_hw+0x156e/0x3800 [ 3372.133715] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3372.133735] ? hrtimer_init+0x8b/0x300 [ 3372.147226] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3372.152359] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3372.157388] ? cred_has_capability+0x193/0x320 [ 3372.162789] ? hwsim_exit_net+0xc50/0xc50 [ 3372.166974] hwsim_new_radio_nl+0x5eb/0x893 [ 3372.171306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.171321] ? security_capable+0x92/0xc0 [ 3372.171341] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3372.171362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.171374] ? nla_parse+0x1fc/0x2f0 [ 3372.171395] genl_family_rcv_msg+0x6db/0xd30 [ 3372.171415] ? genl_unregister_family+0x790/0x790 [ 3372.192062] ? __local_bh_enable_ip+0x15a/0x270 [ 3372.209684] ? __dev_queue_xmit+0x892/0x2fe0 [ 3372.214125] genl_rcv_msg+0xca/0x170 [ 3372.217856] netlink_rcv_skb+0x17d/0x460 [ 3372.221924] ? genl_family_rcv_msg+0xd30/0xd30 [ 3372.226522] ? netlink_ack+0xb30/0xb30 [ 3372.230436] genl_rcv+0x29/0x40 [ 3372.233727] netlink_unicast+0x53a/0x730 [ 3372.237801] ? netlink_attachskb+0x770/0x770 [ 3372.242220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.247770] netlink_sendmsg+0x8ae/0xd70 [ 3372.251846] ? netlink_unicast+0x730/0x730 [ 3372.256099] ? selinux_socket_sendmsg+0x36/0x40 [ 3372.260777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.266320] ? security_socket_sendmsg+0x8d/0xc0 [ 3372.271087] ? netlink_unicast+0x730/0x730 [ 3372.275339] sock_sendmsg+0xd7/0x130 [ 3372.279064] ___sys_sendmsg+0x803/0x920 [ 3372.283050] ? copy_msghdr_from_user+0x430/0x430 [ 3372.291730] ? lock_downgrade+0x880/0x880 [ 3372.295891] ? kasan_check_read+0x11/0x20 [ 3372.300055] ? __fget+0x367/0x540 [ 3372.303521] ? iterate_fd+0x360/0x360 [ 3372.307344] ? lock_downgrade+0x880/0x880 [ 3372.311503] ? __fget_light+0x1a9/0x230 [ 3372.315487] ? __fdget+0x1b/0x20 [ 3372.318860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3372.324451] __sys_sendmsg+0x105/0x1d0 [ 3372.328359] ? __ia32_sys_shutdown+0x80/0x80 [ 3372.332792] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3372.337553] ? do_syscall_64+0x26/0x620 [ 3372.341534] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3372.346901] ? do_syscall_64+0x26/0x620 [ 3372.350908] __x64_sys_sendmsg+0x78/0xb0 [ 3372.355112] do_syscall_64+0xfd/0x620 [ 3372.358933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3372.364129] RIP: 0033:0x45a6f9 15:25:58 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) write$tun(r10, &(0x7f00000012c0)={@val, @void, @llc={@snap={0x5ae1d51199acf7b5, 0xab, 'Z<', "a6919a", 0xa61e438199571a42, "2591a6a0e1314db624026516d342c64a0fd144a4f86e36bb548cb70c6aa56bcd4a4bf1684c486d45ac605f22d6225f013e9f196cf6002c383b332b9757967c6ecf6c0bf2f9c5ee89df933f227692205d00b73212d3683624ad9cfddafeb6e1ad6d1a2397855b17586da982e8c541fd56b569ff84b6a2c02b020f990e2a8f57c0c52adbc30b46c273cc9117bbc957c80e754dc0cc268026768b8d17dfdbca28aa7328faea83348c8a7d77de436e470eb859d9119f3649ea1439131c20911fda5328f0ca8365499ef3be93ca41bfbac76241dfb79f98d32d9ccee73be3d96fcb9ad1d20a500c054cc1be838d2a5d844f6a8a9c07762dbf"}}}, 0x103) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:25:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x500}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:25:58 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r9, &(0x7f0000000000), 0x10) [ 3372.367328] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3372.386269] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3372.393995] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3372.401269] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3372.408548] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3372.415821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3372.423096] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3372.445989] Dev loop3: unable to read RDB block 1 [ 3372.475582] loop3: unable to read partition table [ 3372.487900] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3372.500140] loop3: partition table beyond EOD, truncated [ 3372.514528] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3372.560876] CPU: 0 PID: 22623 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3372.568725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3372.578092] Call Trace: [ 3372.580701] dump_stack+0x197/0x210 [ 3372.584354] sysfs_warn_dup.cold+0x1c/0x31 [ 3372.588697] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3372.594082] sysfs_create_link+0x65/0xc0 [ 3372.598163] device_add+0x7ce/0x1760 [ 3372.601898] ? get_device_parent.isra.0+0x570/0x570 [ 3372.606921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.612514] wiphy_register+0x16fa/0x21d0 [ 3372.616702] ? show_schedstat+0x832/0xbb0 [ 3372.620868] ? wiphy_unregister+0xfd0/0xfd0 [ 3372.625203] ? rcu_read_lock_sched_held+0x110/0x130 [ 3372.630227] ? __kmalloc+0x5e1/0x750 [ 3372.633947] ? trace_hardirqs_on+0x67/0x220 [ 3372.638288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.643837] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3372.648781] ieee80211_register_hw+0x156e/0x3800 [ 3372.653562] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3372.658437] ? hrtimer_init+0x8b/0x300 [ 3372.662470] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3372.667577] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3372.672608] ? cred_has_capability+0x193/0x320 [ 3372.677227] ? hwsim_exit_net+0xc50/0xc50 [ 3372.681389] hwsim_new_radio_nl+0x5eb/0x893 [ 3372.685713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.691262] ? security_capable+0x92/0xc0 [ 3372.695417] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3372.700618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.706160] ? nla_parse+0x1fc/0x2f0 [ 3372.709872] genl_family_rcv_msg+0x6db/0xd30 [ 3372.714276] ? genl_unregister_family+0x790/0x790 [ 3372.719199] ? __local_bh_enable_ip+0x15a/0x270 [ 3372.723869] ? __dev_queue_xmit+0x892/0x2fe0 [ 3372.728277] genl_rcv_msg+0xca/0x170 [ 3372.731986] netlink_rcv_skb+0x17d/0x460 [ 3372.736037] ? genl_family_rcv_msg+0xd30/0xd30 [ 3372.740611] ? netlink_ack+0xb30/0xb30 [ 3372.744502] genl_rcv+0x29/0x40 [ 3372.747770] netlink_unicast+0x53a/0x730 [ 3372.751827] ? netlink_attachskb+0x770/0x770 [ 3372.756229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.761760] netlink_sendmsg+0x8ae/0xd70 [ 3372.765901] ? netlink_unicast+0x730/0x730 [ 3372.770131] ? selinux_socket_sendmsg+0x36/0x40 [ 3372.774800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3372.780331] ? security_socket_sendmsg+0x8d/0xc0 [ 3372.785075] ? netlink_unicast+0x730/0x730 [ 3372.789302] sock_sendmsg+0xd7/0x130 [ 3372.793009] ___sys_sendmsg+0x803/0x920 [ 3372.796973] ? copy_msghdr_from_user+0x430/0x430 [ 3372.801727] ? lock_downgrade+0x880/0x880 [ 3372.805868] ? kasan_check_read+0x11/0x20 [ 3372.810024] ? __fget+0x367/0x540 [ 3372.813494] ? iterate_fd+0x360/0x360 [ 3372.817303] ? lock_downgrade+0x880/0x880 [ 3372.821451] ? __fget_light+0x1a9/0x230 [ 3372.825422] ? __fdget+0x1b/0x20 [ 3372.828784] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3372.834316] __sys_sendmsg+0x105/0x1d0 [ 3372.838194] ? __ia32_sys_shutdown+0x80/0x80 [ 3372.842618] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3372.847365] ? do_syscall_64+0x26/0x620 [ 3372.851329] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3372.856684] ? do_syscall_64+0x26/0x620 [ 3372.860654] __x64_sys_sendmsg+0x78/0xb0 [ 3372.864707] do_syscall_64+0xfd/0x620 [ 3372.868499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3372.873768] RIP: 0033:0x45a6f9 [ 3372.876969] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3372.895859] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3372.903555] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3372.910812] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3372.918069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3372.925327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3372.932587] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:25:59 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x128a, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:25:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x27, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:25:59 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000001fcf0656250", 0x40, 0x1c0}]) [ 3373.092412] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3373.100372] CPU: 1 PID: 22793 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3373.108195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3373.117547] Call Trace: [ 3373.120144] dump_stack+0x197/0x210 [ 3373.123771] sysfs_warn_dup.cold+0x1c/0x31 [ 3373.128005] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3373.133367] sysfs_create_link+0x65/0xc0 [ 3373.137421] device_add+0x7ce/0x1760 [ 3373.141130] ? get_device_parent.isra.0+0x570/0x570 [ 3373.146155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3373.151689] wiphy_register+0x16fa/0x21d0 [ 3373.155844] ? show_schedstat+0x832/0xbb0 [ 3373.159987] ? wiphy_unregister+0xfd0/0xfd0 [ 3373.164314] ? rcu_read_lock_sched_held+0x110/0x130 [ 3373.169319] ? __kmalloc+0x5e1/0x750 [ 3373.173023] ? trace_hardirqs_on+0x67/0x220 [ 3373.177342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3373.182872] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3373.187793] ieee80211_register_hw+0x156e/0x3800 [ 3373.192560] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3373.197400] ? hrtimer_init+0x8b/0x300 [ 3373.201278] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3373.206375] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3373.211382] ? cred_has_capability+0x193/0x320 [ 3373.215975] ? hwsim_exit_net+0xc50/0xc50 [ 3373.220120] hwsim_new_radio_nl+0x5eb/0x893 [ 3373.224450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3373.230006] ? security_capable+0x92/0xc0 [ 3373.234330] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3373.239541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3373.245071] ? nla_parse+0x1fc/0x2f0 [ 3373.248796] genl_family_rcv_msg+0x6db/0xd30 [ 3373.253211] ? genl_unregister_family+0x790/0x790 [ 3373.258077] ? __local_bh_enable_ip+0x15a/0x270 [ 3373.262740] ? __dev_queue_xmit+0x892/0x2fe0 [ 3373.267148] genl_rcv_msg+0xca/0x170 [ 3373.270854] netlink_rcv_skb+0x17d/0x460 [ 3373.274917] ? genl_family_rcv_msg+0xd30/0xd30 [ 3373.279496] ? netlink_ack+0xb30/0xb30 [ 3373.283396] genl_rcv+0x29/0x40 [ 3373.286676] netlink_unicast+0x53a/0x730 [ 3373.290745] ? netlink_attachskb+0x770/0x770 [ 3373.295162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3373.300693] netlink_sendmsg+0x8ae/0xd70 [ 3373.304773] ? netlink_unicast+0x730/0x730 [ 3373.309004] ? selinux_socket_sendmsg+0x36/0x40 [ 3373.313677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3373.319202] ? security_socket_sendmsg+0x8d/0xc0 [ 3373.323950] ? netlink_unicast+0x730/0x730 [ 3373.328176] sock_sendmsg+0xd7/0x130 [ 3373.331882] ___sys_sendmsg+0x803/0x920 [ 3373.335847] ? copy_msghdr_from_user+0x430/0x430 [ 3373.340603] ? lock_downgrade+0x880/0x880 [ 3373.344747] ? kasan_check_read+0x11/0x20 [ 3373.348890] ? __fget+0x367/0x540 [ 3373.352360] ? iterate_fd+0x360/0x360 [ 3373.356189] ? lock_downgrade+0x880/0x880 [ 3373.360363] ? __fget_light+0x1a9/0x230 [ 3373.364337] ? __fdget+0x1b/0x20 [ 3373.367710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3373.373246] __sys_sendmsg+0x105/0x1d0 [ 3373.377138] ? __ia32_sys_shutdown+0x80/0x80 [ 3373.381563] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3373.386322] ? do_syscall_64+0x26/0x620 [ 3373.390285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3373.395654] ? do_syscall_64+0x26/0x620 [ 3373.399621] __x64_sys_sendmsg+0x78/0xb0 [ 3373.403691] do_syscall_64+0xfd/0x620 [ 3373.407487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3373.412665] RIP: 0033:0x45a6f9 [ 3373.415847] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3373.434756] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3373.443092] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3373.450357] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3373.457967] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3373.465227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3373.472498] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:25:59 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001480)=ANY=[@ANYBLOB="6d616e676c650000000000d445fa6c000000005c12b305ba1076f4a70009000001000000000000000000000000000000006644ccd58b3047d806e6c8a3c53f2e8195fbac238c474bd7e458dedc46010c78fdc7f8cec39a285e1c86e351dcc2233e63e0b960a1db4bbd913725c89555739327"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) openat$cgroup(0xffffffffffffffff, &(0x7f0000001440)='syz0\x00', 0x200002, 0x0) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semget$private(0x0, 0x4, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) r7 = request_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffa) add_key$keyring(0x0, 0x0, 0x0, 0x0, r7) r8 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000012c0)={r8, 0x19, 0xf0}, 0x0, &(0x7f0000001300)="263ba601d1db0869a9aeac60010278b89b4c4b1b14339c1387", &(0x7f0000001340)="1ba3d637a94661563f99a0fec8f857e8dcd645d7a43ce1c513b21d4ae3efb779ba7cdf9aa135b44a5062d615829165dc66f7f4cf96611e170c1fae4e51488ac9ea81f7798ad47525bd12b6c992ba9e4d4e30ff347d99b3eeab27203d860a009ed302544188ba01e1b0a684b593e29e63501f07696c96a316f870cf6ff64a65ca2dea08700cd10f175eef86a4d58e6976890ad90815c6c26eccef2f5c7500ee167f2079b0be4d7c1f089c7bffa3a4bfa19c7c994d0e167b922c97693954dc989205cb06ad7a11464a0f5bd3536657e1386b6ff87508603c906a2c012c270abd55216771f4f7677589d0ea337e8e6aefdf") bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0xfffffddd) connect(0xffffffffffffffff, 0x0, 0x0) 15:25:59 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r9, &(0x7f0000000000), 0x10) [ 3373.549760] Dev loop3: unable to read RDB block 1 [ 3373.554836] loop3: unable to read partition table [ 3373.563915] loop3: partition table beyond EOD, truncated [ 3373.571449] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:25:59 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000060f0656250", 0x40, 0x1c0}]) 15:25:59 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) 15:26:00 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) syz_open_dev$char_usb(0xc, 0xb4, 0x7fff) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x2, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$RTC_ALM_READ(r8, 0x80247008, &(0x7f0000001380)) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x600}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3373.785004] Dev loop3: unable to read RDB block 1 [ 3373.814009] loop3: unable to read partition table 15:26:00 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3373.843745] loop3: partition table beyond EOD, truncated [ 3373.873935] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:00 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f00a6250", 0x40, 0x1c0}]) [ 3373.984470] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3374.010546] CPU: 0 PID: 23013 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3374.018393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3374.027762] Call Trace: [ 3374.030374] dump_stack+0x197/0x210 [ 3374.034034] sysfs_warn_dup.cold+0x1c/0x31 [ 3374.038304] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3374.043698] sysfs_create_link+0x65/0xc0 [ 3374.047784] device_add+0x7ce/0x1760 [ 3374.051529] ? get_device_parent.isra.0+0x570/0x570 [ 3374.056560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.062124] wiphy_register+0x16fa/0x21d0 [ 3374.066297] ? show_schedstat+0x832/0xbb0 [ 3374.070472] ? wiphy_unregister+0xfd0/0xfd0 [ 3374.074818] ? rcu_read_lock_sched_held+0x110/0x130 [ 3374.079853] ? __kmalloc+0x5e1/0x750 15:26:00 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000c8b0c37d61"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) ioctl$BLKIOOPT(r9, 0x1279, &(0x7f0000000040)) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3374.083598] ? trace_hardirqs_on+0x67/0x220 [ 3374.087946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.093504] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3374.098471] ieee80211_register_hw+0x156e/0x3800 [ 3374.103268] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3374.108135] ? hrtimer_init+0x8b/0x300 [ 3374.112053] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3374.117221] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3374.122257] ? cred_has_capability+0x193/0x320 [ 3374.126864] ? hwsim_exit_net+0xc50/0xc50 [ 3374.131031] ? __mutex_lock+0xa67/0x1300 15:26:00 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) [ 3374.135118] hwsim_new_radio_nl+0x5eb/0x893 [ 3374.139460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.145013] ? security_capable+0x92/0xc0 [ 3374.149277] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3374.154496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.160050] ? nla_parse+0x1fc/0x2f0 [ 3374.163790] genl_family_rcv_msg+0x6db/0xd30 [ 3374.168221] ? genl_unregister_family+0x790/0x790 [ 3374.173087] ? __local_bh_enable_ip+0x15a/0x270 [ 3374.177860] ? __dev_queue_xmit+0x892/0x2fe0 15:26:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x28, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3374.182296] genl_rcv_msg+0xca/0x170 [ 3374.186023] netlink_rcv_skb+0x17d/0x460 [ 3374.190094] ? genl_family_rcv_msg+0xd30/0xd30 [ 3374.194693] ? netlink_ack+0xb30/0xb30 [ 3374.198610] genl_rcv+0x29/0x40 [ 3374.201910] netlink_unicast+0x53a/0x730 [ 3374.206006] ? netlink_attachskb+0x770/0x770 [ 3374.210428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.215982] netlink_sendmsg+0x8ae/0xd70 [ 3374.220059] ? netlink_unicast+0x730/0x730 [ 3374.224309] ? selinux_socket_sendmsg+0x36/0x40 [ 3374.228993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.234549] ? security_socket_sendmsg+0x8d/0xc0 [ 3374.239760] ? netlink_unicast+0x730/0x730 [ 3374.244009] sock_sendmsg+0xd7/0x130 [ 3374.247739] ___sys_sendmsg+0x803/0x920 [ 3374.251733] ? copy_msghdr_from_user+0x430/0x430 [ 3374.256511] ? lock_downgrade+0x880/0x880 [ 3374.260678] ? kasan_check_read+0x11/0x20 [ 3374.264868] ? __fget+0x367/0x540 [ 3374.268341] ? iterate_fd+0x360/0x360 [ 3374.272162] ? lock_downgrade+0x880/0x880 [ 3374.276327] ? __fget_light+0x1a9/0x230 [ 3374.280321] ? __fdget+0x1b/0x20 [ 3374.283697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3374.289265] __sys_sendmsg+0x105/0x1d0 [ 3374.293182] ? __ia32_sys_shutdown+0x80/0x80 [ 3374.297627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3374.302547] ? do_syscall_64+0x26/0x620 [ 3374.306552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3374.311940] ? do_syscall_64+0x26/0x620 [ 3374.315949] __x64_sys_sendmsg+0x78/0xb0 [ 3374.320034] do_syscall_64+0xfd/0x620 [ 3374.323866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3374.329065] RIP: 0033:0x45a6f9 [ 3374.332531] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3374.351444] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3374.359166] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3374.366444] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3374.373724] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:26:00 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000002e9a100"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3374.381011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3374.388380] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3374.405737] Dev loop3: unable to read RDB block 1 [ 3374.410864] loop3: unable to read partition table [ 3374.424321] loop3: partition table beyond EOD, truncated [ 3374.432969] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:00 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0256250", 0x40, 0x1c0}]) 15:26:00 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) socket(0x1e, 0x2, 0x0) [ 3374.612380] Dev loop3: unable to read RDB block 1 [ 3374.623603] loop3: unable to read partition table [ 3374.636621] loop3: partition table beyond EOD, truncated [ 3374.647977] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:01 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x7, 0x80002, 0x7) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semget$private(0x0, 0x4, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3374.710589] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3374.785118] CPU: 0 PID: 23241 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3374.792989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3374.802477] Call Trace: [ 3374.805091] dump_stack+0x197/0x210 [ 3374.808819] sysfs_warn_dup.cold+0x1c/0x31 [ 3374.813100] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3374.818619] sysfs_create_link+0x65/0xc0 [ 3374.822713] device_add+0x7ce/0x1760 [ 3374.826455] ? get_device_parent.isra.0+0x570/0x570 15:26:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x700}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3374.831489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.837054] wiphy_register+0x16fa/0x21d0 [ 3374.841222] ? show_schedstat+0x832/0xbb0 [ 3374.845396] ? wiphy_unregister+0xfd0/0xfd0 [ 3374.849745] ? rcu_read_lock_sched_held+0x110/0x130 [ 3374.854778] ? __kmalloc+0x5e1/0x750 [ 3374.858516] ? trace_hardirqs_on+0x67/0x220 [ 3374.862860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.868418] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3374.873365] ieee80211_register_hw+0x156e/0x3800 [ 3374.878151] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3374.883028] ? hrtimer_init+0x8b/0x300 [ 3374.886963] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3374.892090] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3374.897122] ? cred_has_capability+0x193/0x320 [ 3374.901745] ? hwsim_exit_net+0xc50/0xc50 [ 3374.905923] hwsim_new_radio_nl+0x5eb/0x893 [ 3374.910265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.915840] ? security_capable+0x92/0xc0 [ 3374.920007] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3374.925262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.930814] ? nla_parse+0x1fc/0x2f0 15:26:01 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e676c650000000000feffffffffffff00000000000000000000000000002200000000000000000000f4ffffffffffffff00000000eaa6032b487a800000000000d2e008b50000000000000000de00"/92], 0x48) getpid() openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000080), &(0x7f00000011c0)=0x4) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3374.934551] genl_family_rcv_msg+0x6db/0xd30 [ 3374.939029] ? genl_unregister_family+0x790/0x790 [ 3374.943893] ? __local_bh_enable_ip+0x15a/0x270 [ 3374.948665] ? __dev_queue_xmit+0x892/0x2fe0 [ 3374.953113] genl_rcv_msg+0xca/0x170 [ 3374.956843] netlink_rcv_skb+0x17d/0x460 [ 3374.960914] ? genl_family_rcv_msg+0xd30/0xd30 [ 3374.965514] ? netlink_ack+0xb30/0xb30 [ 3374.969435] genl_rcv+0x29/0x40 [ 3374.972720] netlink_unicast+0x53a/0x730 [ 3374.972742] ? netlink_attachskb+0x770/0x770 15:26:01 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0650a50", 0x40, 0x1c0}]) [ 3374.972759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3374.972776] netlink_sendmsg+0x8ae/0xd70 [ 3374.981246] ? netlink_unicast+0x730/0x730 [ 3374.995227] ? selinux_socket_sendmsg+0x36/0x40 [ 3374.999907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.005459] ? security_socket_sendmsg+0x8d/0xc0 [ 3375.010232] ? netlink_unicast+0x730/0x730 [ 3375.014482] sock_sendmsg+0xd7/0x130 [ 3375.018216] ___sys_sendmsg+0x803/0x920 [ 3375.022211] ? copy_msghdr_from_user+0x430/0x430 [ 3375.026981] ? lock_downgrade+0x880/0x880 [ 3375.031144] ? kasan_check_read+0x11/0x20 [ 3375.035399] ? __fget+0x367/0x540 [ 3375.038875] ? iterate_fd+0x360/0x360 [ 3375.038897] ? lock_downgrade+0x880/0x880 [ 3375.038915] ? __fget_light+0x1a9/0x230 [ 3375.051517] ? __fdget+0x1b/0x20 [ 3375.054896] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3375.060451] __sys_sendmsg+0x105/0x1d0 [ 3375.060469] ? __ia32_sys_shutdown+0x80/0x80 [ 3375.060497] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3375.073531] ? do_syscall_64+0x26/0x620 [ 3375.077525] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3375.082908] ? do_syscall_64+0x26/0x620 [ 3375.086905] __x64_sys_sendmsg+0x78/0xb0 [ 3375.090989] do_syscall_64+0xfd/0x620 [ 3375.094848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3375.100045] RIP: 0033:0x45a6f9 [ 3375.103245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3375.122247] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:01 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) syz_open_dev$tty1(0xc, 0x4, 0x3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3375.130153] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3375.137611] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3375.145239] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3375.152531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3375.159842] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3375.178266] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3375.189442] CPU: 1 PID: 23552 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3375.197288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3375.206655] Call Trace: [ 3375.209266] dump_stack+0x197/0x210 [ 3375.212953] sysfs_warn_dup.cold+0x1c/0x31 [ 3375.217214] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3375.222602] sysfs_create_link+0x65/0xc0 [ 3375.226689] device_add+0x7ce/0x1760 [ 3375.230453] ? get_device_parent.isra.0+0x570/0x570 [ 3375.235477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.241043] wiphy_register+0x16fa/0x21d0 [ 3375.245218] ? show_schedstat+0x832/0xbb0 [ 3375.249396] ? wiphy_unregister+0xfd0/0xfd0 [ 3375.253728] ? rcu_read_lock_sched_held+0x110/0x130 [ 3375.258750] ? __kmalloc+0x5e1/0x750 [ 3375.262470] ? trace_hardirqs_on+0x67/0x220 [ 3375.266810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.272357] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3375.277296] ieee80211_register_hw+0x156e/0x3800 [ 3375.282076] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3375.286931] ? hrtimer_init+0x8b/0x300 [ 3375.290828] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3375.295949] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3375.300974] ? cred_has_capability+0x193/0x320 [ 3375.305577] ? hwsim_exit_net+0xc50/0xc50 [ 3375.309733] ? __mutex_lock+0xa67/0x1300 [ 3375.313821] hwsim_new_radio_nl+0x5eb/0x893 [ 3375.318146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.323692] ? security_capable+0x92/0xc0 [ 3375.327853] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3375.333074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.338614] ? nla_parse+0x1fc/0x2f0 [ 3375.342343] genl_family_rcv_msg+0x6db/0xd30 [ 3375.346764] ? genl_unregister_family+0x790/0x790 [ 3375.351613] ? __local_bh_enable_ip+0x15a/0x270 [ 3375.356290] ? __dev_queue_xmit+0x892/0x2fe0 [ 3375.360728] genl_rcv_msg+0xca/0x170 [ 3375.364449] netlink_rcv_skb+0x17d/0x460 [ 3375.368520] ? genl_family_rcv_msg+0xd30/0xd30 [ 3375.373134] ? netlink_ack+0xb30/0xb30 [ 3375.377072] genl_rcv+0x29/0x40 [ 3375.380380] netlink_unicast+0x53a/0x730 [ 3375.384478] ? netlink_attachskb+0x770/0x770 [ 3375.388915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.394479] netlink_sendmsg+0x8ae/0xd70 [ 3375.398560] ? netlink_unicast+0x730/0x730 [ 3375.402843] ? selinux_socket_sendmsg+0x36/0x40 [ 3375.407516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.413086] ? security_socket_sendmsg+0x8d/0xc0 [ 3375.417856] ? netlink_unicast+0x730/0x730 [ 3375.422099] sock_sendmsg+0xd7/0x130 [ 3375.425912] ___sys_sendmsg+0x803/0x920 [ 3375.429898] ? copy_msghdr_from_user+0x430/0x430 [ 3375.434664] ? lock_downgrade+0x880/0x880 [ 3375.438820] ? kasan_check_read+0x11/0x20 [ 3375.442980] ? __fget+0x367/0x540 [ 3375.446459] ? iterate_fd+0x360/0x360 [ 3375.450272] ? lock_downgrade+0x880/0x880 [ 3375.454434] ? __fget_light+0x1a9/0x230 [ 3375.458414] ? __fdget+0x1b/0x20 [ 3375.461785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3375.467334] __sys_sendmsg+0x105/0x1d0 [ 3375.471319] ? __ia32_sys_shutdown+0x80/0x80 [ 3375.475752] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3375.480514] ? do_syscall_64+0x26/0x620 [ 3375.484497] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3375.490042] ? do_syscall_64+0x26/0x620 [ 3375.494031] __x64_sys_sendmsg+0x78/0xb0 [ 3375.498103] do_syscall_64+0xfd/0x620 [ 3375.501932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3375.507127] RIP: 0033:0x45a6f9 [ 3375.510339] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3375.529854] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:01 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) socket(0x1e, 0x2, 0x0) 15:26:01 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000080000000000000000000000000000000000200"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$RTC_UIE_ON(r5, 0x7003) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) ioctl$SNDCTL_DSP_GETOPTR(r8, 0x800c5012, &(0x7f0000000080)) mq_notify(r5, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r10, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r10, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3375.537569] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3375.544840] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3375.552115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3375.559405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3375.566714] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3375.605118] Dev loop3: unable to read RDB block 1 15:26:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2a, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3375.671425] loop3: unable to read partition table 15:26:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x900}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3375.753785] loop3: partition table beyond EOD, truncated 15:26:02 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) socket(0x1e, 0x2, 0x0) [ 3375.798157] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3375.832306] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3375.849259] CPU: 1 PID: 23805 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3375.857115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3375.866621] Call Trace: [ 3375.869378] dump_stack+0x197/0x210 [ 3375.873035] sysfs_warn_dup.cold+0x1c/0x31 [ 3375.877298] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3375.882693] sysfs_create_link+0x65/0xc0 [ 3375.886815] device_add+0x7ce/0x1760 [ 3375.890550] ? get_device_parent.isra.0+0x570/0x570 [ 3375.895580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.901160] wiphy_register+0x16fa/0x21d0 [ 3375.908203] ? show_schedstat+0x832/0xbb0 [ 3375.912373] ? wiphy_unregister+0xfd0/0xfd0 [ 3375.916710] ? rcu_read_lock_sched_held+0x110/0x130 [ 3375.921822] ? __kmalloc+0x5e1/0x750 [ 3375.925541] ? trace_hardirqs_on+0x67/0x220 [ 3375.929874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.935422] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3375.940362] ieee80211_register_hw+0x156e/0x3800 [ 3375.945234] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3375.950090] ? hrtimer_init+0x8b/0x300 [ 3375.953985] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3375.959104] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3375.964129] ? cred_has_capability+0x193/0x320 [ 3375.968731] ? hwsim_exit_net+0xc50/0xc50 [ 3375.972903] hwsim_new_radio_nl+0x5eb/0x893 [ 3375.977232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.982774] ? security_capable+0x92/0xc0 [ 3375.986934] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3375.992141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.997686] ? nla_parse+0x1fc/0x2f0 [ 3376.001418] genl_family_rcv_msg+0x6db/0xd30 [ 3376.005842] ? genl_unregister_family+0x790/0x790 [ 3376.010693] ? __local_bh_enable_ip+0x15a/0x270 [ 3376.015373] ? __dev_queue_xmit+0x892/0x2fe0 [ 3376.019808] genl_rcv_msg+0xca/0x170 [ 3376.023535] netlink_rcv_skb+0x17d/0x460 [ 3376.027609] ? genl_family_rcv_msg+0xd30/0xd30 [ 3376.032204] ? netlink_ack+0xb30/0xb30 [ 3376.036116] genl_rcv+0x29/0x40 [ 3376.039404] netlink_unicast+0x53a/0x730 [ 3376.043474] ? netlink_attachskb+0x770/0x770 [ 3376.047895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.053448] netlink_sendmsg+0x8ae/0xd70 [ 3376.057559] ? netlink_unicast+0x730/0x730 [ 3376.061809] ? selinux_socket_sendmsg+0x36/0x40 [ 3376.066482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.072033] ? security_socket_sendmsg+0x8d/0xc0 [ 3376.076893] ? netlink_unicast+0x730/0x730 [ 3376.081135] sock_sendmsg+0xd7/0x130 [ 3376.084945] ___sys_sendmsg+0x803/0x920 [ 3376.088934] ? copy_msghdr_from_user+0x430/0x430 [ 3376.093703] ? lock_downgrade+0x880/0x880 [ 3376.097863] ? kasan_check_read+0x11/0x20 [ 3376.102024] ? __fget+0x367/0x540 [ 3376.105833] ? iterate_fd+0x360/0x360 [ 3376.109645] ? lock_downgrade+0x880/0x880 [ 3376.113805] ? __fget_light+0x1a9/0x230 [ 3376.119178] ? __fdget+0x1b/0x20 [ 3376.122554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3376.128114] __sys_sendmsg+0x105/0x1d0 [ 3376.132012] ? __ia32_sys_shutdown+0x80/0x80 [ 3376.136440] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3376.141203] ? do_syscall_64+0x26/0x620 [ 3376.145186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3376.150556] ? do_syscall_64+0x26/0x620 [ 3376.154545] __x64_sys_sendmsg+0x78/0xb0 [ 3376.158616] do_syscall_64+0xfd/0x620 [ 3376.162431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3376.167625] RIP: 0033:0x45a6f9 [ 3376.170823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3376.189731] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:02 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000001300)=0x1004008, 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x402300, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0xe, &(0x7f0000000080)=""/51, &(0x7f00000012c0)=0x33) r4 = dup2(r1, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r5 = getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) getpgid(r5) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3376.197447] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3376.204737] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3376.212020] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3376.219291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3376.226566] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3376.274157] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3376.321827] CPU: 0 PID: 23914 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3376.329682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3376.339049] Call Trace: [ 3376.341644] dump_stack+0x197/0x210 [ 3376.345285] sysfs_warn_dup.cold+0x1c/0x31 [ 3376.349520] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3376.354882] sysfs_create_link+0x65/0xc0 [ 3376.358935] device_add+0x7ce/0x1760 [ 3376.362644] ? get_device_parent.isra.0+0x570/0x570 [ 3376.367660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.373196] wiphy_register+0x16fa/0x21d0 [ 3376.377336] ? show_schedstat+0x832/0xbb0 [ 3376.381481] ? wiphy_unregister+0xfd0/0xfd0 [ 3376.385797] ? rcu_read_lock_sched_held+0x110/0x130 [ 3376.390803] ? __kmalloc+0x5e1/0x750 [ 3376.394522] ? trace_hardirqs_on+0x67/0x220 [ 3376.398832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.404356] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3376.409277] ieee80211_register_hw+0x156e/0x3800 [ 3376.414029] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3376.418864] ? hrtimer_init+0x8b/0x300 [ 3376.422755] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3376.427853] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3376.432860] ? cred_has_capability+0x193/0x320 [ 3376.437451] ? hwsim_exit_net+0xc50/0xc50 [ 3376.441695] hwsim_new_radio_nl+0x5eb/0x893 [ 3376.446039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.451587] ? security_capable+0x92/0xc0 [ 3376.455750] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3376.460946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.466683] ? nla_parse+0x1fc/0x2f0 [ 3376.470429] genl_family_rcv_msg+0x6db/0xd30 [ 3376.474840] ? genl_unregister_family+0x790/0x790 [ 3376.479688] ? __local_bh_enable_ip+0x15a/0x270 [ 3376.484380] ? __dev_queue_xmit+0x892/0x2fe0 [ 3376.488815] genl_rcv_msg+0xca/0x170 [ 3376.492525] netlink_rcv_skb+0x17d/0x460 [ 3376.496579] ? genl_family_rcv_msg+0xd30/0xd30 [ 3376.501164] ? netlink_ack+0xb30/0xb30 [ 3376.505054] genl_rcv+0x29/0x40 [ 3376.508335] netlink_unicast+0x53a/0x730 [ 3376.512392] ? netlink_attachskb+0x770/0x770 [ 3376.516817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.522360] netlink_sendmsg+0x8ae/0xd70 [ 3376.526424] ? netlink_unicast+0x730/0x730 [ 3376.530658] ? selinux_socket_sendmsg+0x36/0x40 [ 3376.535328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.540855] ? security_socket_sendmsg+0x8d/0xc0 [ 3376.545602] ? netlink_unicast+0x730/0x730 [ 3376.549831] sock_sendmsg+0xd7/0x130 [ 3376.553538] ___sys_sendmsg+0x803/0x920 [ 3376.557592] ? copy_msghdr_from_user+0x430/0x430 [ 3376.562431] ? lock_downgrade+0x880/0x880 [ 3376.566572] ? kasan_check_read+0x11/0x20 [ 3376.570735] ? __fget+0x367/0x540 [ 3376.574181] ? iterate_fd+0x360/0x360 [ 3376.577987] ? lock_downgrade+0x880/0x880 [ 3376.582141] ? __fget_light+0x1a9/0x230 [ 3376.587063] ? __fdget+0x1b/0x20 [ 3376.590435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3376.595978] __sys_sendmsg+0x105/0x1d0 [ 3376.599885] ? __ia32_sys_shutdown+0x80/0x80 [ 3376.604297] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3376.609051] ? do_syscall_64+0x26/0x620 [ 3376.613017] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3376.618381] ? do_syscall_64+0x26/0x620 [ 3376.622349] __x64_sys_sendmsg+0x78/0xb0 [ 3376.626534] do_syscall_64+0xfd/0x620 [ 3376.630341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3376.635546] RIP: 0033:0x45a6f9 [ 3376.638735] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3376.657815] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3376.665530] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:03 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0652550", 0x40, 0x1c0}]) 15:26:03 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) ioctl$VIDIOC_S_JPEGCOMP(r7, 0x408c563e, &(0x7f0000001380)={0xeb01, 0x9, 0x26, "4feaa1007455c7d87be8b85431371bb98c72696356ff55061765a52ee16e6eda94677355becb626ebfeff61a8e01503efdd438fc91ce4d0b133510d4", 0x12, "67c3d4b27f1b37a87938d7d4c95141a292e7578a987af9096f10402cf999b50f57e28d2a4779460b590a836d6119a1165c74cb70b5d0dfcae37e2333", 0x18}) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r4, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x3, 0xffffffff, 0x60cf, 0x9, 0x9, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x80000000}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3376.672794] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3376.680070] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3376.687417] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3376.694675] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:03 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x8001) 15:26:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0xa00}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2c, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:03 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000200000000000000000000000000000000000000000000200"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) ioctl$SOUND_PCM_READ_BITS(r6, 0x80045005, &(0x7f0000000040)) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3376.918283] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3376.930661] Dev loop3: unable to read RDB block 1 [ 3376.940014] loop3: unable to read partition table [ 3376.954623] loop3: partition table beyond EOD, truncated [ 3376.960671] CPU: 1 PID: 24123 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3376.968525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3376.977895] Call Trace: [ 3376.980506] dump_stack+0x197/0x210 [ 3376.984161] sysfs_warn_dup.cold+0x1c/0x31 [ 3376.988420] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3376.993809] sysfs_create_link+0x65/0xc0 [ 3376.997893] device_add+0x7ce/0x1760 [ 3377.001634] ? get_device_parent.isra.0+0x570/0x570 [ 3377.006667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.012231] wiphy_register+0x16fa/0x21d0 [ 3377.016396] ? show_schedstat+0x832/0xbb0 [ 3377.020566] ? wiphy_unregister+0xfd0/0xfd0 [ 3377.024903] ? rcu_read_lock_sched_held+0x110/0x130 [ 3377.029936] ? __kmalloc+0x5e1/0x750 [ 3377.033664] ? trace_hardirqs_on+0x67/0x220 [ 3377.038007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.043684] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3377.048637] ieee80211_register_hw+0x156e/0x3800 [ 3377.053423] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3377.058288] ? hrtimer_init+0x8b/0x300 [ 3377.062195] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3377.067325] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3377.072368] ? cred_has_capability+0x193/0x320 [ 3377.077024] ? hwsim_exit_net+0xc50/0xc50 [ 3377.081201] hwsim_new_radio_nl+0x5eb/0x893 [ 3377.085548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.091187] ? security_capable+0x92/0xc0 [ 3377.095353] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3377.100566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.106382] ? nla_parse+0x1fc/0x2f0 [ 3377.110129] genl_family_rcv_msg+0x6db/0xd30 [ 3377.114565] ? genl_unregister_family+0x790/0x790 [ 3377.119498] ? __local_bh_enable_ip+0x15a/0x270 [ 3377.124185] ? __dev_queue_xmit+0x892/0x2fe0 [ 3377.128628] genl_rcv_msg+0xca/0x170 [ 3377.132366] netlink_rcv_skb+0x17d/0x460 [ 3377.136445] ? genl_family_rcv_msg+0xd30/0xd30 [ 3377.141049] ? netlink_ack+0xb30/0xb30 [ 3377.144967] genl_rcv+0x29/0x40 [ 3377.148273] netlink_unicast+0x53a/0x730 [ 3377.152349] ? netlink_attachskb+0x770/0x770 [ 3377.156770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.162323] netlink_sendmsg+0x8ae/0xd70 [ 3377.166404] ? netlink_unicast+0x730/0x730 [ 3377.170677] ? selinux_socket_sendmsg+0x36/0x40 [ 3377.175362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.180910] ? security_socket_sendmsg+0x8d/0xc0 [ 3377.185678] ? netlink_unicast+0x730/0x730 [ 3377.189926] sock_sendmsg+0xd7/0x130 [ 3377.193660] ___sys_sendmsg+0x803/0x920 [ 3377.197666] ? copy_msghdr_from_user+0x430/0x430 [ 3377.202442] ? lock_downgrade+0x880/0x880 [ 3377.206639] ? kasan_check_read+0x11/0x20 [ 3377.210803] ? __fget+0x367/0x540 [ 3377.214277] ? iterate_fd+0x360/0x360 [ 3377.218095] ? lock_downgrade+0x880/0x880 [ 3377.222255] ? __fget_light+0x1a9/0x230 [ 3377.226238] ? __fdget+0x1b/0x20 [ 3377.229612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3377.235861] __sys_sendmsg+0x105/0x1d0 [ 3377.239769] ? __ia32_sys_shutdown+0x80/0x80 [ 3377.244240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3377.249014] ? do_syscall_64+0x26/0x620 [ 3377.252998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3377.258353] ? do_syscall_64+0x26/0x620 [ 3377.262326] __x64_sys_sendmsg+0x78/0xb0 [ 3377.266378] do_syscall_64+0xfd/0x620 [ 3377.270172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3377.275522] RIP: 0033:0x45a6f9 [ 3377.278705] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3377.297627] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3377.305335] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3377.312597] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 15:26:03 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) getpgrp(0x0) 15:26:03 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) dup2(r0, r1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r4 = dup2(r2, r3) ioctl$RTC_UIE_ON(r4, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x6a}, 0x2b7) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) mq_notify(r8, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000000040)}, 0x20) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r10 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r11 = dup2(r9, r10) ioctl$RTC_UIE_ON(r11, 0x7003) ioctl$EVIOCSABS2F(r11, 0x401845ef, &(0x7f0000000040)={0x0, 0x3, 0x1f, 0x80000001, 0xfff, 0x7}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r5, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r12 = semget$private(0x0, 0x4, 0x0) semop(r12, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:03 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000080)={0x53, 0x6, 0x1000, {0x3ff, 0x7}, {0x1, 0x4b8}, @ramp={0x200, 0x0, {0x2, 0x1, 0x101}}}) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r0, r4) ioctl$RTC_UIE_ON(r5, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3377.319857] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3377.327138] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3377.334636] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3377.352587] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:03 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) getpgrp(0x0) 15:26:03 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656225", 0x40, 0x1c0}]) 15:26:03 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:03 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) r7 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0xc04c5349, &(0x7f00000000c0)) 15:26:03 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ptrace(0x10, 0x0) semget$private(0x0, 0x4, 0x0) r7 = semget(0x3, 0x1, 0x0) semctl$GETVAL(r7, 0x0, 0xc, &(0x7f00000002c0)=""/102) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3377.668459] Dev loop3: unable to read RDB block 1 [ 3377.673707] loop3: unable to read partition table [ 3377.710499] loop3: partition table beyond EOD, truncated [ 3377.752080] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:04 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0xc04c5349, &(0x7f00000000c0)) [ 3377.873132] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3377.904043] CPU: 1 PID: 24126 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3377.911924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3377.921295] Call Trace: [ 3377.923911] dump_stack+0x197/0x210 [ 3377.927739] sysfs_warn_dup.cold+0x1c/0x31 [ 3377.931995] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3377.938424] sysfs_create_link+0x65/0xc0 [ 3377.942499] device_add+0x7ce/0x1760 [ 3377.946236] ? get_device_parent.isra.0+0x570/0x570 [ 3377.951266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.956823] wiphy_register+0x16fa/0x21d0 [ 3377.960983] ? show_schedstat+0x832/0xbb0 [ 3377.965157] ? wiphy_unregister+0xfd0/0xfd0 [ 3377.969492] ? rcu_read_lock_sched_held+0x110/0x130 [ 3377.974524] ? __kmalloc+0x5e1/0x750 [ 3377.978283] ? trace_hardirqs_on+0x67/0x220 [ 3377.982617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.988255] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3377.993284] ieee80211_register_hw+0x156e/0x3800 [ 3377.998167] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3378.003030] ? hrtimer_init+0x8b/0x300 [ 3378.007192] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3378.012320] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3378.017349] ? cred_has_capability+0x193/0x320 [ 3378.021968] ? hwsim_exit_net+0xc50/0xc50 [ 3378.026127] ? __mutex_lock+0xa67/0x1300 [ 3378.030209] hwsim_new_radio_nl+0x5eb/0x893 [ 3378.034540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.040082] ? security_capable+0x92/0xc0 [ 3378.044240] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3378.049448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.055002] ? nla_parse+0x1fc/0x2f0 [ 3378.059168] genl_family_rcv_msg+0x6db/0xd30 [ 3378.063625] ? genl_unregister_family+0x790/0x790 [ 3378.068477] ? __local_bh_enable_ip+0x15a/0x270 [ 3378.073150] ? __dev_queue_xmit+0x892/0x2fe0 [ 3378.073180] genl_rcv_msg+0xca/0x170 [ 3378.073197] netlink_rcv_skb+0x17d/0x460 [ 3378.073214] ? genl_family_rcv_msg+0xd30/0xd30 [ 3378.081326] ? netlink_ack+0xb30/0xb30 [ 3378.081357] genl_rcv+0x29/0x40 [ 3378.089973] netlink_unicast+0x53a/0x730 [ 3378.089991] ? netlink_attachskb+0x770/0x770 [ 3378.090010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.111214] netlink_sendmsg+0x8ae/0xd70 [ 3378.115287] ? netlink_unicast+0x730/0x730 [ 3378.119534] ? selinux_socket_sendmsg+0x36/0x40 [ 3378.124207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.129840] ? security_socket_sendmsg+0x8d/0xc0 [ 3378.134603] ? netlink_unicast+0x730/0x730 [ 3378.138844] sock_sendmsg+0xd7/0x130 [ 3378.142568] ___sys_sendmsg+0x803/0x920 [ 3378.146551] ? copy_msghdr_from_user+0x430/0x430 [ 3378.151322] ? lock_downgrade+0x880/0x880 [ 3378.155596] ? kasan_check_read+0x11/0x20 [ 3378.159752] ? __fget+0x367/0x540 [ 3378.163213] ? iterate_fd+0x360/0x360 [ 3378.167020] ? lock_downgrade+0x880/0x880 [ 3378.171184] ? __fget_light+0x1a9/0x230 [ 3378.175172] ? __fdget+0x1b/0x20 [ 3378.178560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3378.184110] __sys_sendmsg+0x105/0x1d0 [ 3378.188008] ? __ia32_sys_shutdown+0x80/0x80 [ 3378.192439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3378.197198] ? do_syscall_64+0x26/0x620 [ 3378.201176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3378.206545] ? do_syscall_64+0x26/0x620 [ 3378.210531] __x64_sys_sendmsg+0x78/0xb0 [ 3378.214605] do_syscall_64+0xfd/0x620 [ 3378.218415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3378.223606] RIP: 0033:0x45a6f9 [ 3378.226804] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3378.245718] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3378.253447] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3378.260808] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 15:26:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0xe00}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3378.268083] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3378.275352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3378.282626] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3378.510596] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3378.517654] CPU: 1 PID: 24795 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3378.525459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3378.534822] Call Trace: [ 3378.537428] dump_stack+0x197/0x210 [ 3378.541080] sysfs_warn_dup.cold+0x1c/0x31 [ 3378.545339] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3378.550902] sysfs_create_link+0x65/0xc0 [ 3378.554988] device_add+0x7ce/0x1760 [ 3378.558732] ? get_device_parent.isra.0+0x570/0x570 [ 3378.563765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.569325] wiphy_register+0x16fa/0x21d0 [ 3378.569347] ? show_schedstat+0x832/0xbb0 [ 3378.569367] ? wiphy_unregister+0xfd0/0xfd0 [ 3378.581990] ? rcu_read_lock_sched_held+0x110/0x130 [ 3378.587034] ? __kmalloc+0x5e1/0x750 [ 3378.590777] ? trace_hardirqs_on+0x67/0x220 [ 3378.595228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.600908] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3378.605880] ieee80211_register_hw+0x156e/0x3800 [ 3378.610673] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3378.615537] ? hrtimer_init+0x8b/0x300 [ 3378.619442] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3378.624580] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3378.624594] ? cred_has_capability+0x193/0x320 [ 3378.624620] ? hwsim_exit_net+0xc50/0xc50 [ 3378.638352] ? __mutex_lock+0xa67/0x1300 [ 3378.642444] hwsim_new_radio_nl+0x5eb/0x893 [ 3378.648533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.654089] ? security_capable+0x92/0xc0 [ 3378.658258] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3378.663470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.669187] ? nla_parse+0x1fc/0x2f0 [ 3378.672932] genl_family_rcv_msg+0x6db/0xd30 [ 3378.677375] ? genl_unregister_family+0x790/0x790 [ 3378.682246] ? __local_bh_enable_ip+0x15a/0x270 [ 3378.686938] ? __dev_queue_xmit+0x892/0x2fe0 [ 3378.691387] genl_rcv_msg+0xca/0x170 [ 3378.695118] netlink_rcv_skb+0x17d/0x460 [ 3378.699195] ? genl_family_rcv_msg+0xd30/0xd30 [ 3378.703796] ? netlink_ack+0xb30/0xb30 [ 3378.707809] genl_rcv+0x29/0x40 [ 3378.711102] netlink_unicast+0x53a/0x730 [ 3378.715183] ? netlink_attachskb+0x770/0x770 [ 3378.719606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.725166] netlink_sendmsg+0x8ae/0xd70 [ 3378.729248] ? netlink_unicast+0x730/0x730 [ 3378.733496] ? selinux_socket_sendmsg+0x36/0x40 [ 3378.738195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.743741] ? security_socket_sendmsg+0x8d/0xc0 [ 3378.748506] ? netlink_unicast+0x730/0x730 [ 3378.752763] sock_sendmsg+0xd7/0x130 [ 3378.756493] ___sys_sendmsg+0x803/0x920 [ 3378.760490] ? copy_msghdr_from_user+0x430/0x430 [ 3378.765270] ? lock_downgrade+0x880/0x880 [ 3378.769453] ? kasan_check_read+0x11/0x20 [ 3378.773624] ? __fget+0x367/0x540 [ 3378.777092] ? iterate_fd+0x360/0x360 [ 3378.780908] ? lock_downgrade+0x880/0x880 [ 3378.785072] ? __fget_light+0x1a9/0x230 [ 3378.789067] ? __fdget+0x1b/0x20 [ 3378.792441] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3378.797996] __sys_sendmsg+0x105/0x1d0 [ 3378.801890] ? __ia32_sys_shutdown+0x80/0x80 [ 3378.806326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3378.811093] ? do_syscall_64+0x26/0x620 [ 3378.815074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3378.820440] ? do_syscall_64+0x26/0x620 [ 3378.824433] __x64_sys_sendmsg+0x78/0xb0 [ 3378.828506] do_syscall_64+0xfd/0x620 [ 3378.832323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3378.837686] RIP: 0033:0x45a6f9 [ 3378.840891] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:26:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2d, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:04 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e676c650000000120000000000000000000004f950804a96c485d9ec562480000008d53498a9020bbf600"/84], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) setsockopt$inet6_mtu(r8, 0x29, 0x17, &(0x7f0000000040)=0x4, 0x4) r9 = dup2(r4, r5) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000001340)={0x0, 0x2000000, 0x6, 0x0, 0x3f, 0xb9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xffdffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x80000000000, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:04 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0xc04c5349, &(0x7f00000000c0)) 15:26:04 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656254", 0x40, 0x1c0}]) 15:26:04 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r6 = getegid() chown(&(0x7f0000000140)='./file0\x00', r5, r6) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0xc04c5349, &(0x7f00000000c0)) 15:26:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x103000, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000080)={0x0, 0x3}) r1 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$video(0x0, 0x0, 0x0) r4 = dup2(r2, r3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) mq_notify(r8, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r5, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r9 = semget$private(0x0, 0x4, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000012c0)=@routing={0x88, 0xc, 0x2, 0x1, 0x0, [@local, @loopback, @ipv4={[], [], @rand_addr=0x3}, @dev={0xfe, 0x80, [], 0xd}, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}, 0x68) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3378.859800] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3378.867517] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3378.874789] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3378.882158] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3378.889430] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3378.896795] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000001380), &(0x7f00000013c0)=0x4) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000300000000000000"], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000080)) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3378.953701] Dev loop3: unable to read RDB block 1 [ 3378.981255] loop3: unable to read partition table [ 3378.991590] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3378.998645] CPU: 1 PID: 24805 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3378.998655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3378.998660] Call Trace: [ 3378.998684] dump_stack+0x197/0x210 [ 3378.998712] sysfs_warn_dup.cold+0x1c/0x31 [ 3379.022434] loop3: partition table beyond EOD, truncated [ 3379.026281] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3379.026336] sysfs_create_link+0x65/0xc0 [ 3379.026356] device_add+0x7ce/0x1760 [ 3379.038769] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3379.041219] ? get_device_parent.isra.0+0x570/0x570 [ 3379.041235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3379.041263] wiphy_register+0x16fa/0x21d0 [ 3379.041280] ? show_schedstat+0x832/0xbb0 [ 3379.041309] ? wiphy_unregister+0xfd0/0xfd0 [ 3379.052294] ? rcu_read_lock_sched_held+0x110/0x130 [ 3379.052315] ? __kmalloc+0x5e1/0x750 [ 3379.052330] ? trace_hardirqs_on+0x67/0x220 [ 3379.052347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3379.052362] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3379.052382] ieee80211_register_hw+0x156e/0x3800 [ 3379.067278] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3379.067304] ? hrtimer_init+0x8b/0x300 [ 3379.067323] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3379.067345] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3379.067358] ? cred_has_capability+0x193/0x320 [ 3379.067383] ? hwsim_exit_net+0xc50/0xc50 [ 3379.132129] ? __mutex_lock+0xa67/0x1300 [ 3379.136189] hwsim_new_radio_nl+0x5eb/0x893 [ 3379.140599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3379.146123] ? security_capable+0x92/0xc0 [ 3379.150261] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3379.155454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3379.160989] ? nla_parse+0x1fc/0x2f0 [ 3379.164712] genl_family_rcv_msg+0x6db/0xd30 [ 3379.169127] ? genl_unregister_family+0x790/0x790 [ 3379.173958] ? __local_bh_enable_ip+0x15a/0x270 [ 3379.178617] ? __dev_queue_xmit+0x892/0x2fe0 [ 3379.183036] genl_rcv_msg+0xca/0x170 [ 3379.186751] netlink_rcv_skb+0x17d/0x460 [ 3379.190804] ? genl_family_rcv_msg+0xd30/0xd30 [ 3379.195375] ? netlink_ack+0xb30/0xb30 [ 3379.199273] genl_rcv+0x29/0x40 [ 3379.202556] netlink_unicast+0x53a/0x730 [ 3379.206618] ? netlink_attachskb+0x770/0x770 [ 3379.211021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3379.217503] netlink_sendmsg+0x8ae/0xd70 [ 3379.221556] ? netlink_unicast+0x730/0x730 [ 3379.226400] ? selinux_socket_sendmsg+0x36/0x40 [ 3379.231055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3379.236594] ? security_socket_sendmsg+0x8d/0xc0 [ 3379.241343] ? netlink_unicast+0x730/0x730 [ 3379.245577] sock_sendmsg+0xd7/0x130 [ 3379.249279] ___sys_sendmsg+0x803/0x920 [ 3379.253246] ? copy_msghdr_from_user+0x430/0x430 [ 3379.258005] ? lock_downgrade+0x880/0x880 [ 3379.262144] ? kasan_check_read+0x11/0x20 [ 3379.266286] ? __fget+0x367/0x540 [ 3379.269741] ? iterate_fd+0x360/0x360 [ 3379.273533] ? lock_downgrade+0x880/0x880 [ 3379.277674] ? __fget_light+0x1a9/0x230 [ 3379.281638] ? __fdget+0x1b/0x20 [ 3379.284992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3379.290523] __sys_sendmsg+0x105/0x1d0 [ 3379.294409] ? __ia32_sys_shutdown+0x80/0x80 [ 3379.298818] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3379.303563] ? do_syscall_64+0x26/0x620 [ 3379.307528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3379.312880] ? do_syscall_64+0x26/0x620 [ 3379.316855] __x64_sys_sendmsg+0x78/0xb0 [ 3379.320920] do_syscall_64+0xfd/0x620 [ 3379.324711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3379.329892] RIP: 0033:0x45a6f9 [ 3379.333073] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3379.352050] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3379.359745] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3379.367015] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3379.374284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3379.381575] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3379.388832] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0xe53}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:05 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) getegid() r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) 15:26:05 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f06562fc", 0x40, 0x1c0}]) 15:26:05 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) [ 3379.721348] Dev loop3: unable to read RDB block 1 [ 3379.744778] loop3: unable to read partition table [ 3379.775494] loop3: partition table beyond EOD, truncated [ 3379.844140] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000040)=0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(0x0, 0x0, 0x0) r5 = dup2(r3, r4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c6500120000007b0000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000001f616a0cf496a27d33dc6f2294f497644acc11a38e953b960b9da55d6ca2a1f4a18289e9542166cbccc148a0cd2c9271b48d3d8bb4dc71f93fcf3e898100000000000000939c6a34fd7d68ce81b4a828687c55e33fc5a664789effe8dba80aee626367c1c0268929613fee38bd1825a5f692af7c74866e3366742307ae7e58efb1735feb7e61550688974a782ff55a055bb8a875f2adafb11fffb903c8e6c3d31e2b4b53969230e09e588b26f873dfd39932f62140b435521ebb83733ff8dc8a428ea078fafc160f17fe2e"], 0x48) getpid() r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/vga_arbiter\x00', 0x8000, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x10, 0x7ff, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r6}, 0x3c) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/Uev/rtc0\x00', 0x2002, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) mq_notify(r10, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r7, &(0x7f0000000080)="68b014669cb43bfb94", &(0x7f00000012c0)="3a1443d74534421d15d52c829a17ad844ee0e730410f42d1ff486e3811c18ad8a907e7230b90b60e5f2fc70db399fafe81335783e958164dcb7847023702cebeafb59982e4ecb3fb64065f2da63189b84047ce4b572b37dc1611f8ce4f7558446235de398a301d7587b053faa1c043b78b46ff9ba5e22650ff1d0a71b2b418955d9290f70540eadb7ec9be01c37bc4d015"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r7, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r11 = semget$private(0x0, 0x4, 0x0) semop(r11, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2e, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:06 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) [ 3379.993365] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3380.041505] CPU: 1 PID: 24988 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3380.049347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3380.058718] Call Trace: [ 3380.061328] dump_stack+0x197/0x210 [ 3380.064984] sysfs_warn_dup.cold+0x1c/0x31 [ 3380.069241] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3380.074658] sysfs_create_link+0x65/0xc0 [ 3380.078747] device_add+0x7ce/0x1760 [ 3380.082497] ? get_device_parent.isra.0+0x570/0x570 [ 3380.087529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.093106] wiphy_register+0x16fa/0x21d0 [ 3380.093124] ? show_schedstat+0x832/0xbb0 [ 3380.093142] ? wiphy_unregister+0xfd0/0xfd0 [ 3380.093162] ? rcu_read_lock_sched_held+0x110/0x130 [ 3380.101442] ? __kmalloc+0x5e1/0x750 [ 3380.101458] ? trace_hardirqs_on+0x67/0x220 [ 3380.101476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.101490] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3380.101510] ieee80211_register_hw+0x156e/0x3800 [ 3380.101534] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3380.111106] ? hrtimer_init+0x8b/0x300 [ 3380.111124] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3380.111145] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3380.111159] ? cred_has_capability+0x193/0x320 [ 3380.111184] ? hwsim_exit_net+0xc50/0xc50 [ 3380.119201] ? __mutex_lock+0xa67/0x1300 [ 3380.119226] hwsim_new_radio_nl+0x5eb/0x893 [ 3380.119238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.119254] ? security_capable+0x92/0xc0 [ 3380.129708] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3380.129739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.129753] ? nla_parse+0x1fc/0x2f0 [ 3380.129773] genl_family_rcv_msg+0x6db/0xd30 [ 3380.129793] ? genl_unregister_family+0x790/0x790 [ 3380.129812] ? __local_bh_enable_ip+0x15a/0x270 [ 3380.139621] ? __dev_queue_xmit+0x892/0x2fe0 [ 3380.139656] genl_rcv_msg+0xca/0x170 [ 3380.139676] netlink_rcv_skb+0x17d/0x460 [ 3380.139690] ? genl_family_rcv_msg+0xd30/0xd30 [ 3380.139706] ? netlink_ack+0xb30/0xb30 [ 3380.139732] genl_rcv+0x29/0x40 [ 3380.232922] netlink_unicast+0x53a/0x730 [ 3380.237002] ? netlink_attachskb+0x770/0x770 [ 3380.241425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.246996] netlink_sendmsg+0x8ae/0xd70 [ 3380.251076] ? netlink_unicast+0x730/0x730 [ 3380.255342] ? selinux_socket_sendmsg+0x36/0x40 [ 3380.260020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.265564] ? security_socket_sendmsg+0x8d/0xc0 [ 3380.270330] ? netlink_unicast+0x730/0x730 [ 3380.274573] sock_sendmsg+0xd7/0x130 [ 3380.278314] ___sys_sendmsg+0x803/0x920 [ 3380.282303] ? copy_msghdr_from_user+0x430/0x430 [ 3380.287080] ? lock_downgrade+0x880/0x880 [ 3380.291243] ? kasan_check_read+0x11/0x20 [ 3380.295849] ? __fget+0x367/0x540 [ 3380.299314] ? iterate_fd+0x360/0x360 [ 3380.303154] ? lock_downgrade+0x880/0x880 [ 3380.307322] ? __fget_light+0x1a9/0x230 [ 3380.311303] ? __fdget+0x1b/0x20 [ 3380.314677] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3380.320230] __sys_sendmsg+0x105/0x1d0 [ 3380.324125] ? __ia32_sys_shutdown+0x80/0x80 [ 3380.329427] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3380.334187] ? do_syscall_64+0x26/0x620 [ 3380.338168] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3380.343539] ? do_syscall_64+0x26/0x620 [ 3380.347538] __x64_sys_sendmsg+0x78/0xb0 [ 3380.351796] do_syscall_64+0xfd/0x620 [ 3380.356133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3380.361332] RIP: 0033:0x45a6f9 [ 3380.364535] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3380.383455] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3380.391189] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3380.398470] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3380.405769] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3380.413043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3380.420327] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:06 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x2, 0x1c0}]) 15:26:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x5, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, r2, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c65800000000000000000eaff00000000a7fa33cec300000500000003fc3f8f8906fe3a000000000000838fef000000000000000000000000070000000000000000002edf1aa0fa97261152ff21b32f8c19b7"], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:06 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0xe6d34d6e91a42682, 0xfa00, {0x2, &(0x7f0000000180), 0x2, 0x3}}, 0xfffffffffffffd89) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(0x0, 0x0, 0x0) r5 = dup2(r3, r4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e677c6500000000000000000000000000000000000000000000000000eb0100"/72], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4087}, 0xfffffffffffffd4b) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) socket$inet6_sctp(0xa, 0x5, 0x84) r11 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r12 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r13 = dup2(r11, r12) ioctl$RTC_UIE_ON(r13, 0x7003) getsockopt$inet6_buf(r13, 0x29, 0x45, &(0x7f0000001340)=""/63, &(0x7f0000001380)=0x3f) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000012c0)=""/112, 0x70, 0x1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1, 0x1}, 0x1c) [ 3380.633324] Dev loop3: unable to read RDB block 1 [ 3380.641004] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3380.648087] CPU: 0 PID: 25251 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3380.655892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3380.665256] Call Trace: [ 3380.667868] dump_stack+0x197/0x210 [ 3380.671760] sysfs_warn_dup.cold+0x1c/0x31 [ 3380.676052] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3380.681450] sysfs_create_link+0x65/0xc0 [ 3380.685532] device_add+0x7ce/0x1760 [ 3380.689341] ? get_device_parent.isra.0+0x570/0x570 [ 3380.694388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.699936] wiphy_register+0x16fa/0x21d0 [ 3380.704075] ? show_schedstat+0x832/0xbb0 [ 3380.708234] ? wiphy_unregister+0xfd0/0xfd0 [ 3380.712558] ? rcu_read_lock_sched_held+0x110/0x130 [ 3380.717564] ? __kmalloc+0x5e1/0x750 [ 3380.721266] ? trace_hardirqs_on+0x67/0x220 [ 3380.725590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.731136] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3380.736064] ieee80211_register_hw+0x156e/0x3800 [ 3380.740849] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3380.745722] ? hrtimer_init+0x8b/0x300 [ 3380.749615] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3380.754727] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3380.759740] ? cred_has_capability+0x193/0x320 [ 3380.765819] ? hwsim_exit_net+0xc50/0xc50 [ 3380.769957] ? __mutex_lock+0xa67/0x1300 [ 3380.774025] hwsim_new_radio_nl+0x5eb/0x893 [ 3380.778345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.783872] ? security_capable+0x92/0xc0 [ 3380.788031] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3380.793231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.798760] ? nla_parse+0x1fc/0x2f0 [ 3380.802569] genl_family_rcv_msg+0x6db/0xd30 [ 3380.807058] ? genl_unregister_family+0x790/0x790 [ 3380.811892] ? __local_bh_enable_ip+0x15a/0x270 [ 3380.816560] ? __dev_queue_xmit+0x892/0x2fe0 [ 3380.821067] genl_rcv_msg+0xca/0x170 [ 3380.824770] netlink_rcv_skb+0x17d/0x460 [ 3380.828823] ? genl_family_rcv_msg+0xd30/0xd30 [ 3380.833397] ? netlink_ack+0xb30/0xb30 [ 3380.837415] genl_rcv+0x29/0x40 [ 3380.840707] netlink_unicast+0x53a/0x730 [ 3380.845724] ? netlink_attachskb+0x770/0x770 [ 3380.850135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.855674] netlink_sendmsg+0x8ae/0xd70 [ 3380.859735] ? netlink_unicast+0x730/0x730 [ 3380.863970] ? selinux_socket_sendmsg+0x36/0x40 [ 3380.868628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3380.874156] ? security_socket_sendmsg+0x8d/0xc0 [ 3380.878907] ? netlink_unicast+0x730/0x730 [ 3380.883133] sock_sendmsg+0xd7/0x130 [ 3380.886839] ___sys_sendmsg+0x803/0x920 [ 3380.890805] ? copy_msghdr_from_user+0x430/0x430 [ 3380.895587] ? lock_downgrade+0x880/0x880 [ 3380.899737] ? kasan_check_read+0x11/0x20 [ 3380.903997] ? __fget+0x367/0x540 [ 3380.907449] ? iterate_fd+0x360/0x360 [ 3380.911342] ? lock_downgrade+0x880/0x880 [ 3380.915499] ? __fget_light+0x1a9/0x230 [ 3380.919484] ? __fdget+0x1b/0x20 [ 3380.922845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3380.928377] __sys_sendmsg+0x105/0x1d0 [ 3380.932269] ? __ia32_sys_shutdown+0x80/0x80 [ 3380.936676] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3380.941421] ? do_syscall_64+0x26/0x620 [ 3380.945385] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3380.950736] ? do_syscall_64+0x26/0x620 [ 3380.954701] __x64_sys_sendmsg+0x78/0xb0 [ 3380.958760] do_syscall_64+0xfd/0x620 [ 3380.962551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3380.967728] RIP: 0033:0x45a6f9 [ 3380.970911] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3380.989814] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3380.997526] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3381.004797] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3381.012066] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3381.019327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3381.026588] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:07 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) 15:26:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1f00}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3381.054800] loop3: unable to read partition table [ 3381.065816] loop3: partition table beyond EOD, truncated [ 3381.078396] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:07 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x9, 0x1c0}]) 15:26:07 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) 15:26:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000000092eea2b5a424aba05712d61e000000000000000000000000000000000000000002000000000000000000000000007b00"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) syncfs(r3) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000080)=0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:07 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000002fab88ffe8776ed2d00000000000000000000000000000000000000000000000000000000000000000000000000000046fc03f188b012385312e22cb9bc95274a221308f15956ba943928e37be61e1a107a1c512ee3513c7412f1ea1a2e1018f93a2f22042b6ef648109f53f7e9fb"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) r8 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r8) getpgrp(r8) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2f, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x2000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3381.380887] Dev loop3: unable to read RDB block 1 [ 3381.385928] loop3: unable to read partition table 15:26:07 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) [ 3381.429681] loop3: partition table beyond EOD, truncated [ 3381.445759] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3381.450898] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3381.514452] CPU: 1 PID: 25605 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3381.522328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3381.531699] Call Trace: [ 3381.534313] dump_stack+0x197/0x210 [ 3381.537974] sysfs_warn_dup.cold+0x1c/0x31 [ 3381.542262] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3381.547649] sysfs_create_link+0x65/0xc0 [ 3381.551751] device_add+0x7ce/0x1760 [ 3381.555488] ? get_device_parent.isra.0+0x570/0x570 [ 3381.560531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3381.566098] wiphy_register+0x16fa/0x21d0 [ 3381.570259] ? show_schedstat+0x832/0xbb0 [ 3381.570284] ? wiphy_unregister+0xfd0/0xfd0 [ 3381.570302] ? rcu_read_lock_sched_held+0x110/0x130 [ 3381.570320] ? __kmalloc+0x5e1/0x750 [ 3381.584503] ? trace_hardirqs_on+0x67/0x220 [ 3381.584523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3381.584538] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3381.584558] ieee80211_register_hw+0x156e/0x3800 [ 3381.584583] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3381.603422] ? hrtimer_init+0x8b/0x300 [ 3381.603441] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3381.603461] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3381.613265] ? cred_has_capability+0x193/0x320 [ 3381.613300] ? hwsim_exit_net+0xc50/0xc50 [ 3381.613323] hwsim_new_radio_nl+0x5eb/0x893 [ 3381.640628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3381.646211] ? security_capable+0x92/0xc0 [ 3381.650405] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3381.655765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3381.661366] ? nla_parse+0x1fc/0x2f0 [ 3381.665136] genl_family_rcv_msg+0x6db/0xd30 [ 3381.669580] ? genl_unregister_family+0x790/0x790 [ 3381.674467] ? __local_bh_enable_ip+0x15a/0x270 [ 3381.679241] ? __dev_queue_xmit+0x892/0x2fe0 [ 3381.683682] genl_rcv_msg+0xca/0x170 [ 3381.687413] netlink_rcv_skb+0x17d/0x460 [ 3381.691484] ? genl_family_rcv_msg+0xd30/0xd30 [ 3381.696077] ? netlink_ack+0xb30/0xb30 [ 3381.699992] genl_rcv+0x29/0x40 [ 3381.703322] netlink_unicast+0x53a/0x730 [ 3381.707394] ? netlink_attachskb+0x770/0x770 [ 3381.711819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3381.717371] netlink_sendmsg+0x8ae/0xd70 [ 3381.721470] ? netlink_unicast+0x730/0x730 [ 3381.725723] ? selinux_socket_sendmsg+0x36/0x40 [ 3381.730408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3381.736212] ? security_socket_sendmsg+0x8d/0xc0 [ 3381.740975] ? netlink_unicast+0x730/0x730 [ 3381.745220] sock_sendmsg+0xd7/0x130 [ 3381.748941] ___sys_sendmsg+0x803/0x920 [ 3381.752928] ? copy_msghdr_from_user+0x430/0x430 [ 3381.757696] ? lock_downgrade+0x880/0x880 [ 3381.761855] ? kasan_check_read+0x11/0x20 [ 3381.766014] ? __fget+0x367/0x540 [ 3381.769478] ? iterate_fd+0x360/0x360 [ 3381.773284] ? lock_downgrade+0x880/0x880 [ 3381.777443] ? __fget_light+0x1a9/0x230 [ 3381.781423] ? __fdget+0x1b/0x20 [ 3381.784796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3381.790350] __sys_sendmsg+0x105/0x1d0 [ 3381.794248] ? __ia32_sys_shutdown+0x80/0x80 [ 3381.798681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3381.803461] ? do_syscall_64+0x26/0x620 [ 3381.808242] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3381.813625] ? do_syscall_64+0x26/0x620 [ 3381.817714] __x64_sys_sendmsg+0x78/0xb0 [ 3381.821793] do_syscall_64+0xfd/0x620 [ 3381.825609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3381.830810] RIP: 0033:0x45a6f9 [ 3381.834014] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3381.853018] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d612e67060000000000000000000000000000000000e70000000000000000000200"/59], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x10000, 0x5, 0x3d345aac, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffb, 0x0, 0x80000001, 0xa3f5, 0x400000000000, 0x0, 0x7, 0x5}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) getsockopt$bt_l2cap_L2CAP_OPTIONS(r9, 0x6, 0x1, &(0x7f0000000080), &(0x7f0000001200)=0xc) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3381.860833] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3381.868112] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3381.875392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3381.882668] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3381.889943] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:08 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x25, 0x1c0}]) [ 3381.911267] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3381.950631] CPU: 0 PID: 25749 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3381.958609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3381.967987] Call Trace: [ 3381.970602] dump_stack+0x197/0x210 [ 3381.974342] sysfs_warn_dup.cold+0x1c/0x31 [ 3381.974366] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3381.984008] sysfs_create_link+0x65/0xc0 [ 3381.988103] device_add+0x7ce/0x1760 [ 3381.991848] ? get_device_parent.isra.0+0x570/0x570 [ 3381.996879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.002445] wiphy_register+0x16fa/0x21d0 [ 3382.006609] ? show_schedstat+0x832/0xbb0 [ 3382.010777] ? wiphy_unregister+0xfd0/0xfd0 [ 3382.015118] ? rcu_read_lock_sched_held+0x110/0x130 [ 3382.020149] ? __kmalloc+0x5e1/0x750 [ 3382.023877] ? trace_hardirqs_on+0x67/0x220 [ 3382.028228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.033781] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3382.038730] ieee80211_register_hw+0x156e/0x3800 [ 3382.043512] ? ieee80211_ifa6_changed+0x7d0/0x7d0 15:26:08 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) [ 3382.048374] ? hrtimer_init+0x8b/0x300 [ 3382.052278] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3382.057405] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3382.062524] ? cred_has_capability+0x193/0x320 [ 3382.067137] ? hwsim_exit_net+0xc50/0xc50 [ 3382.071299] ? __mutex_lock+0xa67/0x1300 [ 3382.075395] hwsim_new_radio_nl+0x5eb/0x893 [ 3382.079729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.085286] ? security_capable+0x92/0xc0 [ 3382.089476] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3382.094684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.100233] ? nla_parse+0x1fc/0x2f0 [ 3382.103973] genl_family_rcv_msg+0x6db/0xd30 [ 3382.108413] ? genl_unregister_family+0x790/0x790 [ 3382.113301] ? __local_bh_enable_ip+0x15a/0x270 [ 3382.117987] ? __dev_queue_xmit+0x892/0x2fe0 [ 3382.122431] genl_rcv_msg+0xca/0x170 [ 3382.126162] netlink_rcv_skb+0x17d/0x460 [ 3382.130242] ? genl_family_rcv_msg+0xd30/0xd30 [ 3382.134846] ? netlink_ack+0xb30/0xb30 [ 3382.138766] genl_rcv+0x29/0x40 [ 3382.142064] netlink_unicast+0x53a/0x730 [ 3382.146152] ? netlink_attachskb+0x770/0x770 15:26:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x3801}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) r7 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$BLKROGET(r7, 0x125e, &(0x7f0000001380)) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3382.150575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.156141] netlink_sendmsg+0x8ae/0xd70 [ 3382.160487] ? netlink_unicast+0x730/0x730 [ 3382.164743] ? selinux_socket_sendmsg+0x36/0x40 [ 3382.169480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.175036] ? security_socket_sendmsg+0x8d/0xc0 [ 3382.179810] ? netlink_unicast+0x730/0x730 [ 3382.184067] sock_sendmsg+0xd7/0x130 [ 3382.187797] ___sys_sendmsg+0x803/0x920 [ 3382.191800] ? copy_msghdr_from_user+0x430/0x430 [ 3382.197187] ? lock_downgrade+0x880/0x880 [ 3382.201353] ? kasan_check_read+0x11/0x20 [ 3382.205518] ? __fget+0x367/0x540 [ 3382.208981] ? iterate_fd+0x360/0x360 [ 3382.212794] ? lock_downgrade+0x880/0x880 [ 3382.216958] ? __fget_light+0x1a9/0x230 [ 3382.220942] ? __fdget+0x1b/0x20 [ 3382.224323] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3382.229875] __sys_sendmsg+0x105/0x1d0 [ 3382.233771] ? __ia32_sys_shutdown+0x80/0x80 [ 3382.238208] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3382.242976] ? do_syscall_64+0x26/0x620 [ 3382.246962] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3382.252352] ? do_syscall_64+0x26/0x620 [ 3382.256478] __x64_sys_sendmsg+0x78/0xb0 [ 3382.260569] do_syscall_64+0xfd/0x620 [ 3382.264517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3382.269742] RIP: 0033:0x45a6f9 [ 3382.272945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3382.291878] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x30, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3382.299599] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3382.306879] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3382.314325] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3382.321607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3382.328886] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3382.369414] Dev loop3: unable to read RDB block 1 [ 3382.399902] loop3: unable to read partition table [ 3382.434629] loop3: partition table beyond EOD, truncated [ 3382.446921] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:08 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) [ 3382.503451] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3382.544225] CPU: 1 PID: 26063 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3382.552089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3382.561488] Call Trace: [ 3382.564090] dump_stack+0x197/0x210 [ 3382.567749] sysfs_warn_dup.cold+0x1c/0x31 [ 3382.572018] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3382.577407] sysfs_create_link+0x65/0xc0 [ 3382.581487] device_add+0x7ce/0x1760 [ 3382.585237] ? get_device_parent.isra.0+0x570/0x570 [ 3382.585252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.585276] wiphy_register+0x16fa/0x21d0 [ 3382.595818] ? show_schedstat+0x832/0xbb0 [ 3382.595841] ? wiphy_unregister+0xfd0/0xfd0 [ 3382.595860] ? rcu_read_lock_sched_held+0x110/0x130 [ 3382.613526] ? __kmalloc+0x5e1/0x750 [ 3382.617252] ? trace_hardirqs_on+0x67/0x220 [ 3382.621585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.627320] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3382.632265] ieee80211_register_hw+0x156e/0x3800 [ 3382.637038] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3382.641893] ? hrtimer_init+0x8b/0x300 [ 3382.645792] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3382.650923] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3382.655945] ? cred_has_capability+0x193/0x320 [ 3382.660554] ? hwsim_exit_net+0xc50/0xc50 [ 3382.664875] hwsim_new_radio_nl+0x5eb/0x893 [ 3382.669219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.674772] ? security_capable+0x92/0xc0 [ 3382.678936] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3382.684141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.690814] ? nla_parse+0x1fc/0x2f0 [ 3382.694544] genl_family_rcv_msg+0x6db/0xd30 [ 3382.698969] ? genl_unregister_family+0x790/0x790 [ 3382.703821] ? __local_bh_enable_ip+0x15a/0x270 [ 3382.708499] ? __dev_queue_xmit+0x892/0x2fe0 [ 3382.714937] genl_rcv_msg+0xca/0x170 [ 3382.718664] netlink_rcv_skb+0x17d/0x460 [ 3382.722731] ? genl_family_rcv_msg+0xd30/0xd30 [ 3382.727326] ? netlink_ack+0xb30/0xb30 [ 3382.731243] genl_rcv+0x29/0x40 [ 3382.734528] netlink_unicast+0x53a/0x730 [ 3382.738600] ? netlink_attachskb+0x770/0x770 [ 3382.743022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.748573] netlink_sendmsg+0x8ae/0xd70 [ 3382.752650] ? netlink_unicast+0x730/0x730 [ 3382.756896] ? selinux_socket_sendmsg+0x36/0x40 [ 3382.761570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3382.767127] ? security_socket_sendmsg+0x8d/0xc0 [ 3382.771887] ? netlink_unicast+0x730/0x730 [ 3382.776157] sock_sendmsg+0xd7/0x130 [ 3382.779889] ___sys_sendmsg+0x803/0x920 [ 3382.783881] ? copy_msghdr_from_user+0x430/0x430 [ 3382.788656] ? lock_downgrade+0x880/0x880 [ 3382.792816] ? kasan_check_read+0x11/0x20 [ 3382.797068] ? __fget+0x367/0x540 [ 3382.800535] ? iterate_fd+0x360/0x360 [ 3382.804346] ? lock_downgrade+0x880/0x880 [ 3382.808508] ? __fget_light+0x1a9/0x230 [ 3382.812490] ? __fdget+0x1b/0x20 [ 3382.815860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3382.821410] __sys_sendmsg+0x105/0x1d0 [ 3382.825397] ? __ia32_sys_shutdown+0x80/0x80 [ 3382.829828] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3382.834588] ? do_syscall_64+0x26/0x620 [ 3382.838615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3382.843991] ? do_syscall_64+0x26/0x620 [ 3382.848005] __x64_sys_sendmsg+0x78/0xb0 [ 3382.852169] do_syscall_64+0xfd/0x620 [ 3382.855985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3382.861179] RIP: 0033:0x45a6f9 [ 3382.864506] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3382.883789] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) unshare(0x400) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000300)='unconfined_u:\xf3ystem_r:insmod_\x89$s0-s0:c0.c1023\x00bj*\x98\x1c\xc0L\t\x1e\xd6\x82\xc7\xa6\x81mW\x8dN\x97}\x88\x9d\xf307!\x04|=9\x82\xb5\xc8*\xe8\xffv5\xca\r\xff\x8e\xb5\x82\xf60\x901\b\xd8V\xe9\xbc\xd6S)\xf8@R\xda>\x1d\xaf\x05\xbd\xfc! \x9a\xf3\x99\x06\xa98\xe2\xc6U\xeb\xe0e\xd0\xd6\xec\x03a\x8a\xf2C\xf4\x13\xd7Q\xb5\xb0O\x81\x94\x1f\x92\xaf\xab7\x89X\x190x{\x0f\xe3\xeb\x15\xec\xdc\x8b\xa2\x9b\xf4\x90\xf7\xf9\bmHh\x90(\x1c\xe1\":\x92\xaa\x99', 0xb4, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) r8 = openat(0xffffffffffffffff, &(0x7f0000001340)='./file0\x00', 0x200000, 0x4) setsockopt$inet_sctp_SCTP_NODELAY(r8, 0x84, 0x3, &(0x7f0000001500), 0x4) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3c, 0x2, @thr={&(0x7f0000000040)="329785163e88f8b306a587150c10913aa0a842175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8f256f1fb416745a47915b7ae029352ba4d4381017999797321693f92af147a955b4eb7c7c44ff859d1c1e43a785030e9373e142f87d5cfbadc9b98f08fa399353a90c07", &(0x7f0000001380)="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"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040), &(0x7f00000012c0)="2a17db3f85a86d5265034ae56d223a2ea1d0e596ae55b7fa0c71428be0c4452556d3d6b7e8aa09a0cd43fe6ef435728d1d0d8bf28b466b582687688d97ae874709c0dd8c601f564c"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x6, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x8, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x7}) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000001280)={@multicast2, @loopback}, 0x8) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680), 0x0) [ 3382.891512] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3382.898808] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3382.906081] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3382.913356] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3382.920649] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3382.934067] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3382.952561] CPU: 1 PID: 26067 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3382.960419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3382.969786] Call Trace: [ 3382.972389] dump_stack+0x197/0x210 [ 3382.976017] sysfs_warn_dup.cold+0x1c/0x31 [ 3382.980246] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3382.985617] sysfs_create_link+0x65/0xc0 [ 3382.989673] device_add+0x7ce/0x1760 [ 3382.993381] ? get_device_parent.isra.0+0x570/0x570 [ 3382.998387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3383.003924] wiphy_register+0x16fa/0x21d0 [ 3383.008069] ? show_schedstat+0x832/0xbb0 [ 3383.012225] ? wiphy_unregister+0xfd0/0xfd0 [ 3383.016544] ? rcu_read_lock_sched_held+0x110/0x130 [ 3383.021606] ? __kmalloc+0x5e1/0x750 [ 3383.025352] ? trace_hardirqs_on+0x67/0x220 [ 3383.029679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3383.035237] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3383.040181] ieee80211_register_hw+0x156e/0x3800 [ 3383.044937] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3383.049787] ? hrtimer_init+0x8b/0x300 [ 3383.053669] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3383.058787] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3383.063807] ? cred_has_capability+0x193/0x320 [ 3383.068400] ? hwsim_exit_net+0xc50/0xc50 [ 3383.072544] ? __mutex_lock+0xa67/0x1300 [ 3383.076602] hwsim_new_radio_nl+0x5eb/0x893 [ 3383.080938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3383.086470] ? security_capable+0x92/0xc0 [ 3383.090626] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3383.095808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3383.101353] ? nla_parse+0x1fc/0x2f0 [ 3383.105075] genl_family_rcv_msg+0x6db/0xd30 [ 3383.109913] ? genl_unregister_family+0x790/0x790 [ 3383.114755] ? __local_bh_enable_ip+0x15a/0x270 [ 3383.119430] ? __dev_queue_xmit+0x892/0x2fe0 [ 3383.123928] genl_rcv_msg+0xca/0x170 [ 3383.127654] netlink_rcv_skb+0x17d/0x460 [ 3383.131705] ? genl_family_rcv_msg+0xd30/0xd30 [ 3383.136278] ? netlink_ack+0xb30/0xb30 [ 3383.140163] genl_rcv+0x29/0x40 [ 3383.143428] netlink_unicast+0x53a/0x730 [ 3383.147481] ? netlink_attachskb+0x770/0x770 [ 3383.151881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3383.157410] netlink_sendmsg+0x8ae/0xd70 [ 3383.161468] ? netlink_unicast+0x730/0x730 [ 3383.165698] ? selinux_socket_sendmsg+0x36/0x40 [ 3383.170369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3383.176070] ? security_socket_sendmsg+0x8d/0xc0 [ 3383.180813] ? netlink_unicast+0x730/0x730 [ 3383.185037] sock_sendmsg+0xd7/0x130 [ 3383.188752] ___sys_sendmsg+0x803/0x920 [ 3383.192717] ? copy_msghdr_from_user+0x430/0x430 [ 3383.197466] ? lock_downgrade+0x880/0x880 [ 3383.201604] ? kasan_check_read+0x11/0x20 [ 3383.205743] ? __fget+0x367/0x540 [ 3383.209188] ? iterate_fd+0x360/0x360 [ 3383.212989] ? lock_downgrade+0x880/0x880 [ 3383.217126] ? __fget_light+0x1a9/0x230 [ 3383.221873] ? __fdget+0x1b/0x20 [ 3383.225245] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3383.230776] __sys_sendmsg+0x105/0x1d0 [ 3383.234655] ? __ia32_sys_shutdown+0x80/0x80 [ 3383.239066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3383.243820] ? do_syscall_64+0x26/0x620 [ 3383.247800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3383.253160] ? do_syscall_64+0x26/0x620 [ 3383.257127] __x64_sys_sendmsg+0x78/0xb0 [ 3383.261193] do_syscall_64+0xfd/0x620 [ 3383.264985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3383.270168] RIP: 0033:0x45a6f9 [ 3383.273351] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3383.292242] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:09 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x33, 0x1c0}]) [ 3383.299945] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3383.307462] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3383.314718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3383.321983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3383.329261] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x3f00}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3383.465089] Dev loop3: unable to read RDB block 1 15:26:09 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) [ 3383.497576] loop3: unable to read partition table [ 3383.504096] loop3: partition table beyond EOD, truncated [ 3383.520477] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:09 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) 15:26:09 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x42, 0x1c0}]) 15:26:09 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0xc04c5349, &(0x7f00000000c0)) [ 3383.731880] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3383.747984] loop3: partition table partially beyond EOD, truncated 15:26:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) ioctl$SNDRV_CTL_IOCTL_PVERSION(r5, 0x80045500, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3383.775133] loop3: p1 start 448 is beyond EOD, truncated [ 3383.795542] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3383.808909] loop3: p3 start 958347629 is beyond EOD, truncated [ 3383.815134] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3383.822112] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3383.822125] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3383.834410] loop3: p7 start 500206790 is beyond EOD, truncated [ 3383.841063] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3383.847266] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3383.853481] loop3: p10 start 13460217 is beyond EOD, truncated [ 3383.859637] loop3: p11 start 129726472 is beyond EOD, truncated [ 3383.865795] loop3: p12 start 1441344512 is beyond EOD, truncated 15:26:10 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r4 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0xc04c5349, &(0x7f00000000c0)) [ 3383.872083] loop3: p13 start 471698834 is beyond EOD, truncated [ 3383.878245] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3383.898101] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3383.931487] CPU: 1 PID: 26067 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3383.939339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3383.949142] Call Trace: [ 3383.951752] dump_stack+0x197/0x210 [ 3383.955405] sysfs_warn_dup.cold+0x1c/0x31 [ 3383.959660] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3383.966088] sysfs_create_link+0x65/0xc0 [ 3383.969565] SELinux: Context unconfined_u:óystem_r:insmod_‰$s0-s0:c0.c1023 is not valid (left unmapped). [ 3383.970162] device_add+0x7ce/0x1760 [ 3383.970184] ? get_device_parent.isra.0+0x570/0x570 [ 3383.970204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3383.970227] wiphy_register+0x16fa/0x21d0 [ 3383.970244] ? show_schedstat+0x832/0xbb0 [ 3384.002848] ? wiphy_unregister+0xfd0/0xfd0 [ 3384.007193] ? rcu_read_lock_sched_held+0x110/0x130 [ 3384.012237] ? __kmalloc+0x5e1/0x750 [ 3384.015970] ? trace_hardirqs_on+0x67/0x220 [ 3384.020311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.025871] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3384.030819] ieee80211_register_hw+0x156e/0x3800 [ 3384.035793] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3384.041814] ? hrtimer_init+0x8b/0x300 [ 3384.045720] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3384.050857] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3384.055888] ? cred_has_capability+0x193/0x320 [ 3384.060518] ? hwsim_exit_net+0xc50/0xc50 [ 3384.064793] hwsim_new_radio_nl+0x5eb/0x893 [ 3384.069135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.074692] ? security_capable+0x92/0xc0 [ 3384.078880] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3384.084107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.089681] ? nla_parse+0x1fc/0x2f0 [ 3384.093557] genl_family_rcv_msg+0x6db/0xd30 [ 3384.098052] ? genl_unregister_family+0x790/0x790 [ 3384.102921] ? rcu_read_unlock_special+0x679/0xea0 [ 3384.107864] ? find_held_lock+0x35/0x130 [ 3384.111997] genl_rcv_msg+0xca/0x170 [ 3384.115724] netlink_rcv_skb+0x17d/0x460 [ 3384.119795] ? genl_family_rcv_msg+0xd30/0xd30 [ 3384.124401] ? netlink_ack+0xb30/0xb30 [ 3384.128322] genl_rcv+0x29/0x40 [ 3384.131620] netlink_unicast+0x53a/0x730 [ 3384.138143] ? netlink_attachskb+0x770/0x770 [ 3384.138165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.138181] netlink_sendmsg+0x8ae/0xd70 [ 3384.138200] ? netlink_unicast+0x730/0x730 [ 3384.152185] ? selinux_socket_sendmsg+0x36/0x40 [ 3384.152203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.166628] ? security_socket_sendmsg+0x8d/0xc0 [ 3384.166645] ? netlink_unicast+0x730/0x730 [ 3384.166663] sock_sendmsg+0xd7/0x130 [ 3384.179359] ___sys_sendmsg+0x803/0x920 [ 3384.179380] ? copy_msghdr_from_user+0x430/0x430 [ 3384.179404] ? lock_downgrade+0x880/0x880 [ 3384.179423] ? kasan_check_read+0x11/0x20 [ 3384.196417] ? __fget+0x367/0x540 [ 3384.196439] ? iterate_fd+0x360/0x360 [ 3384.196457] ? lock_downgrade+0x880/0x880 [ 3384.196478] ? __fget_light+0x1a9/0x230 [ 3384.211826] ? __fdget+0x1b/0x20 [ 3384.215192] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3384.215217] __sys_sendmsg+0x105/0x1d0 [ 3384.215233] ? __ia32_sys_shutdown+0x80/0x80 [ 3384.215259] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3384.233801] ? do_syscall_64+0x26/0x620 [ 3384.237787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3384.243166] ? do_syscall_64+0x26/0x620 [ 3384.247199] __x64_sys_sendmsg+0x78/0xb0 [ 3384.251279] do_syscall_64+0xfd/0x620 [ 3384.255101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3384.260298] RIP: 0033:0x45a6f9 [ 3384.263497] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:26:10 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x43, 0x1c0}]) [ 3384.282751] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3384.290504] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3384.297777] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3384.305051] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3384.312326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3384.319606] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3384.351032] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3384.358122] CPU: 0 PID: 26309 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3384.365924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3384.375284] Call Trace: [ 3384.377890] dump_stack+0x197/0x210 [ 3384.381537] sysfs_warn_dup.cold+0x1c/0x31 [ 3384.385793] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3384.391172] sysfs_create_link+0x65/0xc0 [ 3384.395246] device_add+0x7ce/0x1760 [ 3384.398982] ? get_device_parent.isra.0+0x570/0x570 [ 3384.404138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.409719] wiphy_register+0x16fa/0x21d0 [ 3384.413916] ? show_schedstat+0x832/0xbb0 [ 3384.418965] ? wiphy_unregister+0xfd0/0xfd0 [ 3384.423322] ? rcu_read_lock_sched_held+0x110/0x130 [ 3384.428352] ? __kmalloc+0x5e1/0x750 [ 3384.432074] ? trace_hardirqs_on+0x67/0x220 [ 3384.436409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.441955] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3384.446903] ieee80211_register_hw+0x156e/0x3800 [ 3384.451686] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3384.456546] ? hrtimer_init+0x8b/0x300 [ 3384.460451] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3384.465575] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3384.470605] ? cred_has_capability+0x193/0x320 [ 3384.475226] ? hwsim_exit_net+0xc50/0xc50 [ 3384.479392] ? __mutex_lock+0xa67/0x1300 [ 3384.483479] hwsim_new_radio_nl+0x5eb/0x893 [ 3384.487825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.493371] ? security_capable+0x92/0xc0 [ 3384.497538] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3384.502745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.508291] ? nla_parse+0x1fc/0x2f0 [ 3384.512022] genl_family_rcv_msg+0x6db/0xd30 [ 3384.516452] ? genl_unregister_family+0x790/0x790 [ 3384.521308] ? __local_bh_enable_ip+0x15a/0x270 [ 3384.525985] ? __dev_queue_xmit+0x892/0x2fe0 [ 3384.530422] genl_rcv_msg+0xca/0x170 [ 3384.534155] netlink_rcv_skb+0x17d/0x460 [ 3384.538232] ? genl_family_rcv_msg+0xd30/0xd30 [ 3384.542836] ? netlink_ack+0xb30/0xb30 [ 3384.546771] genl_rcv+0x29/0x40 [ 3384.550065] netlink_unicast+0x53a/0x730 [ 3384.554143] ? netlink_attachskb+0x770/0x770 [ 3384.558572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.564141] netlink_sendmsg+0x8ae/0xd70 [ 3384.568832] ? netlink_unicast+0x730/0x730 [ 3384.573092] ? selinux_socket_sendmsg+0x36/0x40 [ 3384.577951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3384.583507] ? security_socket_sendmsg+0x8d/0xc0 [ 3384.588285] ? netlink_unicast+0x730/0x730 [ 3384.592545] sock_sendmsg+0xd7/0x130 [ 3384.596294] ___sys_sendmsg+0x803/0x920 [ 3384.600289] ? copy_msghdr_from_user+0x430/0x430 [ 3384.605076] ? lock_downgrade+0x880/0x880 [ 3384.609258] ? kasan_check_read+0x11/0x20 [ 3384.613430] ? __fget+0x367/0x540 [ 3384.616917] ? iterate_fd+0x360/0x360 [ 3384.620754] ? lock_downgrade+0x880/0x880 [ 3384.624931] ? __fget_light+0x1a9/0x230 [ 3384.628922] ? __fdget+0x1b/0x20 [ 3384.632301] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3384.637856] __sys_sendmsg+0x105/0x1d0 [ 3384.641768] ? __ia32_sys_shutdown+0x80/0x80 [ 3384.646237] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3384.651048] ? do_syscall_64+0x26/0x620 [ 3384.655036] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3384.660409] ? do_syscall_64+0x26/0x620 [ 3384.664401] __x64_sys_sendmsg+0x78/0xb0 [ 3384.668498] do_syscall_64+0xfd/0x620 [ 3384.672326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3384.677536] RIP: 0033:0x45a6f9 [ 3384.680742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3384.699662] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3384.707383] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3384.714662] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3384.721940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3384.729214] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3384.736489] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3384.769692] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3384.776596] loop3: partition table partially beyond EOD, truncated [ 3384.794096] loop3: p1 start 448 is beyond EOD, truncated [ 3384.806755] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3384.813626] loop3: p3 start 958347629 is beyond EOD, truncated [ 3384.826668] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3384.832913] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3384.839256] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3384.845749] loop3: p7 start 500206790 is beyond EOD, truncated [ 3384.852139] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3384.858216] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3384.864433] loop3: p10 start 13460217 is beyond EOD, truncated 15:26:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x48, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f0000000180)=0xffffff6b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r4 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0xc04c5349, &(0x7f00000000c0)) 15:26:11 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c65000000000000001e3cf0710000000000000000000000000000000200"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x17, 0xd, 0x5, 0x4}, 0x3c) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) bind$packet(r11, &(0x7f0000000100)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000004d4000000000000000", @ANYRES32=r13, @ANYBLOB], 0x25c}}, 0x0) sendmsg$kcm(r8, &(0x7f0000001580)={&(0x7f0000000040)=@hci={0x1f, r13}, 0x80, &(0x7f0000001540)=[{&(0x7f00000012c0)="2b46620351504e36090529700a11f231b69597a2afa44731757816bc2e6cf11e230987880693fdbe8d492b70dec958e4edb77663c5da6237283b92a7242148d9265315465ba2be10be8a", 0x4a}, {&(0x7f0000001340)="6656ed9413e5b3e19f02e6a21d35e02dfb40599814ef3d766074503e26d8a2280340c44b9fcdac162f7d6e361dcb2b067b59aa086e4ec054872e0a7108898e2278d9b6a8d6fd743a7a54476cbc99c5397df42f4cff86d9ddd65592247d358e3cf0d94cb5cb2b40225faccb32c0d480a34353ac6927e953df60944e0d716fa887f581ca6d4184c39ec5557459c0b538baaf90290bc774454a0997cb98dcaac020f1f86491ce4ed224e7f25dc6730f252805ae7c399284ffa34b757b293d7f46adf3a88b5b8d3c6d95c7cf009eefbedaad477290da6536e7e23a825fd64143b911a1abbb66c748b87f93304f6cab083ab8f7d6d6eb012075d8fdb3c899", 0xfc}, {&(0x7f0000001440)="def05062034bef62d7b1c075340e73383c0ebd4e4b2ce82736e792129c7d098601f57be7e0edbf9c76ad42dda3d63bc3273817321f320d942c5f84d55885489c31a2811243a0902628b6598c71a973628bfe7713e21fbf8afc40809b712b6b721b48a6b69150b6139506c76b1870d3b180d8ac156d53d01d89669b84443688376b412f0def054080c77f15fcb9e6cbfebc7a43e8f58a8504fcd398e3c74c927d17322f77b269c5de7e8b5a84dc2f21ccb77459fa82b5b0fe66f55432242ff50bd1dd194c42a45ac20c0714c64700566bdd10acce7a2c5837a8321283013e514eeeef7ca7b20b5737a961f0a8fcd737093391cd", 0xf3}], 0x3}, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x4800}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3384.877373] loop3: p11 start 129726472 is beyond EOD, truncated [ 3384.885039] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3384.891271] loop3: p13 start 471698834 is beyond EOD, truncated [ 3384.897553] loop3: p14 start 3733177086 is beyond EOD, truncated 15:26:11 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x46, 0x1c0}]) [ 3385.014376] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' 15:26:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r4 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0xc04c5349, &(0x7f00000000c0)) [ 3385.091388] CPU: 1 PID: 26549 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3385.099262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3385.108637] Call Trace: [ 3385.111249] dump_stack+0x197/0x210 [ 3385.114910] sysfs_warn_dup.cold+0x1c/0x31 [ 3385.119174] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3385.124561] sysfs_create_link+0x65/0xc0 [ 3385.128642] device_add+0x7ce/0x1760 [ 3385.132376] ? get_device_parent.isra.0+0x570/0x570 [ 3385.137407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.142975] wiphy_register+0x16fa/0x21d0 [ 3385.147168] ? show_schedstat+0x832/0xbb0 [ 3385.151444] ? wiphy_unregister+0xfd0/0xfd0 [ 3385.155823] ? rcu_read_lock_sched_held+0x110/0x130 [ 3385.160863] ? __kmalloc+0x5e1/0x750 [ 3385.164711] ? trace_hardirqs_on+0x67/0x220 [ 3385.169058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.174615] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3385.179591] ieee80211_register_hw+0x156e/0x3800 [ 3385.184387] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3385.189255] ? hrtimer_init+0x8b/0x300 [ 3385.193160] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3385.198288] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3385.203323] ? cred_has_capability+0x193/0x320 [ 3385.207947] ? hwsim_exit_net+0xc50/0xc50 [ 3385.212141] hwsim_new_radio_nl+0x5eb/0x893 [ 3385.216479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.222034] ? security_capable+0x92/0xc0 [ 3385.226199] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3385.231422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.236974] ? nla_parse+0x1fc/0x2f0 [ 3385.240708] genl_family_rcv_msg+0x6db/0xd30 [ 3385.245137] ? genl_unregister_family+0x790/0x790 [ 3385.250006] ? __local_bh_enable_ip+0x15a/0x270 [ 3385.254700] ? __dev_queue_xmit+0x892/0x2fe0 [ 3385.259147] genl_rcv_msg+0xca/0x170 [ 3385.262971] netlink_rcv_skb+0x17d/0x460 [ 3385.267057] ? genl_family_rcv_msg+0xd30/0xd30 [ 3385.271671] ? netlink_ack+0xb30/0xb30 [ 3385.275587] genl_rcv+0x29/0x40 [ 3385.278902] netlink_unicast+0x53a/0x730 [ 3385.282980] ? netlink_attachskb+0x770/0x770 [ 3385.287412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.292967] netlink_sendmsg+0x8ae/0xd70 [ 3385.297042] ? netlink_unicast+0x730/0x730 [ 3385.301296] ? selinux_socket_sendmsg+0x36/0x40 [ 3385.305972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.311532] ? security_socket_sendmsg+0x8d/0xc0 [ 3385.316347] ? netlink_unicast+0x730/0x730 [ 3385.320602] sock_sendmsg+0xd7/0x130 [ 3385.324334] ___sys_sendmsg+0x803/0x920 [ 3385.328331] ? copy_msghdr_from_user+0x430/0x430 [ 3385.333121] ? lock_downgrade+0x880/0x880 [ 3385.337290] ? kasan_check_read+0x11/0x20 15:26:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r4 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0xc04c5349, &(0x7f00000000c0)) 15:26:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r3 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0xc04c5349, &(0x7f00000000c0)) 15:26:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) 15:26:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) [ 3385.341455] ? __fget+0x367/0x540 [ 3385.344923] ? iterate_fd+0x360/0x360 [ 3385.348738] ? lock_downgrade+0x880/0x880 [ 3385.352907] ? __fget_light+0x1a9/0x230 [ 3385.356892] ? __fdget+0x1b/0x20 [ 3385.360267] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3385.365828] __sys_sendmsg+0x105/0x1d0 [ 3385.369739] ? __ia32_sys_shutdown+0x80/0x80 [ 3385.374175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3385.374192] ? do_syscall_64+0x26/0x620 [ 3385.374209] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3385.374220] ? do_syscall_64+0x26/0x620 15:26:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000040)=0x420002, 0x4) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3385.374241] __x64_sys_sendmsg+0x78/0xb0 [ 3385.383321] do_syscall_64+0xfd/0x620 [ 3385.383338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3385.383349] RIP: 0033:0x45a6f9 [ 3385.383365] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3385.383373] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3385.383388] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3385.383397] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3385.383405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3385.383415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3385.383423] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3385.485723] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3385.494938] CPU: 1 PID: 26661 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3385.502789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3385.512160] Call Trace: [ 3385.514777] dump_stack+0x197/0x210 [ 3385.518442] sysfs_warn_dup.cold+0x1c/0x31 [ 3385.522712] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3385.522735] sysfs_create_link+0x65/0xc0 [ 3385.522756] device_add+0x7ce/0x1760 [ 3385.522774] ? get_device_parent.isra.0+0x570/0x570 [ 3385.522793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.536084] wiphy_register+0x16fa/0x21d0 [ 3385.546898] ? show_schedstat+0x832/0xbb0 [ 3385.546922] ? wiphy_unregister+0xfd0/0xfd0 [ 3385.546940] ? rcu_read_lock_sched_held+0x110/0x130 [ 3385.546955] ? __kmalloc+0x5e1/0x750 [ 3385.546970] ? trace_hardirqs_on+0x67/0x220 [ 3385.546988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.547000] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3385.547019] ieee80211_register_hw+0x156e/0x3800 [ 3385.555358] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3385.555380] ? hrtimer_init+0x8b/0x300 [ 3385.555398] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3385.555419] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3385.555433] ? cred_has_capability+0x193/0x320 [ 3385.555458] ? hwsim_exit_net+0xc50/0xc50 [ 3385.615849] ? __mutex_lock+0xa67/0x1300 [ 3385.619947] hwsim_new_radio_nl+0x5eb/0x893 [ 3385.624297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.630033] ? security_capable+0x92/0xc0 [ 3385.634244] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3385.639473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.645026] ? nla_parse+0x1fc/0x2f0 [ 3385.648765] genl_family_rcv_msg+0x6db/0xd30 [ 3385.653198] ? genl_unregister_family+0x790/0x790 [ 3385.658165] ? __local_bh_enable_ip+0x15a/0x270 [ 3385.662855] ? __dev_queue_xmit+0x892/0x2fe0 [ 3385.667297] genl_rcv_msg+0xca/0x170 [ 3385.671029] netlink_rcv_skb+0x17d/0x460 [ 3385.675105] ? genl_family_rcv_msg+0xd30/0xd30 [ 3385.679700] ? netlink_ack+0xb30/0xb30 [ 3385.683611] genl_rcv+0x29/0x40 [ 3385.686899] netlink_unicast+0x53a/0x730 [ 3385.690976] ? netlink_attachskb+0x770/0x770 [ 3385.695399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.700948] netlink_sendmsg+0x8ae/0xd70 [ 3385.705025] ? netlink_unicast+0x730/0x730 [ 3385.709276] ? selinux_socket_sendmsg+0x36/0x40 [ 3385.713953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3385.719497] ? security_socket_sendmsg+0x8d/0xc0 [ 3385.724262] ? netlink_unicast+0x730/0x730 [ 3385.728504] sock_sendmsg+0xd7/0x130 [ 3385.732282] ___sys_sendmsg+0x803/0x920 [ 3385.736270] ? copy_msghdr_from_user+0x430/0x430 [ 3385.741042] ? lock_downgrade+0x880/0x880 [ 3385.745200] ? kasan_check_read+0x11/0x20 [ 3385.749879] ? __fget+0x367/0x540 [ 3385.753352] ? iterate_fd+0x360/0x360 [ 3385.757159] ? lock_downgrade+0x880/0x880 [ 3385.761669] ? __fget_light+0x1a9/0x230 [ 3385.765654] ? __fdget+0x1b/0x20 [ 3385.769034] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3385.774585] __sys_sendmsg+0x105/0x1d0 [ 3385.778485] ? __ia32_sys_shutdown+0x80/0x80 [ 3385.782919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3385.787684] ? do_syscall_64+0x26/0x620 [ 3385.791665] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3385.797035] ? do_syscall_64+0x26/0x620 [ 3385.801053] __x64_sys_sendmsg+0x78/0xb0 [ 3385.805128] do_syscall_64+0xfd/0x620 [ 3385.808946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3385.814842] RIP: 0033:0x45a6f9 [ 3385.818138] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3385.837182] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3385.844919] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3385.852209] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3385.859495] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3385.866790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3385.875118] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3385.910470] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3385.959710] loop3: partition table partially beyond EOD, truncated [ 3385.998978] loop3: p1 start 448 is beyond EOD, truncated [ 3386.019716] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3386.043774] loop3: p3 start 958347629 is beyond EOD, truncated [ 3386.089689] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3386.105035] loop3: p5 start 1813757113 is beyond EOD, truncated 15:26:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x4c, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x4c00}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3386.141754] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3386.200966] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3386.203449] loop3: p7 start 500206790 is beyond EOD, truncated [ 3386.208234] CPU: 1 PID: 26895 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3386.208245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3386.208252] Call Trace: [ 3386.208275] dump_stack+0x197/0x210 [ 3386.208299] sysfs_warn_dup.cold+0x1c/0x31 [ 3386.242000] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3386.242522] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3386.247470] sysfs_create_link+0x65/0xc0 [ 3386.247490] device_add+0x7ce/0x1760 [ 3386.247514] ? get_device_parent.isra.0+0x570/0x570 [ 3386.247528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.247550] wiphy_register+0x16fa/0x21d0 [ 3386.268165] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3386.272444] ? show_schedstat+0x832/0xbb0 [ 3386.272470] ? wiphy_unregister+0xfd0/0xfd0 [ 3386.272488] ? rcu_read_lock_sched_held+0x110/0x130 [ 3386.272502] ? __kmalloc+0x5e1/0x750 [ 3386.272518] ? trace_hardirqs_on+0x67/0x220 [ 3386.282442] loop3: p10 start 13460217 is beyond EOD, truncated [ 3386.282721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.291552] loop3: p11 start 129726472 is beyond EOD, truncated [ 3386.296182] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3386.296203] ieee80211_register_hw+0x156e/0x3800 [ 3386.296229] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3386.296248] ? hrtimer_init+0x8b/0x300 [ 3386.311091] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3386.315910] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3386.315934] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3386.315950] ? cred_has_capability+0x193/0x320 [ 3386.315976] ? hwsim_exit_net+0xc50/0xc50 [ 3386.335680] loop3: p13 start 471698834 is beyond EOD, truncated [ 3386.336653] hwsim_new_radio_nl+0x5eb/0x893 [ 3386.336669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.336684] ? security_capable+0x92/0xc0 [ 3386.346176] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3386.346710] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3386.346735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.346755] ? nla_parse+0x1fc/0x2f0 [ 3386.408149] genl_family_rcv_msg+0x6db/0xd30 [ 3386.412555] ? genl_unregister_family+0x790/0x790 [ 3386.417391] ? __local_bh_enable_ip+0x15a/0x270 [ 3386.422053] ? __dev_queue_xmit+0x892/0x2fe0 [ 3386.426488] genl_rcv_msg+0xca/0x170 [ 3386.430194] netlink_rcv_skb+0x17d/0x460 [ 3386.434249] ? genl_family_rcv_msg+0xd30/0xd30 [ 3386.438834] ? netlink_ack+0xb30/0xb30 [ 3386.442729] genl_rcv+0x29/0x40 [ 3386.446005] netlink_unicast+0x53a/0x730 [ 3386.450083] ? netlink_attachskb+0x770/0x770 [ 3386.454600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.460132] netlink_sendmsg+0x8ae/0xd70 [ 3386.464377] ? netlink_unicast+0x730/0x730 [ 3386.468611] ? selinux_socket_sendmsg+0x36/0x40 [ 3386.473281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.478809] ? security_socket_sendmsg+0x8d/0xc0 [ 3386.484184] ? netlink_unicast+0x730/0x730 [ 3386.488415] sock_sendmsg+0xd7/0x130 [ 3386.492121] ___sys_sendmsg+0x803/0x920 [ 3386.496889] ? copy_msghdr_from_user+0x430/0x430 [ 3386.501656] ? lock_downgrade+0x880/0x880 [ 3386.505801] ? kasan_check_read+0x11/0x20 [ 3386.509948] ? __fget+0x367/0x540 [ 3386.513833] ? iterate_fd+0x360/0x360 [ 3386.517639] ? lock_downgrade+0x880/0x880 [ 3386.521809] ? __fget_light+0x1a9/0x230 [ 3386.525776] ? __fdget+0x1b/0x20 [ 3386.529150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3386.534682] __sys_sendmsg+0x105/0x1d0 [ 3386.538734] ? __ia32_sys_shutdown+0x80/0x80 [ 3386.543502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3386.548254] ? do_syscall_64+0x26/0x620 [ 3386.552269] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3386.557634] ? do_syscall_64+0x26/0x620 [ 3386.561620] __x64_sys_sendmsg+0x78/0xb0 [ 3386.565681] do_syscall_64+0xfd/0x620 [ 3386.570086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3386.575624] RIP: 0033:0x45a6f9 [ 3386.578808] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3386.597696] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3386.605566] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3386.612824] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3386.620082] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3386.627355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3386.634614] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:13 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) 15:26:13 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000380)) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x17, 0x10, 0xf, 0x13, 0x5, 0x7fff, 0x2, 0x92, 0xffffffffffffffff}}) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) mq_notify(r8, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r5, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r10, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r10, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3386.787543] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3386.817117] CPU: 0 PID: 26903 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3386.824967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3386.834454] Call Trace: 15:26:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x530e}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3386.837070] dump_stack+0x197/0x210 [ 3386.840730] sysfs_warn_dup.cold+0x1c/0x31 [ 3386.845015] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3386.850416] sysfs_create_link+0x65/0xc0 [ 3386.854511] device_add+0x7ce/0x1760 [ 3386.858268] ? get_device_parent.isra.0+0x570/0x570 [ 3386.863305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.868872] wiphy_register+0x16fa/0x21d0 [ 3386.873060] ? show_schedstat+0x832/0xbb0 [ 3386.877337] ? wiphy_unregister+0xfd0/0xfd0 [ 3386.881688] ? rcu_read_lock_sched_held+0x110/0x130 [ 3386.886835] ? __kmalloc+0x5e1/0x750 [ 3386.890561] ? trace_hardirqs_on+0x67/0x220 [ 3386.895000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.900592] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3386.905546] ieee80211_register_hw+0x156e/0x3800 [ 3386.910331] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3386.915211] ? hrtimer_init+0x8b/0x300 [ 3386.919116] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3386.924241] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3386.929280] ? cred_has_capability+0x193/0x320 [ 3386.933900] ? hwsim_exit_net+0xc50/0xc50 [ 3386.938175] ? __mutex_lock+0xa67/0x1300 [ 3386.942268] hwsim_new_radio_nl+0x5eb/0x893 [ 3386.946611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.952175] ? security_capable+0x92/0xc0 [ 3386.956348] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3386.961560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.967112] ? nla_parse+0x1fc/0x2f0 [ 3386.970852] genl_family_rcv_msg+0x6db/0xd30 [ 3386.975289] ? genl_unregister_family+0x790/0x790 [ 3386.980151] ? __local_bh_enable_ip+0x15a/0x270 [ 3386.984925] ? __dev_queue_xmit+0x892/0x2fe0 [ 3386.989377] genl_rcv_msg+0xca/0x170 [ 3386.993131] netlink_rcv_skb+0x17d/0x460 [ 3386.997208] ? genl_family_rcv_msg+0xd30/0xd30 [ 3387.001802] ? netlink_ack+0xb30/0xb30 [ 3387.005744] genl_rcv+0x29/0x40 [ 3387.009074] netlink_unicast+0x53a/0x730 [ 3387.013157] ? netlink_attachskb+0x770/0x770 [ 3387.017583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.023145] netlink_sendmsg+0x8ae/0xd70 [ 3387.027223] ? netlink_unicast+0x730/0x730 [ 3387.031569] ? selinux_socket_sendmsg+0x36/0x40 [ 3387.036247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.041802] ? security_socket_sendmsg+0x8d/0xc0 [ 3387.046567] ? netlink_unicast+0x730/0x730 [ 3387.050819] sock_sendmsg+0xd7/0x130 [ 3387.054549] ___sys_sendmsg+0x803/0x920 [ 3387.058543] ? copy_msghdr_from_user+0x430/0x430 [ 3387.063319] ? lock_downgrade+0x880/0x880 [ 3387.067492] ? kasan_check_read+0x11/0x20 [ 3387.071661] ? __fget+0x367/0x540 [ 3387.075398] ? iterate_fd+0x360/0x360 [ 3387.079214] ? lock_downgrade+0x880/0x880 [ 3387.083380] ? __fget_light+0x1a9/0x230 [ 3387.087371] ? __fdget+0x1b/0x20 [ 3387.090753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3387.096316] __sys_sendmsg+0x105/0x1d0 [ 3387.100223] ? __ia32_sys_shutdown+0x80/0x80 [ 3387.104659] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3387.109432] ? do_syscall_64+0x26/0x620 [ 3387.113432] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3387.118809] ? do_syscall_64+0x26/0x620 [ 3387.122808] __x64_sys_sendmsg+0x78/0xb0 [ 3387.126888] do_syscall_64+0xfd/0x620 [ 3387.130742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3387.135963] RIP: 0033:0x45a6f9 [ 3387.139204] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3387.159082] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3387.166823] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3387.174109] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3387.181392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3387.188686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3387.196844] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:13 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1, 0x10}, 0x3c) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x1f, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x9, 0x3, 0x7, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:13 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x4c, 0x1c0}]) 15:26:13 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000001500)={0x9, 0x3, 'client0\x00', 0x2, "3077a500eceda913", "fbffffec8d300bd32e14a0c2f3cc2d4cd8a87c3f36eed4c43e3669a72f6296cc", 0x0, 0xfffffffa}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f00000012c0)=""/235) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:13 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) [ 3387.354346] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3387.378759] CPU: 1 PID: 27104 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3387.386614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3387.396005] Call Trace: [ 3387.396034] dump_stack+0x197/0x210 [ 3387.396059] sysfs_warn_dup.cold+0x1c/0x31 [ 3387.396078] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3387.396097] sysfs_create_link+0x65/0xc0 [ 3387.415957] device_add+0x7ce/0x1760 [ 3387.415982] ? get_device_parent.isra.0+0x570/0x570 [ 3387.416000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.430272] wiphy_register+0x16fa/0x21d0 [ 3387.434435] ? show_schedstat+0x832/0xbb0 [ 3387.438601] ? wiphy_unregister+0xfd0/0xfd0 [ 3387.442940] ? rcu_read_lock_sched_held+0x110/0x130 [ 3387.447972] ? __kmalloc+0x5e1/0x750 [ 3387.451701] ? trace_hardirqs_on+0x67/0x220 [ 3387.456043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.456061] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3387.456081] ieee80211_register_hw+0x156e/0x3800 [ 3387.456105] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3387.466558] ? hrtimer_init+0x8b/0x300 [ 3387.466578] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3387.466600] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3387.466617] ? cred_has_capability+0x193/0x320 [ 3387.494898] ? hwsim_exit_net+0xc50/0xc50 [ 3387.499155] ? __mutex_lock+0xa67/0x1300 [ 3387.503236] hwsim_new_radio_nl+0x5eb/0x893 [ 3387.507566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.513108] ? security_capable+0x92/0xc0 [ 3387.518145] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3387.523364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.529091] ? nla_parse+0x1fc/0x2f0 [ 3387.532830] genl_family_rcv_msg+0x6db/0xd30 [ 3387.537258] ? genl_unregister_family+0x790/0x790 [ 3387.542119] ? __local_bh_enable_ip+0x15a/0x270 [ 3387.546805] ? __dev_queue_xmit+0x892/0x2fe0 [ 3387.551254] genl_rcv_msg+0xca/0x170 [ 3387.554996] netlink_rcv_skb+0x17d/0x460 [ 3387.559070] ? genl_family_rcv_msg+0xd30/0xd30 [ 3387.563662] ? netlink_ack+0xb30/0xb30 [ 3387.567577] genl_rcv+0x29/0x40 [ 3387.570870] netlink_unicast+0x53a/0x730 [ 3387.574949] ? netlink_attachskb+0x770/0x770 [ 3387.579380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.584941] netlink_sendmsg+0x8ae/0xd70 [ 3387.589018] ? netlink_unicast+0x730/0x730 [ 3387.593274] ? selinux_socket_sendmsg+0x36/0x40 [ 3387.597956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.603510] ? security_socket_sendmsg+0x8d/0xc0 [ 3387.608275] ? netlink_unicast+0x730/0x730 [ 3387.612525] sock_sendmsg+0xd7/0x130 [ 3387.616375] ___sys_sendmsg+0x803/0x920 [ 3387.620394] ? copy_msghdr_from_user+0x430/0x430 [ 3387.625188] ? lock_downgrade+0x880/0x880 [ 3387.629367] ? kasan_check_read+0x11/0x20 [ 3387.633530] ? __fget+0x367/0x540 [ 3387.637086] ? iterate_fd+0x360/0x360 [ 3387.640898] ? lock_downgrade+0x880/0x880 [ 3387.645063] ? __fget_light+0x1a9/0x230 [ 3387.649049] ? __fdget+0x1b/0x20 [ 3387.652427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3387.657985] __sys_sendmsg+0x105/0x1d0 [ 3387.661883] ? __ia32_sys_shutdown+0x80/0x80 [ 3387.666316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3387.671083] ? do_syscall_64+0x26/0x620 [ 3387.675154] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3387.680525] ? do_syscall_64+0x26/0x620 [ 3387.684517] __x64_sys_sendmsg+0x78/0xb0 [ 3387.688679] do_syscall_64+0xfd/0x620 [ 3387.692493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3387.697688] RIP: 0033:0x45a6f9 [ 3387.700885] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3387.719796] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3387.727516] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3387.734790] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3387.742063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:26:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x60, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:14 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) r0 = add_key(&(0x7f0000001380)='logon\x00', &(0x7f00000013c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000014c0)=ANY=[@ANYBLOB="6d7a6e676c6500000000000000000000000000000000000000000000000000000200000000000200000000000000000000301e000000000000000000000000000000000000000000d6218d705fe3242e3527887e90e9513759419050ecd0ce2e470530f257c8f1bc27925a59fdd7f19b3d25bca50834ce949a31d70acbcebc75a4dc26b42b3437121c5de5d58923100684c578f6dad8396ce9e4c53cfcf4ca23c847624ec4eeb672fce5ce667d5510dba6002e"], 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001400)="329785163e88f8b306a587150c10913aa0bc42175b75228aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6e5f2741ada36d08745785c02c181053e692f1b1d54831a61a8e5259860cf1630eb3521911a5dd24954a2445631c23b7511f325836a787179317048a1aed96beb2af1f8e1d67fc3e3ed53417a884fb63d4b02b4fb464de036c1611272905db7f87547e457966758", &(0x7f0000001300)="1ef7a143f9b47ca867bd08170dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7ef97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3387.749336] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3387.756612] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3387.783587] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3387.790479] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3387.802079] loop3: partition table partially beyond EOD, truncated [ 3387.818540] CPU: 1 PID: 27176 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3387.826510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3387.835885] Call Trace: [ 3387.838490] dump_stack+0x197/0x210 [ 3387.838524] sysfs_warn_dup.cold+0x1c/0x31 [ 3387.838544] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3387.851789] sysfs_create_link+0x65/0xc0 [ 3387.855883] device_add+0x7ce/0x1760 [ 3387.859611] ? get_device_parent.isra.0+0x570/0x570 [ 3387.859624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.859651] wiphy_register+0x16fa/0x21d0 [ 3387.874344] ? show_schedstat+0x832/0xbb0 [ 3387.875486] loop3: p1 start 448 is beyond EOD, truncated [ 3387.878516] ? wiphy_unregister+0xfd0/0xfd0 [ 3387.878536] ? rcu_read_lock_sched_held+0x110/0x130 [ 3387.878551] ? __kmalloc+0x5e1/0x750 [ 3387.878570] ? trace_hardirqs_on+0x67/0x220 [ 3387.899347] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3387.901376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.901394] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3387.901414] ieee80211_register_hw+0x156e/0x3800 [ 3387.901442] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3387.910965] loop3: p3 start 958347629 is beyond EOD, truncated [ 3387.913037] ? hrtimer_init+0x8b/0x300 [ 3387.913059] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3387.913079] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3387.931009] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3387.933532] ? cred_has_capability+0x193/0x320 [ 3387.933566] ? hwsim_exit_net+0xc50/0xc50 [ 3387.933585] ? __mutex_lock+0xa67/0x1300 [ 3387.937592] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3387.942565] hwsim_new_radio_nl+0x5eb/0x893 [ 3387.942581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.942594] ? security_capable+0x92/0xc0 [ 3387.942610] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3387.942629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.942644] ? nla_parse+0x1fc/0x2f0 [ 3387.948130] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3387.954044] genl_family_rcv_msg+0x6db/0xd30 [ 3387.954068] ? genl_unregister_family+0x790/0x790 [ 3387.954086] ? __local_bh_enable_ip+0x15a/0x270 [ 3387.954102] ? __dev_queue_xmit+0x892/0x2fe0 [ 3387.954131] genl_rcv_msg+0xca/0x170 [ 3387.969653] loop3: p7 start 500206790 is beyond EOD, truncated [ 3387.972920] netlink_rcv_skb+0x17d/0x460 [ 3387.972938] ? genl_family_rcv_msg+0xd30/0xd30 [ 3387.972958] ? netlink_ack+0xb30/0xb30 [ 3387.972985] genl_rcv+0x29/0x40 [ 3387.977416] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3387.982809] netlink_unicast+0x53a/0x730 [ 3387.982830] ? netlink_attachskb+0x770/0x770 [ 3387.982855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.982874] netlink_sendmsg+0x8ae/0xd70 [ 3387.982894] ? netlink_unicast+0x730/0x730 [ 3387.990463] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3387.992211] ? selinux_socket_sendmsg+0x36/0x40 [ 3387.992234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3387.992247] ? security_socket_sendmsg+0x8d/0xc0 [ 3387.992263] ? netlink_unicast+0x730/0x730 [ 3388.009611] loop3: p10 start 13460217 is beyond EOD, truncated [ 3388.011927] sock_sendmsg+0xd7/0x130 [ 3388.011947] ___sys_sendmsg+0x803/0x920 [ 3388.011963] ? copy_msghdr_from_user+0x430/0x430 [ 3388.011985] ? lock_downgrade+0x880/0x880 [ 3388.016957] loop3: p11 start 129726472 is beyond EOD, truncated [ 3388.021483] ? kasan_check_read+0x11/0x20 [ 3388.021505] ? __fget+0x367/0x540 [ 3388.021524] ? iterate_fd+0x360/0x360 [ 3388.021543] ? lock_downgrade+0x880/0x880 [ 3388.021565] ? __fget_light+0x1a9/0x230 [ 3388.026059] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3388.029656] ? __fdget+0x1b/0x20 [ 3388.029672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3388.029693] __sys_sendmsg+0x105/0x1d0 [ 3388.029709] ? __ia32_sys_shutdown+0x80/0x80 [ 3388.029738] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3388.039608] loop3: p13 start 471698834 is beyond EOD, truncated [ 3388.039731] ? do_syscall_64+0x26/0x620 [ 3388.039748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3388.046918] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3388.048361] ? do_syscall_64+0x26/0x620 [ 3388.048389] __x64_sys_sendmsg+0x78/0xb0 [ 3388.048404] do_syscall_64+0xfd/0x620 [ 3388.048424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3388.224307] RIP: 0033:0x45a6f9 [ 3388.227877] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3388.246794] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:14 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) [ 3388.254692] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3388.262043] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3388.269301] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3388.276571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3388.283830] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:14 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x1fc, 0x1c0}]) 15:26:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x6000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3388.497467] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3388.509016] CPU: 1 PID: 27405 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3388.517035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3388.527268] Call Trace: [ 3388.529877] dump_stack+0x197/0x210 [ 3388.533524] sysfs_warn_dup.cold+0x1c/0x31 [ 3388.537771] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3388.543151] sysfs_create_link+0x65/0xc0 [ 3388.547227] device_add+0x7ce/0x1760 [ 3388.551215] ? get_device_parent.isra.0+0x570/0x570 [ 3388.556240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3388.561799] wiphy_register+0x16fa/0x21d0 [ 3388.565959] ? show_schedstat+0x832/0xbb0 [ 3388.570132] ? wiphy_unregister+0xfd0/0xfd0 [ 3388.574470] ? rcu_read_lock_sched_held+0x110/0x130 [ 3388.579496] ? __kmalloc+0x5e1/0x750 [ 3388.583569] ? trace_hardirqs_on+0x67/0x220 [ 3388.587904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3388.593455] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3388.598400] ieee80211_register_hw+0x156e/0x3800 [ 3388.603208] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3388.608072] ? hrtimer_init+0x8b/0x300 [ 3388.611980] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3388.617139] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3388.622163] ? cred_has_capability+0x193/0x320 [ 3388.626795] ? hwsim_exit_net+0xc50/0xc50 [ 3388.630984] ? __mutex_lock+0xa67/0x1300 [ 3388.635084] hwsim_new_radio_nl+0x5eb/0x893 [ 3388.639423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3388.645053] ? security_capable+0x92/0xc0 [ 3388.649237] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3388.655318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3388.660872] ? nla_parse+0x1fc/0x2f0 [ 3388.664612] genl_family_rcv_msg+0x6db/0xd30 [ 3388.669044] ? genl_unregister_family+0x790/0x790 [ 3388.673900] ? __local_bh_enable_ip+0x15a/0x270 [ 3388.678578] ? __dev_queue_xmit+0x892/0x2fe0 [ 3388.683045] genl_rcv_msg+0xca/0x170 [ 3388.686791] netlink_rcv_skb+0x17d/0x460 [ 3388.691315] ? genl_family_rcv_msg+0xd30/0xd30 [ 3388.695921] ? netlink_ack+0xb30/0xb30 [ 3388.699845] genl_rcv+0x29/0x40 [ 3388.703181] netlink_unicast+0x53a/0x730 [ 3388.707259] ? netlink_attachskb+0x770/0x770 [ 3388.711684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3388.717237] netlink_sendmsg+0x8ae/0xd70 [ 3388.721314] ? netlink_unicast+0x730/0x730 [ 3388.725564] ? selinux_socket_sendmsg+0x36/0x40 [ 3388.730244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3388.735787] ? security_socket_sendmsg+0x8d/0xc0 [ 3388.740559] ? netlink_unicast+0x730/0x730 [ 3388.744809] sock_sendmsg+0xd7/0x130 [ 3388.748530] ___sys_sendmsg+0x803/0x920 [ 3388.752515] ? copy_msghdr_from_user+0x430/0x430 [ 3388.757718] ? lock_downgrade+0x880/0x880 [ 3388.761902] ? kasan_check_read+0x11/0x20 [ 3388.766072] ? __fget+0x367/0x540 [ 3388.769541] ? iterate_fd+0x360/0x360 [ 3388.773356] ? lock_downgrade+0x880/0x880 [ 3388.777518] ? __fget_light+0x1a9/0x230 [ 3388.781499] ? __fdget+0x1b/0x20 [ 3388.784870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3388.790424] __sys_sendmsg+0x105/0x1d0 [ 3388.794322] ? __ia32_sys_shutdown+0x80/0x80 [ 3388.798753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3388.803514] ? do_syscall_64+0x26/0x620 [ 3388.807587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3388.812958] ? do_syscall_64+0x26/0x620 [ 3388.816948] __x64_sys_sendmsg+0x78/0xb0 [ 3388.821640] do_syscall_64+0xfd/0x620 [ 3388.825452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3388.830646] RIP: 0033:0x45a6f9 15:26:15 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffff7fff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:15 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) [ 3388.833844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3388.852769] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3388.860490] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3388.867855] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3388.875388] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3388.882752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3388.890201] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x68, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x6800}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3388.922840] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3388.952997] loop3: partition table partially beyond EOD, truncated [ 3388.980557] loop3: p1 start 448 is beyond EOD, truncated [ 3388.997318] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3389.014606] loop3: p3 start 958347629 is beyond EOD, truncated 15:26:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44d, 0x1}, 0x0, 0x0, 0x4, 0x7, 0x0, 0xfffffffe}, 0x0, 0x7, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) write$binfmt_elf64(r9, &(0x7f0000001380)=ANY=[@ANYBLOB="7f454c4608030507800000000000000002003e0062000000f0020000000000004000000000000000aa02000000000000ffffffff090038000200000806007f0005000000010000000300000000000000810000000000000008000000000000000200000000000000ff7f000000000000f00000000000000078826c7691c01114995d24272ccf7f64618b68b806c8e7648a60830f1f0264a82735d5c95f8deea8d2573bdd0ad8b32cc152653632364857c8d7db9acd7a2a7addbdc1a68ccf4d6bb2fd8d521318483000d1543a28aec946af0285f4fb3c600318f1a500"/1748], 0x6db) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x9, 0x0, 0x7f, 0x8001, 0x6, 0xffc, 0x1000, 0x0, 0x7ffffffc, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3389.033520] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3389.055409] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3389.070682] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3389.088866] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3389.096971] loop3: p7 start 500206790 is beyond EOD, truncated [ 3389.103859] CPU: 1 PID: 27547 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3389.111684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3389.121053] Call Trace: [ 3389.123661] dump_stack+0x197/0x210 [ 3389.127318] sysfs_warn_dup.cold+0x1c/0x31 [ 3389.131586] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3389.136973] sysfs_create_link+0x65/0xc0 [ 3389.141071] device_add+0x7ce/0x1760 [ 3389.144818] ? get_device_parent.isra.0+0x570/0x570 [ 3389.144833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.144858] wiphy_register+0x16fa/0x21d0 [ 3389.144876] ? show_schedstat+0x832/0xbb0 [ 3389.155419] ? wiphy_unregister+0xfd0/0xfd0 [ 3389.155438] ? rcu_read_lock_sched_held+0x110/0x130 [ 3389.155453] ? __kmalloc+0x5e1/0x750 [ 3389.155470] ? trace_hardirqs_on+0x67/0x220 [ 3389.181273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.186849] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3389.191803] ieee80211_register_hw+0x156e/0x3800 [ 3389.196587] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3389.201451] ? hrtimer_init+0x8b/0x300 [ 3389.205347] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3389.210468] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3389.215494] ? cred_has_capability+0x193/0x320 [ 3389.220115] ? hwsim_exit_net+0xc50/0xc50 [ 3389.224353] hwsim_new_radio_nl+0x5eb/0x893 [ 3389.228718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.234272] ? security_capable+0x92/0xc0 [ 3389.238441] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3389.243655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.249204] ? nla_parse+0x1fc/0x2f0 [ 3389.252938] genl_family_rcv_msg+0x6db/0xd30 [ 3389.257383] ? genl_unregister_family+0x790/0x790 [ 3389.262256] ? rcu_read_unlock_special+0x679/0xea0 [ 3389.267206] ? find_held_lock+0x35/0x130 [ 3389.271312] genl_rcv_msg+0xca/0x170 [ 3389.275048] netlink_rcv_skb+0x17d/0x460 [ 3389.279126] ? genl_family_rcv_msg+0xd30/0xd30 [ 3389.283723] ? netlink_ack+0xb30/0xb30 [ 3389.287829] genl_rcv+0x29/0x40 [ 3389.291128] netlink_unicast+0x53a/0x730 [ 3389.295213] ? netlink_attachskb+0x770/0x770 [ 3389.299773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.305441] netlink_sendmsg+0x8ae/0xd70 [ 3389.309550] ? netlink_unicast+0x730/0x730 [ 3389.313804] ? selinux_socket_sendmsg+0x36/0x40 [ 3389.318482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.324034] ? security_socket_sendmsg+0x8d/0xc0 [ 3389.328799] ? netlink_unicast+0x730/0x730 [ 3389.333047] sock_sendmsg+0xd7/0x130 [ 3389.336795] ___sys_sendmsg+0x803/0x920 [ 3389.340791] ? copy_msghdr_from_user+0x430/0x430 [ 3389.345561] ? lock_downgrade+0x880/0x880 [ 3389.349728] ? kasan_check_read+0x11/0x20 [ 3389.353889] ? __fget+0x367/0x540 [ 3389.357355] ? iterate_fd+0x360/0x360 [ 3389.361166] ? lock_downgrade+0x880/0x880 [ 3389.365330] ? __fget_light+0x1a9/0x230 [ 3389.369341] ? __fdget+0x1b/0x20 [ 3389.372716] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3389.378287] __sys_sendmsg+0x105/0x1d0 [ 3389.382197] ? __ia32_sys_shutdown+0x80/0x80 [ 3389.386632] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3389.391413] ? do_syscall_64+0x26/0x620 [ 3389.395396] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3389.400768] ? do_syscall_64+0x26/0x620 [ 3389.404760] __x64_sys_sendmsg+0x78/0xb0 [ 3389.408840] do_syscall_64+0xfd/0x620 [ 3389.412651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3389.417849] RIP: 0033:0x45a6f9 [ 3389.421061] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3389.440598] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3389.448596] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3389.455892] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3389.463195] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3389.470569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3389.477873] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:15 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x4800) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) 15:26:15 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe877, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x4, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8e6e90ede2f3b31d) socket(0x11, 0x80002, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000001fc80000000000000000000200004fcd55257814d500000000000000000000000000000000000000000000000000000300"/79], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x10, 0x3ff, 0x4000000000000800, 0x1}, 0x3c) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0xfffffffffffffffe, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x88, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f2, 0x0, 0x0, 0x7, 0x5, 0x2}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3389.501858] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3389.513984] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3389.521879] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3389.549650] CPU: 1 PID: 27551 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3389.557512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3389.566885] Call Trace: [ 3389.566911] dump_stack+0x197/0x210 [ 3389.566939] sysfs_warn_dup.cold+0x1c/0x31 [ 3389.571281] loop3: p10 start 13460217 is beyond EOD, truncated [ 3389.573150] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3389.573175] sysfs_create_link+0x65/0xc0 [ 3389.593005] device_add+0x7ce/0x1760 [ 3389.594956] loop3: p11 start 129726472 is beyond EOD, truncated [ 3389.596745] ? get_device_parent.isra.0+0x570/0x570 [ 3389.596764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.613564] wiphy_register+0x16fa/0x21d0 [ 3389.617739] ? show_schedstat+0x832/0xbb0 [ 3389.621913] ? wiphy_unregister+0xfd0/0xfd0 [ 3389.622004] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3389.626247] ? rcu_read_lock_sched_held+0x110/0x130 [ 3389.626264] ? __kmalloc+0x5e1/0x750 [ 3389.626279] ? trace_hardirqs_on+0x67/0x220 [ 3389.626295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.626312] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3389.650913] loop3: p13 start 471698834 is beyond EOD, truncated [ 3389.651037] ieee80211_register_hw+0x156e/0x3800 [ 3389.651065] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3389.666177] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3389.669603] ? hrtimer_init+0x8b/0x300 [ 3389.669623] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3389.669643] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3389.669656] ? cred_has_capability+0x193/0x320 [ 3389.669681] ? hwsim_exit_net+0xc50/0xc50 [ 3389.669700] ? __mutex_lock+0xa67/0x1300 [ 3389.708823] hwsim_new_radio_nl+0x5eb/0x893 [ 3389.713237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.718772] ? security_capable+0x92/0xc0 [ 3389.722918] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3389.728116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.733655] ? nla_parse+0x1fc/0x2f0 [ 3389.737364] genl_family_rcv_msg+0x6db/0xd30 [ 3389.741866] ? genl_unregister_family+0x790/0x790 [ 3389.746700] ? __local_bh_enable_ip+0x15a/0x270 [ 3389.751511] ? __dev_queue_xmit+0x892/0x2fe0 [ 3389.755965] genl_rcv_msg+0xca/0x170 [ 3389.759691] netlink_rcv_skb+0x17d/0x460 [ 3389.763794] ? genl_family_rcv_msg+0xd30/0xd30 [ 3389.768379] ? netlink_ack+0xb30/0xb30 [ 3389.772275] genl_rcv+0x29/0x40 [ 3389.775573] netlink_unicast+0x53a/0x730 [ 3389.779633] ? netlink_attachskb+0x770/0x770 [ 3389.784038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.789568] netlink_sendmsg+0x8ae/0xd70 [ 3389.793625] ? netlink_unicast+0x730/0x730 [ 3389.797869] ? selinux_socket_sendmsg+0x36/0x40 [ 3389.802527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3389.808057] ? security_socket_sendmsg+0x8d/0xc0 [ 3389.812826] ? netlink_unicast+0x730/0x730 [ 3389.817055] sock_sendmsg+0xd7/0x130 [ 3389.820764] ___sys_sendmsg+0x803/0x920 [ 3389.824733] ? copy_msghdr_from_user+0x430/0x430 [ 3389.829502] ? lock_downgrade+0x880/0x880 [ 3389.833750] ? kasan_check_read+0x11/0x20 [ 3389.837894] ? __fget+0x367/0x540 [ 3389.841340] ? iterate_fd+0x360/0x360 [ 3389.845159] ? lock_downgrade+0x880/0x880 [ 3389.849318] ? __fget_light+0x1a9/0x230 [ 3389.853299] ? __fdget+0x1b/0x20 [ 3389.856664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3389.863158] __sys_sendmsg+0x105/0x1d0 [ 3389.867042] ? __ia32_sys_shutdown+0x80/0x80 [ 3389.871451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3389.876198] ? do_syscall_64+0x26/0x620 [ 3389.880161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3389.885532] ? do_syscall_64+0x26/0x620 [ 3389.889531] __x64_sys_sendmsg+0x78/0xb0 [ 3389.893616] do_syscall_64+0xfd/0x620 [ 3389.898035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3389.903221] RIP: 0033:0x45a6f9 [ 3389.906411] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3389.925303] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3389.933002] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3389.940268] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3389.947531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3389.954785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3389.962042] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x6c00}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:16 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) 15:26:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x6c, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3390.140540] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3390.185169] CPU: 1 PID: 27904 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3390.193030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3390.202383] Call Trace: [ 3390.202408] dump_stack+0x197/0x210 [ 3390.202432] sysfs_warn_dup.cold+0x1c/0x31 [ 3390.202449] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3390.202468] sysfs_create_link+0x65/0xc0 [ 3390.222348] device_add+0x7ce/0x1760 [ 3390.226081] ? get_device_parent.isra.0+0x570/0x570 [ 3390.231108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.236678] wiphy_register+0x16fa/0x21d0 [ 3390.240840] ? show_schedstat+0x832/0xbb0 [ 3390.245040] ? wiphy_unregister+0xfd0/0xfd0 [ 3390.249393] ? rcu_read_lock_sched_held+0x110/0x130 [ 3390.254417] ? __kmalloc+0x5e1/0x750 [ 3390.258139] ? trace_hardirqs_on+0x67/0x220 [ 3390.262470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.268014] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3390.272953] ieee80211_register_hw+0x156e/0x3800 [ 3390.277737] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3390.282593] ? hrtimer_init+0x8b/0x300 [ 3390.286489] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3390.291604] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3390.296627] ? cred_has_capability+0x193/0x320 [ 3390.301236] ? hwsim_exit_net+0xc50/0xc50 [ 3390.305407] hwsim_new_radio_nl+0x5eb/0x893 [ 3390.309733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.315273] ? security_capable+0x92/0xc0 [ 3390.319429] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3390.324634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.330179] ? nla_parse+0x1fc/0x2f0 [ 3390.333907] genl_family_rcv_msg+0x6db/0xd30 [ 3390.338332] ? genl_unregister_family+0x790/0x790 [ 3390.343192] ? __local_bh_enable_ip+0x15a/0x270 [ 3390.347870] ? __dev_queue_xmit+0x892/0x2fe0 [ 3390.352305] genl_rcv_msg+0xca/0x170 [ 3390.356053] netlink_rcv_skb+0x17d/0x460 [ 3390.360142] ? genl_family_rcv_msg+0xd30/0xd30 [ 3390.364862] ? netlink_ack+0xb30/0xb30 [ 3390.368788] genl_rcv+0x29/0x40 [ 3390.372084] netlink_unicast+0x53a/0x730 [ 3390.376174] ? netlink_attachskb+0x770/0x770 [ 3390.380596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.386146] netlink_sendmsg+0x8ae/0xd70 [ 3390.390219] ? netlink_unicast+0x730/0x730 [ 3390.394474] ? selinux_socket_sendmsg+0x36/0x40 [ 3390.399146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.404689] ? security_socket_sendmsg+0x8d/0xc0 [ 3390.409452] ? netlink_unicast+0x730/0x730 [ 3390.413691] sock_sendmsg+0xd7/0x130 [ 3390.417414] ___sys_sendmsg+0x803/0x920 [ 3390.421398] ? copy_msghdr_from_user+0x430/0x430 [ 3390.426188] ? lock_downgrade+0x880/0x880 [ 3390.431148] ? kasan_check_read+0x11/0x20 [ 3390.435310] ? __fget+0x367/0x540 [ 3390.438798] ? iterate_fd+0x360/0x360 [ 3390.442614] ? lock_downgrade+0x880/0x880 [ 3390.446782] ? __fget_light+0x1a9/0x230 [ 3390.450769] ? __fdget+0x1b/0x20 [ 3390.454154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3390.459710] __sys_sendmsg+0x105/0x1d0 [ 3390.463614] ? __ia32_sys_shutdown+0x80/0x80 [ 3390.468050] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3390.472817] ? do_syscall_64+0x26/0x620 [ 3390.476979] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3390.482436] ? do_syscall_64+0x26/0x620 [ 3390.486426] __x64_sys_sendmsg+0x78/0xb0 [ 3390.490497] do_syscall_64+0xfd/0x620 [ 3390.494312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3390.499503] RIP: 0033:0x45a6f9 [ 3390.502711] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3390.521631] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3390.529352] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:16 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0xa}]) 15:26:16 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000012c0)="2701d07affd3615c6a627d19860eca3915200be3e0c6b6afb74e48b4b443bea1527df12afc899006c2a355823de59981d0caa12f9aa0aa6c0534d7b9a34b19c61c770431e18e64eb260aa73b641d09a87b300551c44860e8dec1169e61cfa189873c6fd13cdca7d26ab159197abe8648df3c1785a636c9d49976d392b4404d7b815ed9d4cbd106191e7d11ae335233daa24c13b1ab6020d646704795a907ca59e0e915f91f5f2e926abb279ef00b0a0c1093d2cc8058dad42fe5ba790966910e6be226d4c0b11bed6f0b99a8af3c1f01", 0xd0, 0xfffffffffffffff8) keyctl$read(0xb, r0, &(0x7f00000013c0)=""/233, 0xe9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000014c0)='/dev/input/mouse#\x00', 0xfff, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r7, r8) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r10 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r9, r10) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a40)=ANY=[@ANYRES16=r10, @ANYPTR64=&(0x7f0000001a00)=ANY=[@ANYRESDEC=r2, @ANYPTR=&(0x7f00000019c0)=ANY=[], @ANYRESDEC=r0]], 0x2}, 0x1, 0x0, 0x0, 0xc2b7c5c7b3d631f0}, 0x0) bind$packet(r1, &(0x7f0000001500)={0x11, 0xd, r6, 0x1, 0x0, 0x6, @random="52c57a455a9b"}, 0x14) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r11 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r12 = syz_open_dev$video(0x0, 0x0, 0x0) r13 = dup2(r11, r12) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r13, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r15 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r16 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r17 = dup2(r15, r16) ioctl$RTC_UIE_ON(r17, 0x7003) mq_notify(r17, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r14, &(0x7f0000001540)="74b510f550bfb3a85e1c184ed047503d13a4c2a0184ee8e927306166974e6243aa042512d9fff5005b4ef8909600"/55, &(0x7f0000001580)="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"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r14, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r18 = semget$private(0x0, 0x4, 0x0) semop(r18, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:16 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000001440)=@urb_type_control={0x2, {0xd}, 0x1, 0x1, &(0x7f0000000080)={0x40, 0x11, 0x100, 0xff, 0xffff}, 0x8, 0x1000, 0x9, 0x0, 0x5fce, 0x1, &(0x7f0000001380)="89ae865e2e42e0cd9fc9316d9e645e55f891e67c8837893756d9f82e6ad43d95379800293e6892b60e710f4e051601f195acc2c4d69e56b40da3dbbffb7f6b99c60f36ed710a662c8d32dcd855e0db84d607a6495d24860f418727a086ec2c13f876d06cf3f20e5cb87321e29648dadb44cf7d5cf878d4b500579311fbef51a0ed2278c9efbc945f2d592363c8"}) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:16 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) [ 3390.536627] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3390.543901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3390.551177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3390.558446] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3390.585448] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3390.630853] CPU: 1 PID: 27916 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3390.638733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3390.648117] Call Trace: [ 3390.654329] dump_stack+0x197/0x210 [ 3390.657992] sysfs_warn_dup.cold+0x1c/0x31 [ 3390.662254] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3390.667640] sysfs_create_link+0x65/0xc0 [ 3390.671884] device_add+0x7ce/0x1760 [ 3390.675624] ? get_device_parent.isra.0+0x570/0x570 [ 3390.680660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.686246] wiphy_register+0x16fa/0x21d0 [ 3390.690609] ? show_schedstat+0x832/0xbb0 [ 3390.694812] ? wiphy_unregister+0xfd0/0xfd0 [ 3390.699149] ? rcu_read_lock_sched_held+0x110/0x130 [ 3390.704186] ? __kmalloc+0x5e1/0x750 [ 3390.707909] ? trace_hardirqs_on+0x67/0x220 [ 3390.712248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.717798] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3390.722750] ieee80211_register_hw+0x156e/0x3800 [ 3390.727543] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3390.732429] ? hrtimer_init+0x8b/0x300 [ 3390.736340] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3390.741464] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3390.746490] ? cred_has_capability+0x193/0x320 [ 3390.751109] ? hwsim_exit_net+0xc50/0xc50 [ 3390.755288] ? mutex_spin_on_owner+0x1e5/0x330 [ 3390.759892] hwsim_new_radio_nl+0x5eb/0x893 [ 3390.764217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.769763] ? security_capable+0x92/0xc0 [ 3390.773920] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3390.779132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.785028] ? nla_parse+0x1fc/0x2f0 [ 3390.788854] genl_family_rcv_msg+0x6db/0xd30 [ 3390.793279] ? genl_unregister_family+0x790/0x790 [ 3390.798132] ? __local_bh_enable_ip+0x15a/0x270 [ 3390.802812] ? __dev_queue_xmit+0x892/0x2fe0 [ 3390.807248] genl_rcv_msg+0xca/0x170 [ 3390.810971] netlink_rcv_skb+0x17d/0x460 [ 3390.815059] ? genl_family_rcv_msg+0xd30/0xd30 [ 3390.819672] ? netlink_ack+0xb30/0xb30 [ 3390.823607] genl_rcv+0x29/0x40 [ 3390.826911] netlink_unicast+0x53a/0x730 [ 3390.830995] ? netlink_attachskb+0x770/0x770 [ 3390.835437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.840994] netlink_sendmsg+0x8ae/0xd70 [ 3390.845073] ? netlink_unicast+0x730/0x730 [ 3390.849325] ? selinux_socket_sendmsg+0x36/0x40 [ 3390.854000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3390.859550] ? security_socket_sendmsg+0x8d/0xc0 [ 3390.864337] ? netlink_unicast+0x730/0x730 [ 3390.868586] sock_sendmsg+0xd7/0x130 [ 3390.872329] ___sys_sendmsg+0x803/0x920 [ 3390.876324] ? copy_msghdr_from_user+0x430/0x430 [ 3390.881094] ? lock_downgrade+0x880/0x880 [ 3390.885269] ? kasan_check_read+0x11/0x20 [ 3390.889433] ? __fget+0x367/0x540 [ 3390.893102] ? iterate_fd+0x360/0x360 [ 3390.896931] ? lock_downgrade+0x880/0x880 [ 3390.901093] ? __fget_light+0x1a9/0x230 [ 3390.905075] ? __fdget+0x1b/0x20 [ 3390.908881] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3390.914429] __sys_sendmsg+0x105/0x1d0 [ 3390.918331] ? __ia32_sys_shutdown+0x80/0x80 [ 3390.922763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3390.927546] ? do_syscall_64+0x26/0x620 [ 3390.931528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3390.936901] ? do_syscall_64+0x26/0x620 [ 3390.940899] __x64_sys_sendmsg+0x78/0xb0 [ 3390.944978] do_syscall_64+0xfd/0x620 [ 3390.948791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3390.953983] RIP: 0033:0x45a6f9 [ 3390.957182] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:26:16 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) [ 3390.976796] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3390.984514] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3390.991963] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3390.999236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3391.006512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3391.013785] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x7400}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:17 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x63}]) 15:26:17 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) 15:26:17 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x4, 0x0, 0x8, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) r7 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x101000, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000001380)={0x0, 0x3, 0x0, 0x400}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x260039d532bfa9c8) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x74, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3391.315977] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3391.323792] CPU: 1 PID: 28157 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3391.331603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3391.340966] Call Trace: [ 3391.343572] dump_stack+0x197/0x210 [ 3391.347229] sysfs_warn_dup.cold+0x1c/0x31 [ 3391.351488] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3391.356869] sysfs_create_link+0x65/0xc0 [ 3391.360947] device_add+0x7ce/0x1760 [ 3391.364688] ? get_device_parent.isra.0+0x570/0x570 [ 3391.369715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.375274] wiphy_register+0x16fa/0x21d0 [ 3391.379435] ? show_schedstat+0x832/0xbb0 [ 3391.383600] ? wiphy_unregister+0xfd0/0xfd0 [ 3391.387943] ? rcu_read_lock_sched_held+0x110/0x130 [ 3391.392963] ? __kmalloc+0x5e1/0x750 [ 3391.396684] ? trace_hardirqs_on+0x67/0x220 [ 3391.401031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.406757] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3391.411697] ieee80211_register_hw+0x156e/0x3800 [ 3391.416474] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3391.421327] ? hrtimer_init+0x8b/0x300 [ 3391.425220] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3391.430502] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3391.435533] ? cred_has_capability+0x193/0x320 [ 3391.440156] ? hwsim_exit_net+0xc50/0xc50 [ 3391.444341] hwsim_new_radio_nl+0x5eb/0x893 [ 3391.448680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.454230] ? security_capable+0x92/0xc0 [ 3391.458393] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3391.463618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.469162] ? nla_parse+0x1fc/0x2f0 [ 3391.472893] genl_family_rcv_msg+0x6db/0xd30 [ 3391.477314] ? genl_unregister_family+0x790/0x790 [ 3391.482169] ? __local_bh_enable_ip+0x15a/0x270 [ 3391.486848] ? __dev_queue_xmit+0x892/0x2fe0 [ 3391.491281] genl_rcv_msg+0xca/0x170 [ 3391.495006] netlink_rcv_skb+0x17d/0x460 [ 3391.499072] ? genl_family_rcv_msg+0xd30/0xd30 [ 3391.503767] ? netlink_ack+0xb30/0xb30 [ 3391.507681] genl_rcv+0x29/0x40 [ 3391.510974] netlink_unicast+0x53a/0x730 [ 3391.515066] ? netlink_attachskb+0x770/0x770 [ 3391.519484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.525036] netlink_sendmsg+0x8ae/0xd70 [ 3391.529115] ? netlink_unicast+0x730/0x730 [ 3391.533375] ? selinux_socket_sendmsg+0x36/0x40 [ 3391.538145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.543694] ? security_socket_sendmsg+0x8d/0xc0 [ 3391.548459] ? netlink_unicast+0x730/0x730 [ 3391.552714] sock_sendmsg+0xd7/0x130 [ 3391.556438] ___sys_sendmsg+0x803/0x920 [ 3391.560430] ? copy_msghdr_from_user+0x430/0x430 [ 3391.565221] ? lock_downgrade+0x880/0x880 [ 3391.569391] ? kasan_check_read+0x11/0x20 [ 3391.573697] ? __fget+0x367/0x540 [ 3391.577170] ? iterate_fd+0x360/0x360 [ 3391.581018] ? lock_downgrade+0x880/0x880 [ 3391.585190] ? __fget_light+0x1a9/0x230 [ 3391.589183] ? __fdget+0x1b/0x20 [ 3391.592588] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3391.598170] __sys_sendmsg+0x105/0x1d0 [ 3391.602069] ? __ia32_sys_shutdown+0x80/0x80 [ 3391.606517] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3391.611289] ? do_syscall_64+0x26/0x620 [ 3391.615276] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3391.620729] ? do_syscall_64+0x26/0x620 [ 3391.624720] __x64_sys_sendmsg+0x78/0xb0 [ 3391.628800] do_syscall_64+0xfd/0x620 [ 3391.632611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3391.637805] RIP: 0033:0x45a6f9 [ 3391.641011] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3391.660048] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:17 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) [ 3391.667857] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3391.675136] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3391.682417] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3391.689690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3391.696983] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:18 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x124}]) 15:26:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x7a00}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3391.780166] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3391.818508] CPU: 0 PID: 28162 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3391.826359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3391.835732] Call Trace: [ 3391.838355] dump_stack+0x197/0x210 [ 3391.842013] sysfs_warn_dup.cold+0x1c/0x31 [ 3391.846361] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3391.851755] sysfs_create_link+0x65/0xc0 [ 3391.855843] device_add+0x7ce/0x1760 [ 3391.859600] ? get_device_parent.isra.0+0x570/0x570 [ 3391.864636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.870207] wiphy_register+0x16fa/0x21d0 [ 3391.874381] ? show_schedstat+0x832/0xbb0 [ 3391.878553] ? wiphy_unregister+0xfd0/0xfd0 [ 3391.882921] ? rcu_read_lock_sched_held+0x110/0x130 [ 3391.888067] ? __kmalloc+0x5e1/0x750 [ 3391.891813] ? trace_hardirqs_on+0x67/0x220 [ 3391.896251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.901814] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3391.906770] ieee80211_register_hw+0x156e/0x3800 [ 3391.911562] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3391.917301] ? hrtimer_init+0x8b/0x300 [ 3391.917326] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3391.926341] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3391.931375] ? cred_has_capability+0x193/0x320 [ 3391.935987] ? hwsim_exit_net+0xc50/0xc50 [ 3391.940159] hwsim_new_radio_nl+0x5eb/0x893 [ 3391.940175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.940186] ? security_capable+0x92/0xc0 [ 3391.940202] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3391.940223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3391.940235] ? nla_parse+0x1fc/0x2f0 [ 3391.940256] genl_family_rcv_msg+0x6db/0xd30 [ 3391.940279] ? genl_unregister_family+0x790/0x790 [ 3391.959474] ? __local_bh_enable_ip+0x15a/0x270 [ 3391.959492] ? __dev_queue_xmit+0x892/0x2fe0 [ 3391.959528] genl_rcv_msg+0xca/0x170 [ 3391.959547] netlink_rcv_skb+0x17d/0x460 [ 3391.959567] ? genl_family_rcv_msg+0xd30/0xd30 [ 3391.959584] ? netlink_ack+0xb30/0xb30 [ 3391.973275] genl_rcv+0x29/0x40 [ 3391.973294] netlink_unicast+0x53a/0x730 [ 3392.010781] ? netlink_attachskb+0x770/0x770 [ 3392.015213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.020773] netlink_sendmsg+0x8ae/0xd70 [ 3392.024858] ? netlink_unicast+0x730/0x730 [ 3392.029375] ? selinux_socket_sendmsg+0x36/0x40 [ 3392.036328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.041968] ? security_socket_sendmsg+0x8d/0xc0 [ 3392.046744] ? netlink_unicast+0x730/0x730 [ 3392.050995] sock_sendmsg+0xd7/0x130 [ 3392.054728] ___sys_sendmsg+0x803/0x920 [ 3392.058720] ? copy_msghdr_from_user+0x430/0x430 [ 3392.058742] ? lock_downgrade+0x880/0x880 [ 3392.067643] ? kasan_check_read+0x11/0x20 [ 3392.071809] ? __fget+0x367/0x540 [ 3392.071828] ? iterate_fd+0x360/0x360 [ 3392.071846] ? lock_downgrade+0x880/0x880 [ 3392.071866] ? __fget_light+0x1a9/0x230 [ 3392.071880] ? __fdget+0x1b/0x20 [ 3392.071892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3392.071913] __sys_sendmsg+0x105/0x1d0 [ 3392.100021] ? __ia32_sys_shutdown+0x80/0x80 [ 3392.104471] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3392.109268] ? do_syscall_64+0x26/0x620 [ 3392.113251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3392.118621] ? do_syscall_64+0x26/0x620 [ 3392.122612] __x64_sys_sendmsg+0x78/0xb0 [ 3392.126698] do_syscall_64+0xfd/0x620 [ 3392.130608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3392.135798] RIP: 0033:0x45a6f9 [ 3392.139083] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3392.158090] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3392.165844] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3392.173216] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 15:26:18 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x2, 0x8}}, 0x1a5) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0), 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000040)=0xffff8000, 0x4) r4 = syz_open_dev$video(0x0, 0x0, 0x0) r5 = dup2(r0, r4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d6160676c65000000000000000000000000000000005a47785526e3a01400000200"/72], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:18 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc04c5349, &(0x7f00000000c0)) 15:26:18 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x893c3000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3392.180706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3392.187993] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3392.195280] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3392.229846] Dev loop3: unable to read RDB block 1 [ 3392.242238] loop3: unable to read partition table [ 3392.279146] loop3: partition table beyond EOD, truncated [ 3392.309754] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:18 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3392.372334] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3392.407866] CPU: 0 PID: 28393 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3392.415742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3392.415748] Call Trace: [ 3392.415773] dump_stack+0x197/0x210 [ 3392.415796] sysfs_warn_dup.cold+0x1c/0x31 [ 3392.435685] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3392.441103] sysfs_create_link+0x65/0xc0 [ 3392.445184] device_add+0x7ce/0x1760 [ 3392.445210] ? get_device_parent.isra.0+0x570/0x570 [ 3392.453929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.453954] wiphy_register+0x16fa/0x21d0 [ 3392.463727] ? show_schedstat+0x832/0xbb0 [ 3392.463752] ? wiphy_unregister+0xfd0/0xfd0 [ 3392.463772] ? rcu_read_lock_sched_held+0x110/0x130 [ 3392.472224] ? __kmalloc+0x5e1/0x750 [ 3392.472240] ? trace_hardirqs_on+0x67/0x220 [ 3392.472258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.472272] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3392.472290] ieee80211_register_hw+0x156e/0x3800 [ 3392.472313] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3392.472333] ? hrtimer_init+0x8b/0x300 [ 3392.481062] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3392.481085] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3392.481098] ? cred_has_capability+0x193/0x320 [ 3392.481124] ? hwsim_exit_net+0xc50/0xc50 [ 3392.481140] ? __mutex_lock+0xa67/0x1300 [ 3392.481161] hwsim_new_radio_nl+0x5eb/0x893 [ 3392.481178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.542812] ? security_capable+0x92/0xc0 [ 3392.546983] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3392.552190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.557733] ? nla_parse+0x1fc/0x2f0 [ 3392.561465] genl_family_rcv_msg+0x6db/0xd30 [ 3392.565910] ? genl_unregister_family+0x790/0x790 [ 3392.570764] ? __local_bh_enable_ip+0x15a/0x270 [ 3392.575448] ? __dev_queue_xmit+0x892/0x2fe0 [ 3392.579885] genl_rcv_msg+0xca/0x170 [ 3392.583701] netlink_rcv_skb+0x17d/0x460 [ 3392.587774] ? genl_family_rcv_msg+0xd30/0xd30 [ 3392.592372] ? netlink_ack+0xb30/0xb30 [ 3392.596310] genl_rcv+0x29/0x40 [ 3392.599605] netlink_unicast+0x53a/0x730 [ 3392.603682] ? netlink_attachskb+0x770/0x770 [ 3392.608108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.613660] netlink_sendmsg+0x8ae/0xd70 [ 3392.617748] ? netlink_unicast+0x730/0x730 [ 3392.622016] ? selinux_socket_sendmsg+0x36/0x40 [ 3392.626695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.632275] ? security_socket_sendmsg+0x8d/0xc0 [ 3392.637045] ? netlink_unicast+0x730/0x730 [ 3392.641418] sock_sendmsg+0xd7/0x130 [ 3392.645149] ___sys_sendmsg+0x803/0x920 [ 3392.649150] ? copy_msghdr_from_user+0x430/0x430 [ 3392.653942] ? lock_downgrade+0x880/0x880 [ 3392.658130] ? kasan_check_read+0x11/0x20 [ 3392.662294] ? __fget+0x367/0x540 [ 3392.665760] ? iterate_fd+0x360/0x360 [ 3392.669600] ? lock_downgrade+0x880/0x880 [ 3392.673771] ? __fget_light+0x1a9/0x230 [ 3392.677759] ? __fdget+0x1b/0x20 [ 3392.681134] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3392.686694] __sys_sendmsg+0x105/0x1d0 [ 3392.690595] ? __ia32_sys_shutdown+0x80/0x80 [ 3392.695027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3392.699788] ? do_syscall_64+0x26/0x620 [ 3392.703776] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3392.709159] ? do_syscall_64+0x26/0x620 [ 3392.713146] __x64_sys_sendmsg+0x78/0xb0 [ 3392.717216] do_syscall_64+0xfd/0x620 [ 3392.721032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3392.726224] RIP: 0033:0x45a6f9 [ 3392.729417] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3392.748412] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3392.756128] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3392.763402] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 15:26:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x7a, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:19 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x19f}]) [ 3392.770678] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3392.777954] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3392.785243] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3392.843383] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3392.858785] CPU: 1 PID: 28404 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3392.866979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3392.876331] Call Trace: [ 3392.878930] dump_stack+0x197/0x210 [ 3392.882555] sysfs_warn_dup.cold+0x1c/0x31 [ 3392.886789] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3392.892167] sysfs_create_link+0x65/0xc0 [ 3392.896221] device_add+0x7ce/0x1760 [ 3392.899940] ? get_device_parent.isra.0+0x570/0x570 [ 3392.904960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.910499] wiphy_register+0x16fa/0x21d0 [ 3392.914655] ? show_schedstat+0x832/0xbb0 [ 3392.920281] ? wiphy_unregister+0xfd0/0xfd0 [ 3392.924596] ? rcu_read_lock_sched_held+0x110/0x130 [ 3392.929602] ? __kmalloc+0x5e1/0x750 [ 3392.933301] ? trace_hardirqs_on+0x67/0x220 [ 3392.937612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.943138] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3392.948059] ieee80211_register_hw+0x156e/0x3800 [ 3392.952840] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3392.957684] ? hrtimer_init+0x8b/0x300 [ 3392.961571] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3392.966700] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3392.971730] ? cred_has_capability+0x193/0x320 [ 3392.976856] ? hwsim_exit_net+0xc50/0xc50 [ 3392.981104] hwsim_new_radio_nl+0x5eb/0x893 [ 3392.985432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3392.990968] ? security_capable+0x92/0xc0 [ 3392.995105] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3393.000298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.005821] ? nla_parse+0x1fc/0x2f0 [ 3393.009541] genl_family_rcv_msg+0x6db/0xd30 [ 3393.013942] ? genl_unregister_family+0x790/0x790 [ 3393.018773] ? __local_bh_enable_ip+0x15a/0x270 [ 3393.023442] ? __dev_queue_xmit+0x892/0x2fe0 [ 3393.027850] genl_rcv_msg+0xca/0x170 [ 3393.031568] netlink_rcv_skb+0x17d/0x460 [ 3393.035621] ? genl_family_rcv_msg+0xd30/0xd30 [ 3393.040203] ? netlink_ack+0xb30/0xb30 [ 3393.044090] genl_rcv+0x29/0x40 [ 3393.047358] netlink_unicast+0x53a/0x730 [ 3393.051411] ? netlink_attachskb+0x770/0x770 [ 3393.055827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.061357] netlink_sendmsg+0x8ae/0xd70 [ 3393.065423] ? netlink_unicast+0x730/0x730 [ 3393.069652] ? selinux_socket_sendmsg+0x36/0x40 [ 3393.074307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.079841] ? security_socket_sendmsg+0x8d/0xc0 [ 3393.084680] ? netlink_unicast+0x730/0x730 [ 3393.088921] sock_sendmsg+0xd7/0x130 [ 3393.092625] ___sys_sendmsg+0x803/0x920 [ 3393.096685] ? copy_msghdr_from_user+0x430/0x430 [ 3393.101443] ? lock_downgrade+0x880/0x880 [ 3393.105670] ? kasan_check_read+0x11/0x20 [ 3393.109813] ? __fget+0x367/0x540 [ 3393.113257] ? iterate_fd+0x360/0x360 [ 3393.117049] ? lock_downgrade+0x880/0x880 [ 3393.121190] ? __fget_light+0x1a9/0x230 [ 3393.125164] ? __fdget+0x1b/0x20 [ 3393.128519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3393.134319] __sys_sendmsg+0x105/0x1d0 [ 3393.138224] ? __ia32_sys_shutdown+0x80/0x80 [ 3393.142631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3393.147383] ? do_syscall_64+0x26/0x620 [ 3393.151348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3393.156698] ? do_syscall_64+0x26/0x620 [ 3393.160671] __x64_sys_sendmsg+0x78/0xb0 [ 3393.164728] do_syscall_64+0xfd/0x620 [ 3393.168527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3393.173705] RIP: 0033:0x45a6f9 [ 3393.176890] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3393.198064] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3393.205789] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3393.213058] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3393.220328] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3393.227589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3393.234858] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0xf000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3393.247696] Dev loop3: unable to read RDB block 1 [ 3393.252901] loop3: unable to read partition table [ 3393.260883] loop3: partition table beyond EOD, truncated [ 3393.269151] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:26:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0xf0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:19 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1fc}]) [ 3393.467786] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3393.553391] CPU: 1 PID: 28667 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3393.561242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3393.561249] Call Trace: [ 3393.561274] dump_stack+0x197/0x210 [ 3393.561301] sysfs_warn_dup.cold+0x1c/0x31 [ 3393.561320] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3393.561337] sysfs_create_link+0x65/0xc0 [ 3393.561352] device_add+0x7ce/0x1760 [ 3393.561372] ? get_device_parent.isra.0+0x570/0x570 [ 3393.586604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.586633] wiphy_register+0x16fa/0x21d0 [ 3393.586650] ? show_schedstat+0x832/0xbb0 [ 3393.586671] ? wiphy_unregister+0xfd0/0xfd0 [ 3393.586689] ? rcu_read_lock_sched_held+0x110/0x130 [ 3393.586702] ? __kmalloc+0x5e1/0x750 [ 3393.586720] ? trace_hardirqs_on+0x67/0x220 [ 3393.631030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.636624] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3393.641590] ieee80211_register_hw+0x156e/0x3800 [ 3393.646384] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3393.651400] ? hrtimer_init+0x8b/0x300 [ 3393.655372] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3393.660693] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3393.665732] ? cred_has_capability+0x193/0x320 [ 3393.670362] ? hwsim_exit_net+0xc50/0xc50 [ 3393.674545] hwsim_new_radio_nl+0x5eb/0x893 [ 3393.678896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.684477] ? security_capable+0x92/0xc0 [ 3393.688800] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3393.694043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.699754] ? nla_parse+0x1fc/0x2f0 [ 3393.703514] genl_family_rcv_msg+0x6db/0xd30 [ 3393.707997] ? genl_unregister_family+0x790/0x790 [ 3393.713051] ? __local_bh_enable_ip+0x15a/0x270 [ 3393.717752] ? __dev_queue_xmit+0x892/0x2fe0 [ 3393.722215] genl_rcv_msg+0xca/0x170 [ 3393.726412] netlink_rcv_skb+0x17d/0x460 [ 3393.730501] ? genl_family_rcv_msg+0xd30/0xd30 [ 3393.735189] ? netlink_ack+0xb30/0xb30 [ 3393.739120] genl_rcv+0x29/0x40 [ 3393.742430] netlink_unicast+0x53a/0x730 [ 3393.746538] ? netlink_attachskb+0x770/0x770 [ 3393.750996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.756555] netlink_sendmsg+0x8ae/0xd70 [ 3393.761254] ? netlink_unicast+0x730/0x730 [ 3393.765511] ? selinux_socket_sendmsg+0x36/0x40 [ 3393.770194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3393.775744] ? security_socket_sendmsg+0x8d/0xc0 [ 3393.780507] ? netlink_unicast+0x730/0x730 [ 3393.784764] sock_sendmsg+0xd7/0x130 [ 3393.788493] ___sys_sendmsg+0x803/0x920 [ 3393.792484] ? copy_msghdr_from_user+0x430/0x430 [ 3393.797261] ? lock_downgrade+0x880/0x880 [ 3393.801426] ? kasan_check_read+0x11/0x20 [ 3393.805589] ? __fget+0x367/0x540 [ 3393.809115] ? iterate_fd+0x360/0x360 [ 3393.812932] ? lock_downgrade+0x880/0x880 [ 3393.817097] ? __fget_light+0x1a9/0x230 [ 3393.821085] ? __fdget+0x1b/0x20 [ 3393.824618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3393.830190] __sys_sendmsg+0x105/0x1d0 [ 3393.834103] ? __ia32_sys_shutdown+0x80/0x80 [ 3393.838562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3393.843359] ? do_syscall_64+0x26/0x620 [ 3393.847349] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3393.852812] ? do_syscall_64+0x26/0x620 [ 3393.856807] __x64_sys_sendmsg+0x78/0xb0 [ 3393.860882] do_syscall_64+0xfd/0x620 [ 3393.864852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3393.870133] RIP: 0033:0x45a6f9 [ 3393.873360] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3393.892300] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3393.900020] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3393.907296] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3393.914658] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3393.921933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3393.929223] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3393.977721] Dev loop3: unable to read RDB block 1 15:26:20 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001340)=ANY=[@ANYBLOB="018000006c65000000000000000000000000000000000000000000000000000002000000000000000019b457115e35264700dcb3df616f3b00000000000000000000000000000000000000000000768b35c1111809d58bd82caabaf0b405c2f8acd390dbd4d90e13510c32df9156c557e9227635a7895865e2d0fc9f2f30981d78edd69cb5fdccaf90890937fbf1dd689519ace3d9730405e1be422228ca5f0f65e4f922ee62e3fc0c39503a40501af281cb928acc95252d9d0895998e5ab9961f7019d98878474f25712c233592a5cad4722970402d36d967ce0139e4b5ee229b971d8117536d49db4d2bee0ec1f478e313f87c13c16509dc1440f7867613b04bd755fea33e64337bcfa5bf73985d1757464155bd02a50ece4a0b4efb195a45caf65fc8a821d227b4886478c3df1d6fa05146b700d399dfbda921739daea9d14712bc8468"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3394.004785] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3394.013368] CPU: 1 PID: 28731 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3394.017050] loop3: unable to read partition table [ 3394.021326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3394.021334] Call Trace: [ 3394.021363] dump_stack+0x197/0x210 [ 3394.021388] sysfs_warn_dup.cold+0x1c/0x31 [ 3394.021406] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3394.021424] sysfs_create_link+0x65/0xc0 [ 3394.021440] device_add+0x7ce/0x1760 [ 3394.021460] ? get_device_parent.isra.0+0x570/0x570 [ 3394.021472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.021495] wiphy_register+0x16fa/0x21d0 [ 3394.021511] ? show_schedstat+0x832/0xbb0 [ 3394.021530] ? wiphy_unregister+0xfd0/0xfd0 [ 3394.035985] ? rcu_read_lock_sched_held+0x110/0x130 [ 3394.036003] ? __kmalloc+0x5e1/0x750 [ 3394.036019] ? trace_hardirqs_on+0x67/0x220 [ 3394.036037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:26:20 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3394.036051] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3394.036074] ieee80211_register_hw+0x156e/0x3800 [ 3394.072206] loop3: partition table beyond EOD, truncated [ 3394.074314] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3394.074333] ? hrtimer_init+0x8b/0x300 [ 3394.074352] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3394.116620] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3394.116637] ? cred_has_capability+0x193/0x320 [ 3394.116663] ? hwsim_exit_net+0xc50/0xc50 [ 3394.121860] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3394.125569] ? __mutex_lock+0xa67/0x1300 [ 3394.125595] hwsim_new_radio_nl+0x5eb/0x893 [ 3394.125611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.125627] ? security_capable+0x92/0xc0 [ 3394.155785] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3394.155813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.180525] ? nla_parse+0x1fc/0x2f0 [ 3394.184257] genl_family_rcv_msg+0x6db/0xd30 [ 3394.188693] ? genl_unregister_family+0x790/0x790 [ 3394.193554] ? __local_bh_enable_ip+0x15a/0x270 [ 3394.198244] ? __dev_queue_xmit+0x892/0x2fe0 [ 3394.202680] genl_rcv_msg+0xca/0x170 [ 3394.206407] netlink_rcv_skb+0x17d/0x460 [ 3394.210471] ? genl_family_rcv_msg+0xd30/0xd30 [ 3394.215064] ? netlink_ack+0xb30/0xb30 [ 3394.218983] genl_rcv+0x29/0x40 [ 3394.222280] netlink_unicast+0x53a/0x730 [ 3394.226382] ? netlink_attachskb+0x770/0x770 [ 3394.230817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.236389] netlink_sendmsg+0x8ae/0xd70 [ 3394.240479] ? netlink_unicast+0x730/0x730 [ 3394.244735] ? selinux_socket_sendmsg+0x36/0x40 [ 3394.249412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:26:20 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000d829a1f6d8b0e5abc709fbdeff000000000000000000000000000c00000000000000000000000000000000000000000000000000000000d60600ac79235a94470ce919bf41d0735e78b52dcfee1ebf6130298654f6f0b8f397dd9d40aa8e7980589385af1ed5d0925a8e2c3645e10a2c870c280c1ef984b9943032a7a22b71995e44ea33"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000011c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3394.254955] ? security_socket_sendmsg+0x8d/0xc0 [ 3394.259720] ? netlink_unicast+0x730/0x730 [ 3394.263970] sock_sendmsg+0xd7/0x130 [ 3394.268840] ___sys_sendmsg+0x803/0x920 [ 3394.272836] ? copy_msghdr_from_user+0x430/0x430 [ 3394.277628] ? lock_downgrade+0x880/0x880 [ 3394.281795] ? kasan_check_read+0x11/0x20 [ 3394.285960] ? __fget+0x367/0x540 [ 3394.289429] ? iterate_fd+0x360/0x360 [ 3394.293591] ? lock_downgrade+0x880/0x880 [ 3394.297923] ? __fget_light+0x1a9/0x230 [ 3394.301907] ? __fdget+0x1b/0x20 [ 3394.305288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3394.310844] __sys_sendmsg+0x105/0x1d0 [ 3394.314749] ? __ia32_sys_shutdown+0x80/0x80 [ 3394.319359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3394.324243] ? do_syscall_64+0x26/0x620 [ 3394.328226] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3394.333596] ? do_syscall_64+0x26/0x620 [ 3394.337589] __x64_sys_sendmsg+0x78/0xb0 [ 3394.341659] do_syscall_64+0xfd/0x620 [ 3394.345474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3394.350667] RIP: 0033:0x45a6f9 [ 3394.353864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3394.372777] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3394.380497] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3394.387792] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3394.395067] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3394.402346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3394.409648] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0xff0f}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x300, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:20 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x5f5e0ff}]) 15:26:20 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3394.592316] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3394.599419] CPU: 1 PID: 28750 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3394.599430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3394.599435] Call Trace: [ 3394.599459] dump_stack+0x197/0x210 [ 3394.599488] sysfs_warn_dup.cold+0x1c/0x31 [ 3394.627148] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3394.632548] sysfs_create_link+0x65/0xc0 [ 3394.636648] device_add+0x7ce/0x1760 [ 3394.640389] ? get_device_parent.isra.0+0x570/0x570 [ 3394.645638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.651342] wiphy_register+0x16fa/0x21d0 [ 3394.658484] ? show_schedstat+0x832/0xbb0 [ 3394.662683] ? wiphy_unregister+0xfd0/0xfd0 [ 3394.662705] ? rcu_read_lock_sched_held+0x110/0x130 [ 3394.662722] ? __kmalloc+0x5e1/0x750 [ 3394.662740] ? trace_hardirqs_on+0x67/0x220 [ 3394.680106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.685662] ? ieee80211_cs_list_valid+0x1a1/0x280 15:26:21 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3394.690627] ieee80211_register_hw+0x156e/0x3800 [ 3394.695420] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3394.700287] ? hrtimer_init+0x8b/0x300 [ 3394.704287] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3394.709414] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3394.714443] ? cred_has_capability+0x193/0x320 [ 3394.719058] ? hwsim_exit_net+0xc50/0xc50 [ 3394.723227] hwsim_new_radio_nl+0x5eb/0x893 [ 3394.727557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.733111] ? security_capable+0x92/0xc0 [ 3394.737317] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3394.743147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.748703] ? nla_parse+0x1fc/0x2f0 [ 3394.752442] genl_family_rcv_msg+0x6db/0xd30 [ 3394.756868] ? genl_unregister_family+0x790/0x790 [ 3394.761898] ? __local_bh_enable_ip+0x15a/0x270 [ 3394.766583] ? __dev_queue_xmit+0x892/0x2fe0 [ 3394.771037] genl_rcv_msg+0xca/0x170 [ 3394.774785] netlink_rcv_skb+0x17d/0x460 [ 3394.778878] ? genl_family_rcv_msg+0xd30/0xd30 [ 3394.783492] ? netlink_ack+0xb30/0xb30 [ 3394.787520] genl_rcv+0x29/0x40 [ 3394.791092] netlink_unicast+0x53a/0x730 [ 3394.795170] ? netlink_attachskb+0x770/0x770 [ 3394.799593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.805143] netlink_sendmsg+0x8ae/0xd70 [ 3394.809234] ? netlink_unicast+0x730/0x730 [ 3394.813502] ? selinux_socket_sendmsg+0x36/0x40 [ 3394.819150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3394.824709] ? security_socket_sendmsg+0x8d/0xc0 [ 3394.829484] ? netlink_unicast+0x730/0x730 [ 3394.833729] sock_sendmsg+0xd7/0x130 [ 3394.837463] ___sys_sendmsg+0x803/0x920 [ 3394.841450] ? copy_msghdr_from_user+0x430/0x430 [ 3394.846232] ? lock_downgrade+0x880/0x880 [ 3394.850396] ? kasan_check_read+0x11/0x20 [ 3394.854559] ? __fget+0x367/0x540 [ 3394.858026] ? iterate_fd+0x360/0x360 [ 3394.861840] ? lock_downgrade+0x880/0x880 [ 3394.866002] ? __fget_light+0x1a9/0x230 [ 3394.869985] ? __fdget+0x1b/0x20 [ 3394.873360] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3394.878913] __sys_sendmsg+0x105/0x1d0 [ 3394.882808] ? __ia32_sys_shutdown+0x80/0x80 [ 3394.887239] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3394.892010] ? do_syscall_64+0x26/0x620 [ 3394.895991] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3394.901363] ? do_syscall_64+0x26/0x620 [ 3394.905357] __x64_sys_sendmsg+0x78/0xb0 [ 3394.909430] do_syscall_64+0xfd/0x620 [ 3394.913244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3394.918438] RIP: 0033:0x45a6f9 [ 3394.921640] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3394.940638] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3394.948356] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3394.955629] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3394.962904] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3394.970178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3394.977454] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3395.068161] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3395.083496] CPU: 0 PID: 28792 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3395.091382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3395.100752] Call Trace: [ 3395.103384] dump_stack+0x197/0x210 [ 3395.107046] sysfs_warn_dup.cold+0x1c/0x31 [ 3395.111317] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3395.117174] sysfs_create_link+0x65/0xc0 [ 3395.121261] device_add+0x7ce/0x1760 [ 3395.125052] ? get_device_parent.isra.0+0x570/0x570 [ 3395.130182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.135750] wiphy_register+0x16fa/0x21d0 [ 3395.139917] ? show_schedstat+0x832/0xbb0 [ 3395.144116] ? wiphy_unregister+0xfd0/0xfd0 [ 3395.148459] ? rcu_read_lock_sched_held+0x110/0x130 [ 3395.153487] ? __kmalloc+0x5e1/0x750 [ 3395.157227] ? trace_hardirqs_on+0x67/0x220 [ 3395.161576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:26:21 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r0, r1) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000380)) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000003280)=ANY=[@ANYRES16=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) syz_read_part_table(0xfffffffffffffffd, 0x0, &(0x7f0000000080)) [ 3395.161592] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3395.161609] ieee80211_register_hw+0x156e/0x3800 [ 3395.161632] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3395.161650] ? hrtimer_init+0x8b/0x300 [ 3395.161666] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3395.161685] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3395.161703] ? cred_has_capability+0x193/0x320 [ 3395.181894] ? hwsim_exit_net+0xc50/0xc50 [ 3395.181910] ? __mutex_lock+0xa67/0x1300 [ 3395.181933] hwsim_new_radio_nl+0x5eb/0x893 [ 3395.181947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.181960] ? security_capable+0x92/0xc0 [ 3395.181975] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3395.181994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.182005] ? nla_parse+0x1fc/0x2f0 [ 3395.182025] genl_family_rcv_msg+0x6db/0xd30 [ 3395.182046] ? genl_unregister_family+0x790/0x790 [ 3395.182061] ? __local_bh_enable_ip+0x15a/0x270 [ 3395.182078] ? __dev_queue_xmit+0x892/0x2fe0 [ 3395.204839] genl_rcv_msg+0xca/0x170 [ 3395.204861] netlink_rcv_skb+0x17d/0x460 [ 3395.263393] ? genl_family_rcv_msg+0xd30/0xd30 [ 3395.267991] ? netlink_ack+0xb30/0xb30 [ 3395.271906] genl_rcv+0x29/0x40 [ 3395.275193] netlink_unicast+0x53a/0x730 [ 3395.279353] ? netlink_attachskb+0x770/0x770 [ 3395.283777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.289678] netlink_sendmsg+0x8ae/0xd70 [ 3395.293766] ? netlink_unicast+0x730/0x730 [ 3395.298016] ? selinux_socket_sendmsg+0x36/0x40 [ 3395.302716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.308284] ? security_socket_sendmsg+0x8d/0xc0 [ 3395.313057] ? netlink_unicast+0x730/0x730 [ 3395.317305] sock_sendmsg+0xd7/0x130 [ 3395.321041] ___sys_sendmsg+0x803/0x920 [ 3395.325045] ? copy_msghdr_from_user+0x430/0x430 [ 3395.329821] ? lock_downgrade+0x880/0x880 [ 3395.334170] ? kasan_check_read+0x11/0x20 [ 3395.338339] ? __fget+0x367/0x540 [ 3395.341815] ? iterate_fd+0x360/0x360 [ 3395.345630] ? lock_downgrade+0x880/0x880 [ 3395.349795] ? __fget_light+0x1a9/0x230 [ 3395.353785] ? __fdget+0x1b/0x20 [ 3395.357158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3395.362711] __sys_sendmsg+0x105/0x1d0 [ 3395.366615] ? __ia32_sys_shutdown+0x80/0x80 [ 3395.371051] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3395.375814] ? do_syscall_64+0x26/0x620 [ 3395.379793] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3395.385169] ? do_syscall_64+0x26/0x620 [ 3395.389171] __x64_sys_sendmsg+0x78/0xb0 [ 3395.393240] do_syscall_64+0xfd/0x620 [ 3395.397056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3395.402709] RIP: 0033:0x45a6f9 15:26:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0xffff}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:21 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001340)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000007e457faad56fcd71c9d3cdd30a3f4fa0bc576ef83886077cdfc2a5c9bd3bfdd7604315d87f578ed3c9cf5a889b47750ccb821ed8a4cb0ca6e6f874a8cec1cd245dbecb2d75071e6069302d62530d6a7fc3d798cfbb19e3e9c5d4c87effa7af"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/\x00\x00\x15\xae\x94E\xf1\xff\x00', 0x8000, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) bind$alg(r9, &(0x7f00000012c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-arm64\x00'}, 0x58) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:21 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:21 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3c43, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001280)={0x0}, &(0x7f00000012c0)=0xc) wait4(r2, 0x0, 0x8, 0x0) pipe(&(0x7f0000001380)={0xffffffffffffffff}) ioctl$CAPI_CLR_FLAGS(r3, 0x80044325, &(0x7f00000013c0)=0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r6, 0x29, 0x41, &(0x7f0000001300)=ANY=[@ANYBLOB="6d616e676c65001c0000000000000000edff0000000000000000020000000000020000000000001e0000000000000000010400000000000000eeff0100008dc900000000800000004f353c793bf64c9732369d8a5b104e07523002a7658f169739a56984edc7b44c84b31c4100efe222eca93e17dc4da5ee3828"], 0x48) r7 = getpid() r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x8000}, 0x100000170) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r10 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r11 = dup2(r9, r10) ioctl$RTC_UIE_ON(r11, 0x7003) r12 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001480)='/dev/vga_arbiter\x00', 0xcc79da3779986167, 0x0) mq_notify(r12, &(0x7f0000000140)={0x0, 0x15, 0x48c10df8820eb229, @tid=r7}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r8, &(0x7f0000000040)}, 0x20) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r8, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r14 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r14, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r14, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0xfffd, @local}, 0x3}}, 0xfffffffffffffd56) [ 3395.405910] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3395.424828] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3395.432545] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3395.439837] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3395.447123] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3395.454838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3395.462125] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x500, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3395.518065] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3395.535295] CPU: 1 PID: 28978 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3395.543254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3395.543261] Call Trace: [ 3395.543284] dump_stack+0x197/0x210 [ 3395.543322] sysfs_warn_dup.cold+0x1c/0x31 [ 3395.543341] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3395.543359] sysfs_create_link+0x65/0xc0 [ 3395.543377] device_add+0x7ce/0x1760 [ 3395.543400] ? get_device_parent.isra.0+0x570/0x570 [ 3395.543415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.543439] wiphy_register+0x16fa/0x21d0 [ 3395.543454] ? show_schedstat+0x832/0xbb0 [ 3395.543481] ? wiphy_unregister+0xfd0/0xfd0 [ 3395.559172] ? rcu_read_lock_sched_held+0x110/0x130 [ 3395.559186] ? __kmalloc+0x5e1/0x750 [ 3395.559204] ? trace_hardirqs_on+0x67/0x220 [ 3395.568797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.568814] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3395.568833] ieee80211_register_hw+0x156e/0x3800 [ 3395.568856] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3395.576625] ? hrtimer_init+0x8b/0x300 [ 3395.576644] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3395.576665] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3395.576682] ? cred_has_capability+0x193/0x320 [ 3395.652512] ? hwsim_exit_net+0xc50/0xc50 [ 3395.656709] hwsim_new_radio_nl+0x5eb/0x893 [ 3395.661051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.666603] ? security_capable+0x92/0xc0 [ 3395.670775] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3395.675980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.681527] ? nla_parse+0x1fc/0x2f0 [ 3395.685257] genl_family_rcv_msg+0x6db/0xd30 [ 3395.689694] ? genl_unregister_family+0x790/0x790 [ 3395.694555] ? __local_bh_enable_ip+0x15a/0x270 [ 3395.699239] ? __dev_queue_xmit+0x892/0x2fe0 [ 3395.703674] genl_rcv_msg+0xca/0x170 [ 3395.707415] netlink_rcv_skb+0x17d/0x460 [ 3395.711485] ? genl_family_rcv_msg+0xd30/0xd30 [ 3395.716079] ? netlink_ack+0xb30/0xb30 [ 3395.720011] genl_rcv+0x29/0x40 [ 3395.723345] netlink_unicast+0x53a/0x730 [ 3395.727432] ? netlink_attachskb+0x770/0x770 [ 3395.731860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.737445] netlink_sendmsg+0x8ae/0xd70 [ 3395.741528] ? netlink_unicast+0x730/0x730 [ 3395.745800] ? selinux_socket_sendmsg+0x36/0x40 [ 3395.750745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3395.756287] ? security_socket_sendmsg+0x8d/0xc0 [ 3395.761069] ? netlink_unicast+0x730/0x730 [ 3395.765408] sock_sendmsg+0xd7/0x130 [ 3395.769136] ___sys_sendmsg+0x803/0x920 [ 3395.773144] ? copy_msghdr_from_user+0x430/0x430 [ 3395.777920] ? lock_downgrade+0x880/0x880 [ 3395.782107] ? kasan_check_read+0x11/0x20 [ 3395.786279] ? __fget+0x367/0x540 [ 3395.789744] ? iterate_fd+0x360/0x360 [ 3395.793559] ? lock_downgrade+0x880/0x880 [ 3395.797747] ? __fget_light+0x1a9/0x230 [ 3395.801729] ? __fdget+0x1b/0x20 [ 3395.805119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3395.810675] __sys_sendmsg+0x105/0x1d0 [ 3395.814677] ? __ia32_sys_shutdown+0x80/0x80 [ 3395.819128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3395.823891] ? do_syscall_64+0x26/0x620 [ 3395.827876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3395.833256] ? do_syscall_64+0x26/0x620 [ 3395.837258] __x64_sys_sendmsg+0x78/0xb0 [ 3395.841349] do_syscall_64+0xfd/0x620 [ 3395.845277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3395.850578] RIP: 0033:0x45a6f9 [ 3395.853909] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3395.872821] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3395.880536] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3395.887810] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3395.895086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3395.902379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3395.909665] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x3, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:22 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 3396.032816] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' 15:26:22 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3396.120072] CPU: 0 PID: 28996 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3396.127929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3396.137304] Call Trace: [ 3396.139920] dump_stack+0x197/0x210 [ 3396.143574] sysfs_warn_dup.cold+0x1c/0x31 [ 3396.147924] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3396.153322] sysfs_create_link+0x65/0xc0 [ 3396.157399] device_add+0x7ce/0x1760 [ 3396.161135] ? get_device_parent.isra.0+0x570/0x570 [ 3396.166313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.171884] wiphy_register+0x16fa/0x21d0 [ 3396.176060] ? show_schedstat+0x832/0xbb0 [ 3396.180239] ? wiphy_unregister+0xfd0/0xfd0 [ 3396.184584] ? rcu_read_lock_sched_held+0x110/0x130 [ 3396.189618] ? __kmalloc+0x5e1/0x750 [ 3396.193343] ? trace_hardirqs_on+0x67/0x220 [ 3396.197681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.197707] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3396.208180] ieee80211_register_hw+0x156e/0x3800 [ 3396.212974] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3396.217832] ? hrtimer_init+0x8b/0x300 [ 3396.217848] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3396.217868] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3396.231884] ? cred_has_capability+0x193/0x320 [ 3396.236506] ? hwsim_exit_net+0xc50/0xc50 [ 3396.240684] hwsim_new_radio_nl+0x5eb/0x893 [ 3396.245113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.250689] ? security_capable+0x92/0xc0 [ 3396.250712] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3396.250734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.250746] ? nla_parse+0x1fc/0x2f0 [ 3396.250768] genl_family_rcv_msg+0x6db/0xd30 [ 3396.250787] ? genl_unregister_family+0x790/0x790 [ 3396.250804] ? __local_bh_enable_ip+0x15a/0x270 [ 3396.250821] ? __dev_queue_xmit+0x892/0x2fe0 [ 3396.250851] genl_rcv_msg+0xca/0x170 [ 3396.250870] netlink_rcv_skb+0x17d/0x460 [ 3396.250884] ? genl_family_rcv_msg+0xd30/0xd30 [ 3396.250900] ? netlink_ack+0xb30/0xb30 [ 3396.250927] genl_rcv+0x29/0x40 [ 3396.265774] netlink_unicast+0x53a/0x730 [ 3396.265796] ? netlink_attachskb+0x770/0x770 [ 3396.265815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.321444] netlink_sendmsg+0x8ae/0xd70 [ 3396.325526] ? netlink_unicast+0x730/0x730 [ 3396.329810] ? selinux_socket_sendmsg+0x36/0x40 [ 3396.334486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.340033] ? security_socket_sendmsg+0x8d/0xc0 [ 3396.344799] ? netlink_unicast+0x730/0x730 [ 3396.349049] sock_sendmsg+0xd7/0x130 [ 3396.352772] ___sys_sendmsg+0x803/0x920 [ 3396.356756] ? copy_msghdr_from_user+0x430/0x430 [ 3396.361560] ? lock_downgrade+0x880/0x880 [ 3396.365725] ? kasan_check_read+0x11/0x20 [ 3396.369884] ? __fget+0x367/0x540 [ 3396.373352] ? iterate_fd+0x360/0x360 [ 3396.377163] ? lock_downgrade+0x880/0x880 [ 3396.381324] ? __fget_light+0x1a9/0x230 [ 3396.385309] ? __fdget+0x1b/0x20 [ 3396.388682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3396.394244] __sys_sendmsg+0x105/0x1d0 [ 3396.398148] ? __ia32_sys_shutdown+0x80/0x80 [ 3396.402582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3396.407350] ? do_syscall_64+0x26/0x620 [ 3396.411334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3396.416714] ? do_syscall_64+0x26/0x620 [ 3396.420710] __x64_sys_sendmsg+0x78/0xb0 [ 3396.424783] do_syscall_64+0xfd/0x620 [ 3396.428690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3396.433887] RIP: 0033:0x45a6f9 [ 3396.437085] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3396.456003] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3396.463721] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:22 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x10000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:22 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000001380)='./file0\x00', 0x3, 0x3, &(0x7f0000001600)=[{&(0x7f00000013c0)="9157a317d2962e3dc070e71589ae632733b8ebb0ac0b32a503bf4965caf143d2f60510103f7c05bd572ab94fa4280f3745dce2e88af9cb82498826052035cdf2e9ab21466892ded12df3c3fb5d8a2271691ae5fbe842ec9013c9a8aa0505098adf", 0x61}, {&(0x7f0000001440)="498e443b642cb2aa421212c88aa38c9c31f028ad2d473719baafd11e2ac29d8448b76082f1691d3023ba025863aaff6270776d13d9c9f3b060e2d1360eb73ad60cc8e3aa1c750fcccc16e29de1bc3e534958d981e1421e4b5d0b28e73ee0873330ef0ab15143029f940f084fd5fac2cd56a6ec8fba52b6614722ce37cf96a25043eb11f27449190d2314545f4412c69dcd3ddd3762a8466aca67ea216dc8d154ea54cc789bf718549cc9dc96135f02adf611c02dc26b79b8d8", 0xb9, 0x5}, {&(0x7f0000001500)="88176b1225ea54f56447c3bf7977047b386417c5b256cd56cedcad756534af7764850bfe43cbd210e95fa4eff76d63840514b9b963500863e5a11ffaa5492dcc50a0b2086c84559c1757475c170686c218275b43a9a599dda77fd50298bc6944efabaec058c9000cc2a96bebdaa15b493b5afc2b63925fd99c687575576d69d11a6289db3ec667b22650fb8aca4252aa45779ab5ce9a81dcfd8a74ff1d56e1118272cc8c88c9542b44d1590c9613919ee5f2ef22b08e420c832d1083247d56577d0489978dd901eb", 0xc8, 0x801c}], 0x84000, &(0x7f0000001680)='/dev/video#\x00') r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3396.470998] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3396.478271] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3396.485635] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3396.492915] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3396.513394] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:26:22 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000012c0)=""/162, &(0x7f0000001380)=""/125, &(0x7f0000001400)=""/69, 0x4}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000001e0c891799d6518620e4bcf59abf3aa60000000000000000000000000000000000000200"/72], 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x0, 0xffff, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000001480)={@local, 0x0, 0x2, 0x0, 0x0, 0x40, 0x3}, &(0x7f00000014c0)=0x20) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x600, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:22 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = fanotify_init(0x0, 0x0) fanotify_mark(r3, 0x2000000000000011, 0x2, r2, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000200)=""/213) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f0000000040)=0x3, 0x2) 15:26:22 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x10000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3396.712668] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3396.742329] CPU: 0 PID: 29234 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3396.750213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3396.759591] Call Trace: [ 3396.762208] dump_stack+0x197/0x210 [ 3396.765873] sysfs_warn_dup.cold+0x1c/0x31 [ 3396.770138] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3396.775535] sysfs_create_link+0x65/0xc0 [ 3396.779634] device_add+0x7ce/0x1760 [ 3396.783475] ? get_device_parent.isra.0+0x570/0x570 [ 3396.788524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.794206] wiphy_register+0x16fa/0x21d0 [ 3396.798382] ? show_schedstat+0x832/0xbb0 [ 3396.802563] ? wiphy_unregister+0xfd0/0xfd0 [ 3396.806905] ? rcu_read_lock_sched_held+0x110/0x130 [ 3396.811930] ? __kmalloc+0x5e1/0x750 [ 3396.815655] ? trace_hardirqs_on+0x67/0x220 [ 3396.820012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.825581] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3396.830544] ieee80211_register_hw+0x156e/0x3800 [ 3396.835332] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3396.840194] ? hrtimer_init+0x8b/0x300 [ 3396.844107] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3396.849248] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3396.854294] ? cred_has_capability+0x193/0x320 [ 3396.858906] ? hwsim_exit_net+0xc50/0xc50 [ 3396.863076] hwsim_new_radio_nl+0x5eb/0x893 [ 3396.867415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.872965] ? security_capable+0x92/0xc0 [ 3396.877125] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3396.882330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.887879] ? nla_parse+0x1fc/0x2f0 [ 3396.891609] genl_family_rcv_msg+0x6db/0xd30 [ 3396.896208] ? genl_unregister_family+0x790/0x790 [ 3396.901060] ? rcu_read_unlock_special+0x679/0xea0 [ 3396.906003] ? find_held_lock+0x35/0x130 [ 3396.910113] genl_rcv_msg+0xca/0x170 [ 3396.913843] netlink_rcv_skb+0x17d/0x460 [ 3396.918155] ? genl_family_rcv_msg+0xd30/0xd30 [ 3396.922764] ? netlink_ack+0xb30/0xb30 [ 3396.926692] genl_rcv+0x29/0x40 [ 3396.929983] netlink_unicast+0x53a/0x730 [ 3396.934071] ? netlink_attachskb+0x770/0x770 [ 3396.938497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3396.944220] netlink_sendmsg+0x8ae/0xd70 [ 3396.948302] ? netlink_unicast+0x730/0x730 [ 3396.952553] ? selinux_socket_sendmsg+0x36/0x40 [ 3396.957231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:26:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0xa, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3396.962777] ? security_socket_sendmsg+0x8d/0xc0 [ 3396.967549] ? netlink_unicast+0x730/0x730 [ 3396.971804] sock_sendmsg+0xd7/0x130 [ 3396.975531] ___sys_sendmsg+0x803/0x920 [ 3396.979516] ? copy_msghdr_from_user+0x430/0x430 [ 3396.984298] ? lock_downgrade+0x880/0x880 [ 3396.988472] ? kasan_check_read+0x11/0x20 [ 3396.992645] ? __fget+0x367/0x540 [ 3396.996122] ? iterate_fd+0x360/0x360 [ 3396.999941] ? lock_downgrade+0x880/0x880 [ 3397.004118] ? __fget_light+0x1a9/0x230 [ 3397.008113] ? __fdget+0x1b/0x20 [ 3397.011515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3397.017080] __sys_sendmsg+0x105/0x1d0 [ 3397.020989] ? __ia32_sys_shutdown+0x80/0x80 [ 3397.025431] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3397.030204] ? do_syscall_64+0x26/0x620 [ 3397.034188] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3397.039558] ? do_syscall_64+0x26/0x620 [ 3397.043550] __x64_sys_sendmsg+0x78/0xb0 [ 3397.047627] do_syscall_64+0xfd/0x620 [ 3397.051447] entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:26:23 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x10000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3397.053775] audit: type=1800 audit(1575732383.183:3941): pid=29293 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16912 res=0 [ 3397.056636] RIP: 0033:0x45a6f9 [ 3397.056650] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3397.056662] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:23 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x3d430886701aba71) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000300)=@dstopts, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001400)={r4, @in={{0x2, 0x4e21, @multicast1}}, 0x20}, &(0x7f0000000080)=0x90) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000011c0)={r5, 0x6}, 0x8) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r1, r6) ioctl$RTC_UIE_ON(r7, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c65020000000000000000000000000000000200000039000000000000631b20a47405ea630000000000000000000000000000000000000000000137f9e49c6f5acc915e45efb921368cae2c4a688d41e13bdc6399c2048d3a51062d64688c77768526ab24f5ec"], 0x48) getpid() r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r10 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r11 = dup2(r9, r10) ioctl$RTC_UIE_ON(r11, 0x7003) mq_notify(r11, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f00000014c0)="3297a0bc4217a6579eceebb686c9d4bac8d10f7ea2f4a445ebae6c886f00006f5b7ae029352ba4cc381017999797321693f90cc60000000000000000000000000000733b47477b82ffd7b47c9f4e280b9bbd71b9a3c057328f80d077c1fdcbdbdf163507b86a8dcd55e70c79080836bda0b9d551ba00a32adef003a269e4e18931b3dbe82fde892e03a5f6f89fbb378c6dd5bad111e447a4ec28f8ec1dde03b785", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r8, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r8, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0x0, 0x0, 0x0, 0x5, 0x1, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r12 = semget$private(0x0, 0x4, 0x0) semop(r12, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r13 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r13, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r13, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3397.109174] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3397.109183] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3397.109192] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3397.109200] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3397.109207] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:23 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000d16ac99c8b35b3b800000000000003000000000000000000ff000000b70700"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r8, r9) r10 = dup2(r4, r9) ioctl$KVM_IRQFD(r10, 0x4020ae76, &(0x7f0000000040)={r6, 0x3, 0x10000, r6}) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3397.181841] audit: type=1804 audit(1575732383.353:3942): pid=29293 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir235786747/syzkaller.RJ6Dys/4541/file0" dev="sda1" ino=16912 res=1 [ 3397.250526] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3397.310640] audit: type=1804 audit(1575732383.353:3943): pid=29293 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir235786747/syzkaller.RJ6Dys/4541/file0" dev="sda1" ino=16912 res=1 [ 3397.381145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3397.393013] loop3: partition table partially beyond EOD, truncated [ 3397.402832] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3397.431601] CPU: 0 PID: 29519 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3397.439571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3397.448970] Call Trace: [ 3397.451658] dump_stack+0x197/0x210 [ 3397.455443] sysfs_warn_dup.cold+0x1c/0x31 [ 3397.459801] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3397.465469] sysfs_create_link+0x65/0xc0 [ 3397.469669] device_add+0x7ce/0x1760 [ 3397.469690] ? get_device_parent.isra.0+0x570/0x570 [ 3397.469703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3397.469727] wiphy_register+0x16fa/0x21d0 [ 3397.469743] ? show_schedstat+0x832/0xbb0 [ 3397.469762] ? wiphy_unregister+0xfd0/0xfd0 [ 3397.469779] ? rcu_read_lock_sched_held+0x110/0x130 [ 3397.469792] ? __kmalloc+0x5e1/0x750 [ 3397.469804] ? trace_hardirqs_on+0x67/0x220 [ 3397.469824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3397.515625] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3397.515647] ieee80211_register_hw+0x156e/0x3800 [ 3397.515676] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3397.530217] ? hrtimer_init+0x8b/0x300 [ 3397.534121] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3397.539238] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3397.544288] ? hwsim_exit_net+0xc50/0xc50 [ 3397.548635] ? vprintk_default+0x28/0x30 [ 3397.550374] loop3: p1 size 1687525121 extends beyond EOD, truncated [ 3397.552722] hwsim_new_radio_nl+0x5eb/0x893 [ 3397.552742] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3397.552760] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3397.568729] ? nla_parse+0x1fc/0x2f0 [ 3397.568757] genl_family_rcv_msg+0x6db/0xd30 15:26:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x700, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:23 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3397.581986] ? genl_unregister_family+0x790/0x790 [ 3397.586859] ? rcu_read_unlock_special+0x679/0xea0 [ 3397.591902] ? find_held_lock+0x35/0x130 [ 3397.596104] genl_rcv_msg+0xca/0x170 [ 3397.599852] netlink_rcv_skb+0x17d/0x460 [ 3397.603935] ? genl_family_rcv_msg+0xd30/0xd30 [ 3397.608543] ? netlink_ack+0xb30/0xb30 [ 3397.612455] genl_rcv+0x29/0x40 [ 3397.612472] netlink_unicast+0x53a/0x730 [ 3397.612491] ? netlink_attachskb+0x770/0x770 [ 3397.612510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3397.629778] netlink_sendmsg+0x8ae/0xd70 [ 3397.629799] ? netlink_unicast+0x730/0x730 [ 3397.629821] ? selinux_socket_sendmsg+0x36/0x40 [ 3397.629835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3397.629849] ? security_socket_sendmsg+0x8d/0xc0 [ 3397.629861] ? netlink_unicast+0x730/0x730 [ 3397.629879] sock_sendmsg+0xd7/0x130 [ 3397.638174] ___sys_sendmsg+0x803/0x920 [ 3397.638195] ? copy_msghdr_from_user+0x430/0x430 [ 3397.638217] ? lock_downgrade+0x880/0x880 [ 3397.638235] ? kasan_check_read+0x11/0x20 [ 3397.678169] ? __fget+0x367/0x540 15:26:23 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x100, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000001380)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000013c0)=ANY=[@ANYBLOB="6d616e676c650000010000000000efb1e6cf75000000000000deffffffffffffff000000002ae70000000000000000000000000000000000000000000000000000000000000a7c8e6131a72e5e000000"], 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3397.681661] ? iterate_fd+0x360/0x360 [ 3397.681681] ? lock_downgrade+0x880/0x880 [ 3397.681697] ? __fget_light+0x1a9/0x230 [ 3397.681712] ? __fdget+0x1b/0x20 [ 3397.681725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3397.681744] __sys_sendmsg+0x105/0x1d0 [ 3397.681760] ? __ia32_sys_shutdown+0x80/0x80 [ 3397.702585] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3397.702603] ? do_syscall_64+0x26/0x620 [ 3397.720490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3397.725869] ? do_syscall_64+0x26/0x620 15:26:24 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3397.725892] __x64_sys_sendmsg+0x78/0xb0 [ 3397.725909] do_syscall_64+0xfd/0x620 [ 3397.737744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3397.737756] RIP: 0033:0x45a6f9 [ 3397.737772] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3397.765299] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3397.773015] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:24 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f00000012c0)={r7, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3397.773025] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3397.773034] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3397.773043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3397.773050] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:24 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3397.854635] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3397.882787] audit: type=1804 audit(1575732384.153:3944): pid=29549 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir235786747/syzkaller.RJ6Dys/4541/file0" dev="sda1" ino=16912 res=1 [ 3397.918996] loop3: p3 start 958347629 is beyond EOD, truncated [ 3397.953050] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3397.997224] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3397.998435] audit: type=1804 audit(1575732384.183:3945): pid=29776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir235786747/syzkaller.RJ6Dys/4541/file0" dev="sda1" ino=16912 res=1 [ 3398.005527] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3398.049026] CPU: 1 PID: 29763 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3398.056883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3398.066254] Call Trace: [ 3398.068867] dump_stack+0x197/0x210 [ 3398.072528] sysfs_warn_dup.cold+0x1c/0x31 [ 3398.076801] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3398.082190] sysfs_create_link+0x65/0xc0 [ 3398.086272] device_add+0x7ce/0x1760 [ 3398.090003] ? get_device_parent.isra.0+0x570/0x570 [ 3398.092490] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3398.095022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3398.095052] wiphy_register+0x16fa/0x21d0 [ 3398.101253] loop3: p7 start 500206790 is beyond EOD, truncated [ 3398.106647] ? show_schedstat+0x832/0xbb0 [ 3398.106667] ? wiphy_unregister+0xfd0/0xfd0 [ 3398.106686] ? rcu_read_lock_sched_held+0x110/0x130 [ 3398.111252] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3398.117118] ? __kmalloc+0x5e1/0x750 [ 3398.117133] ? trace_hardirqs_on+0x67/0x220 [ 3398.117151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3398.121360] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3398.125581] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3398.125600] ieee80211_register_hw+0x156e/0x3800 [ 3398.125625] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3398.130699] loop3: p10 start 13460217 is beyond EOD, truncated [ 3398.136662] ? hrtimer_init+0x8b/0x300 [ 3398.136678] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3398.136698] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3398.140571] loop3: p11 start 129726472 is beyond EOD, truncated [ 3398.144812] ? cred_has_capability+0x193/0x320 [ 3398.144845] ? hwsim_exit_net+0xc50/0xc50 [ 3398.150447] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3398.156507] ? __mutex_lock+0xa67/0x1300 [ 3398.156529] hwsim_new_radio_nl+0x5eb/0x893 [ 3398.156545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3398.161538] loop3: p13 start 471698834 is beyond EOD, truncated [ 3398.166196] ? security_capable+0x92/0xc0 [ 3398.166213] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3398.166235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3398.171136] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3398.177005] ? nla_parse+0x1fc/0x2f0 [ 3398.177027] genl_family_rcv_msg+0x6db/0xd30 [ 3398.177049] ? genl_unregister_family+0x790/0x790 [ 3398.265877] ? __local_bh_enable_ip+0x15a/0x270 [ 3398.270547] ? __dev_queue_xmit+0x892/0x2fe0 [ 3398.274970] genl_rcv_msg+0xca/0x170 [ 3398.278685] netlink_rcv_skb+0x17d/0x460 [ 3398.282748] ? genl_family_rcv_msg+0xd30/0xd30 [ 3398.287331] ? netlink_ack+0xb30/0xb30 [ 3398.291228] genl_rcv+0x29/0x40 [ 3398.295016] netlink_unicast+0x53a/0x730 [ 3398.299089] ? netlink_attachskb+0x770/0x770 [ 3398.303519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3398.309076] netlink_sendmsg+0x8ae/0xd70 [ 3398.313139] ? netlink_unicast+0x730/0x730 [ 3398.317743] ? selinux_socket_sendmsg+0x36/0x40 [ 3398.322415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3398.327960] ? security_socket_sendmsg+0x8d/0xc0 [ 3398.332861] ? netlink_unicast+0x730/0x730 [ 3398.337183] sock_sendmsg+0xd7/0x130 [ 3398.341073] ___sys_sendmsg+0x803/0x920 [ 3398.345055] ? copy_msghdr_from_user+0x430/0x430 [ 3398.349811] ? lock_downgrade+0x880/0x880 [ 3398.354721] ? kasan_check_read+0x11/0x20 [ 3398.358870] ? __fget+0x367/0x540 [ 3398.362318] ? iterate_fd+0x360/0x360 [ 3398.366123] ? lock_downgrade+0x880/0x880 [ 3398.370293] ? __fget_light+0x1a9/0x230 [ 3398.374518] ? __fdget+0x1b/0x20 [ 3398.377875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3398.383414] __sys_sendmsg+0x105/0x1d0 [ 3398.387301] ? __ia32_sys_shutdown+0x80/0x80 [ 3398.391715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3398.396472] ? do_syscall_64+0x26/0x620 [ 3398.400568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3398.405921] ? do_syscall_64+0x26/0x620 [ 3398.409898] __x64_sys_sendmsg+0x78/0xb0 [ 3398.413951] do_syscall_64+0xfd/0x620 [ 3398.417745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3398.422923] RIP: 0033:0x45a6f9 [ 3398.426134] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3398.445041] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3398.453180] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3398.460442] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3398.467699] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3398.474958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3398.482213] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:24 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80081}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x19, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:24 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:24 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$RTC_UIE_ON(r5, 0x7003) mq_notify(r5, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r6 = semget$private(0x0, 0x4, 0x0) semop(r6, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r7 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r7, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@remote, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000017c0)=0xe8) connect(r7, &(0x7f0000000000)=@ethernet={0x300, @dev={[], 0xf}}, 0xe) 15:26:24 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d61080000000000d300000000000000000000000000080000000000000000000200000000000000c161522d9fb55680000000000000000000000000200000000000000000000000000000000000006e2bef0d00773a6e7362e5ffd15cd8aacc6261aa480583263fa9492460c8438801c3308eaafb8db1edf81badd171af69aba490062c2151b696da9c"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0xa00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3398.708703] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:26:25 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x1b, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:25 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000040)={0x292, 0x3f, 0x1cdc, 0x0, 0xdb12, 0x0, 0x8001}) fcntl$notify(r0, 0x402, 0x80000000) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3398.840584] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3398.916397] CPU: 1 PID: 30078 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3398.924252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3398.933624] Call Trace: [ 3398.938322] dump_stack+0x197/0x210 [ 3398.941985] sysfs_warn_dup.cold+0x1c/0x31 [ 3398.946254] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3398.951648] sysfs_create_link+0x65/0xc0 [ 3398.955731] device_add+0x7ce/0x1760 [ 3398.955755] ? get_device_parent.isra.0+0x570/0x570 [ 3398.955773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3398.970061] wiphy_register+0x16fa/0x21d0 [ 3398.970080] ? show_schedstat+0x832/0xbb0 [ 3398.970100] ? wiphy_unregister+0xfd0/0xfd0 [ 3398.970117] ? rcu_read_lock_sched_held+0x110/0x130 [ 3398.970134] ? __kmalloc+0x5e1/0x750 [ 3398.991534] ? trace_hardirqs_on+0x67/0x220 [ 3398.995870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3399.001452] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3399.006405] ieee80211_register_hw+0x156e/0x3800 [ 3399.011184] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3399.016125] ? hrtimer_init+0x8b/0x300 [ 3399.023235] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3399.028354] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3399.033384] ? cred_has_capability+0x193/0x320 [ 3399.038138] ? hwsim_exit_net+0xc50/0xc50 [ 3399.042324] hwsim_new_radio_nl+0x5eb/0x893 [ 3399.046672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3399.052220] ? security_capable+0x92/0xc0 [ 3399.056386] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3399.061600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3399.067153] ? nla_parse+0x1fc/0x2f0 [ 3399.070911] genl_family_rcv_msg+0x6db/0xd30 [ 3399.075429] ? genl_unregister_family+0x790/0x790 [ 3399.080284] ? __local_bh_enable_ip+0x15a/0x270 [ 3399.084960] ? __dev_queue_xmit+0x892/0x2fe0 [ 3399.089405] genl_rcv_msg+0xca/0x170 [ 3399.093740] netlink_rcv_skb+0x17d/0x460 [ 3399.097812] ? genl_family_rcv_msg+0xd30/0xd30 [ 3399.102408] ? netlink_ack+0xb30/0xb30 [ 3399.106323] genl_rcv+0x29/0x40 [ 3399.109614] netlink_unicast+0x53a/0x730 [ 3399.113687] ? netlink_attachskb+0x770/0x770 [ 3399.118112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3399.123662] netlink_sendmsg+0x8ae/0xd70 [ 3399.127736] ? netlink_unicast+0x730/0x730 [ 3399.131987] ? selinux_socket_sendmsg+0x36/0x40 [ 3399.136663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3399.142211] ? security_socket_sendmsg+0x8d/0xc0 [ 3399.146974] ? netlink_unicast+0x730/0x730 [ 3399.151221] sock_sendmsg+0xd7/0x130 [ 3399.154951] ___sys_sendmsg+0x803/0x920 [ 3399.158937] ? copy_msghdr_from_user+0x430/0x430 [ 3399.163710] ? lock_downgrade+0x880/0x880 [ 3399.167869] ? kasan_check_read+0x11/0x20 [ 3399.172029] ? __fget+0x367/0x540 [ 3399.175499] ? iterate_fd+0x360/0x360 [ 3399.179312] ? lock_downgrade+0x880/0x880 [ 3399.183472] ? __fget_light+0x1a9/0x230 [ 3399.187452] ? __fdget+0x1b/0x20 [ 3399.190824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3399.196379] __sys_sendmsg+0x105/0x1d0 [ 3399.200278] ? __ia32_sys_shutdown+0x80/0x80 [ 3399.204800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3399.209564] ? do_syscall_64+0x26/0x620 [ 3399.213555] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3399.218933] ? do_syscall_64+0x26/0x620 [ 3399.222927] __x64_sys_sendmsg+0x78/0xb0 [ 3399.226998] do_syscall_64+0xfd/0x620 [ 3399.230814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3399.236006] RIP: 0033:0x45a6f9 [ 3399.239208] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3399.258117] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x420280) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:25 executing program 3: rmdir(&(0x7f0000000040)='./file0\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:25 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3399.265832] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3399.273102] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3399.280385] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3399.287654] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3399.294926] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x27, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:25 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3399.420551] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3399.446349] loop3: partition table partially beyond EOD, truncated [ 3399.460089] loop3: p1 start 448 is beyond EOD, truncated 15:26:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0xb00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3399.485728] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3399.494145] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3399.525293] loop3: p3 start 958347629 is beyond EOD, truncated [ 3399.558284] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3399.639646] loop3: p5 start 1813757113 is beyond EOD, truncated 15:26:25 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) connect$nfc_raw(r2, &(0x7f0000001380)={0x27, 0x0, 0x1, 0x4}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080)={0x9, 0xce4, 0x80000001, 0x80000000, 0xf0000000}, 0x14) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:25 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:26 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001500)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000000000200000000000000000000000000000004e771ce3bd7b13010000000000ff222d5ae1c5b77add12365c154362bfa1f08acf4a5d4ad799aa7f091f1ac042014c92fa836bd9c70f79805a73b801e28c7cbc3fdc90eac664f72af8a570ee1372ef0f07c6709138df291ae5e6144adb99cf212fd2c75b67772e0b6e4c36f2f40a7a1d6fb4209abef9044e08f5fe34c939b61068f3bce08b9d2faf51d13176d68c486c2f0ee93bdb83a9a6d9b2d507dd931d24ea46f904dd2b826abd066f80339af3c6102361fdf3cb345be162d557a3f9159c1f0b6d6ef5889d09b81688ee56fe69b7d691ee257f700f2b2efc0a99c316be7f8b5f52cd2b9e502f12e0fd3242a4c5ac57d79d0490b5fa20d61105176af0cc4a5bae01400d6ef77025b3c3f3d82137eff32be2711f270cfa9461b8901a813d9b1ddafeb351c35518bcffa271f2ab9b46a9ac6791d5526d16bf3cf84eb227068bf697e8d1138d42372c08ee50a8b5312a4cc16fc3588f8c894221552b43166aef7d0680f33854abae347c7136e3c2af043eeebd30ea6ed2a1e63250ebe5a3ef8632c5d350e073ef68cb95df8b3b3cee82805af2edca916275d43551fd058286197148ce2417bd9ab24d70bee2055b71b234bb0dbdcdb9d5409e7085cb3685221e0a2bcd904640dc8cc491260e1bdfa99e0b9d81c90518726ba44397b8e9d228c51b5698d49371cf8cd149d6ff"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x81) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='.\x00', 0x40000000) r10 = inotify_init() r11 = inotify_add_watch(r10, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r9, r11) inotify_rm_watch(r8, r11) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) open(&(0x7f0000000040)='./file0\x00', 0x200000, 0xed) connect(0xffffffffffffffff, 0x0, 0x0) [ 3399.690748] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3399.714971] loop3: p7 start 500206790 is beyond EOD, truncated [ 3399.723125] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3399.729336] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3399.735936] loop3: p10 start 13460217 is beyond EOD, truncated 15:26:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x28, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3399.761698] loop3: p11 start 129726472 is beyond EOD, truncated [ 3399.794067] loop3: p12 start 1441344512 is beyond EOD, truncated 15:26:26 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3399.822948] loop3: p13 start 471698834 is beyond EOD, truncated [ 3399.852784] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3399.853819] loop3: p14 start 3733177086 is beyond EOD, truncated 15:26:26 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001300)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000f5ffffffffffffff0000000200000000000000000000000000000000000000000000000000000000000000000000000000000036bf0400000093aaa238686a33"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000012c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000040)=0x60, &(0x7f0000000080)=0x1) r9 = dup2(r4, r5) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3399.974095] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3400.000667] loop3: partition table partially beyond EOD, truncated 15:26:26 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3400.029359] loop3: p1 start 448 is beyond EOD, truncated [ 3400.054304] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3400.086563] loop3: p3 start 958347629 is beyond EOD, truncated [ 3400.119269] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3400.139398] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3400.145926] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3400.154059] loop3: p7 start 500206790 is beyond EOD, truncated [ 3400.160936] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3400.167144] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3400.173462] loop3: p10 start 13460217 is beyond EOD, truncated [ 3400.179613] loop3: p11 start 129726472 is beyond EOD, truncated [ 3400.185775] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3400.192090] loop3: p13 start 471698834 is beyond EOD, truncated [ 3400.198252] loop3: p14 start 3733177086 is beyond EOD, truncated 15:26:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x37, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:26 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1, 0x2}, 0xfffffffffffffd5b) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:26 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:26 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r6, r7) ioctl$RTC_AIE_ON(r6, 0x7001) ioctl$RTC_ALM_SET(r6, 0x40247007, &(0x7f0000000380)) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r8, r9) ioctl$RTC_AIE_ON(r8, 0x7001) ioctl$RTC_ALM_SET(r8, 0x40247007, &(0x7f0000000380)) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r10, r11) ioctl$RTC_AIE_ON(r10, 0x7001) ioctl$RTC_ALM_SET(r10, 0x40247007, &(0x7f0000000380)) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r13 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r12, r13) ioctl$RTC_AIE_ON(r12, 0x7001) ioctl$RTC_ALM_SET(r12, 0x40247007, &(0x7f0000000380)) r14 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r15 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r16 = dup2(r14, r15) ioctl$RTC_UIE_ON(r16, 0x7003) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESOCT=0x0, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES32=r1, @ANYRES64=0x0, @ANYRES64=r5], @ANYRESHEX, @ANYBLOB="3d40f2597f655d537ad560460815a8a8891d79c8e4bd0958f41a2c1f45f49252fb901bd871d1af35c5f65d01", @ANYRESOCT=r6, @ANYBLOB="b000cf88910cc05f340588ba16564011cb6fe9fd40610c01f691e0724fe67d61903bebaa7e597ee6fcef5ee9b9867f3902f0f451ef8d88be1c106af23ee1f8b0ac2b7ca4c74d37e489e4cb053c1a4d8c94020b6c0c2e1ceddff02f800212a8b38239d183bd7102b5f39bb709475fa22f64c5f429cb01f496d2142721ed9d9fb004b5db56ee836fdfb1a61b37b05ed2d3bba02133abcaf7b4e3548c430ab37349", @ANYRES16, @ANYRESOCT=0x0], @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYBLOB="b20c11aaef3575991617adb9963b789094f6ae24a860411e8b39d76cfcf283c1431641fee10077b84a93a150119f8a86bdfcb62c22183a75322ae50239314cf16c7af93c4cd6437c364ffa874981f628f4bb0f771fa1f0870c42ef17ec2e365a5464b644525248f28c5c25bf6a4c553fd5a209ca812937c78f34f665b4abe2d74f5f3943cb49b598a50f98791be005e59ae0cd76faad915f49d8fcaa1839dac14d7044cfa82b96ac79111e9e107af0d2bd9b2d796e525b668e6f65b0abc93e415a82e7ffe3039f224a92c624d607408127ed90d52e2ff52bc8ac777cd62dbae5ac9d73ead224146f33f6a104c2cc686150193db7b730e073bebd55584d164e8a1a82bb384d553e10a6863efcfca6b05e863546edd51d4d5afa5e3709426d6c8019147b6d576f4c66ed904db46e57d4b6ae06ce88663d73b0b16e3c82822d1ddfc578cfbdfd8be96e6d8367e052d0245d51354f21e7a4533d3c85b29971541f375e4ee811315253770fe5a23ac2bd947ceb89ea783b03d14831d0fe74e7a6202e41a1c234ca6c98e32b52fa386cffd01df4e96d7bfa54da64be88ce52b8b815ba4f674064b6b4d95b90d4d3514bc83aa94adf7c042fdc311e668f685fafdcead9d0fdfc397a64e43bd8de55e2123b0429ecd8dc66e6e0f3fe0c0319455dd9f834d2167b19934a3f601e078e6f2d8359368a73eaabcf5b09df747010ee9056cf74cd5c485aa4962010f3c1cffe0bcf50200dd7f3bded40f0f619ede6e02c616ca48852363b83a832747ce8fbd7ba462247d70798eb4c0915689d9eef208729f7f5ea59d1c53d499200f3bc22b0cc3fb4cae24ee1eb62472b5cd000efc4db9436d76a62e03f575c3d6a54ea3e49d5eae4b42e0c7391717371deb1e7529f2c467fd7932c88cb78b3bc1bdbd2200f14712cdd2bf7cee54c04e2cb0e1055336ab9f13d97ed26ba513dd111b4b81017d3afe00a765fdf5f05a63ce69e7febc07f81238e0e0023ce5677cebd7b8b4ed2ab051bc07cd9c87e63b12c7470cf440a8ef4125489251ca7b09c78990da47d352663be92159f8d75c625aa88381bb1a7a80745a6a6ce4392d6650882f1920e206981298c10fad5b6adfffdaf8058727ac74a10aaa3f5d7d7c18d633a89e012bce86ce294921827656b79d4fa21f364d204752ccfe54af26a0f6178495e3ea2b1ecf08b480f281089f61dbc50be49146fc61bc9ce4d9d862f40a157d1e30efcec6b8bf3bd0db050b65da5b737c88cf381b6416bfec9aa79ca00bed95f6ffe9bc0f600fd2dde62b5ee09ec636e8a1755a33c3151f255fab5cc7035734f4e75f0a7038f174272e70e0e5ea57b0e966652816bf3e73e595f7010b2581e4bcb41b9ae7e13fe0e18f9795fd228bf008d79003579cc345d623e0d92eafc9557c66a07b0095f11063ef7a117fc8b003621dcf636ed3b1e0efa55034329a0813a5d0c6cfd6fe3b18f8523d2736f07846e125af2befc545af98a0c344f1b913bd68dd53b84b6cc74fc837f5bbdb7b58b6f3ea3257095e1a1b5ab0d31bbb0aad9f301b06291565dabb643d0f5c2c61840ecb96f2d3308bb6558a45782b51f162eaf128d47203e173bd7a5415b7470319871bfc9ef284dd8307b1043ecd45f8f1a331fc464aec8d88942066195c5d3162776fd5f1f22e9eef6e787b027f3389bec562aacc822e3f0fc334137e518139c92444f3e3acc3b3a6681a55327666a9b0fcff8d5b0276c4fa7164accf0e2832437d0321ee0e6f5fdeb923ba0c5f1128f439bd3ad8815a7a5a95f5530235997ccc7a3681c9e716afa9ca9f364b1f255ce9cb5ef31f3cae5cd46956ed9b409ea65861fba49ccec7e9271bf90a8f229eb3dc4fffa612d9ec31814d6d3538b97014705aca5d1dfca79c821fd22a0270b592f4e9913bcd84bd35473b6543883f8e15a32120eb3570b989b0452848763cc28ce9b327fc79097b4314875537a0d2fb41dc6ae0885080f6a4fc2dfcc7c181c01d36c2151d186d894306cc29437a9574e338a3c2784976923f4a76f8df8cba4274b5f85b59f100b137436060f98391e11f5ecaba03e1b8f3dacbe49d1c76726b96b6e76534c2aa5572ef77332f609850c22d3d85cec566669d74d70c0c496f1a05c83a7ceceded7e7f22bc9f4f08fcede75fdceb22951c447f998ff5a0afc948f0b1c151958c4a100813d0f9102720f97d0dc321c41b35fbdcd0c9ff4dfe9676109b1526073f74a007da18ab90907c451ab3e5178fb96a66af8757615e0e67593979ecc16ac82e92a8bcf5ff4c4b824965a6670750af2c687f2636d0b587cad996294901e7bb0c7ee4a2b897557fad2d3ac3dad8d71868deb0f2bd38187c928c1eff354844409bedcdf4c455e283acfd28d42abc477411cb935e518d0c6f2590227278cec8a15edc6cfabeb3f83bb92bd673818f5e2d219c678cddb5d924d59353fa4ff38e75f5aa67984638a2c3cd75751dd2e404274787e87aa07b71eca68142656f39cc09a1e3ef31a53d2558a6a07c7d38006edf0c8c5dedab27a1ce4c76acbcc277a7b4b34b4432dd9373f221031224f6c54532500db6702e263b969ddaba7a0d507cc6920af65e3566ce4c16d8b98d9e470415aec48eb0fdc2b7efb1a53954611ff01103e4c1357caa7393a7d425a3b06e9b51eece3c734c3c4a6b60df2330f56a269d4d894ce87d147c06166121f824ed9ea682f596009bb326781e61097ac370eba104aa500e6fe260d1ecb6fc69b9826630f8287fddc6fe6863394ff212656679dc315702dec395053bfd4b4353936404395ae88cb212f72a24fe360589ab7e0867a874a0fed20556bc10176fbedad8441f7c9aa685851e0a2493eaac4732f00c61b09a8eb493e3f6076199c9f627d773329be13e662a74c9ef9b1b6664d882017f9033dfce4ea4ab33af5bc56766c66950a88e0728cfea19e66db7c9f98a3b87ff97c2fd3da34d86c3e75007f7ffcc15e32d2f7fdd6a31b03d562c90f3fa8b24e1842df73b504cdba4cd9905163f93a50c55738e513b1d4a4cec9895f70545fad561f6e20d7c6c637b64eddcf652c9856c892a6a06d7bb13027c36fc472e3c2d03568acfbebc2c53a2cd2914ee92532a5607a421b77fbde0c82b2620e93b245a94c390e575dd1339eaacaef65919b615a634b08d49bf792cd00583649c557b2f00b84f8b35597876c7422909d0627296613659675e26fa71f9482f1694f71f28e00d3a8f6adb7791b711bcbed6f37a642e2d43f8d03190432ba7940c42b4f078c20f08dbed1a12a0830b719ee7f436bf330c07c0ad8417c980c70346156ae54c5f0b00265d6172ade75bd2d59ced8e52df77704d9db9153a3d5539c56721bbd5c7d71c51151a8f8a56ddc2a9c904695a317de20ba252f21b182b7a45d79dd7486847a9b65bf4af1f7b5ffecd9cbc5a884ae328670033a7f301561f57da46df8017677f789f7da60729db35c49a9e3241dbd7d53bcd71640c0558068d760e82643e4ad8e9ae61e35198ac50d9e147d6863953001421b2277e9ab9dfdffbc34053633f7198fa6e2b7f4331378b9989e421a2065e5026f87ff085285ba3cd515e139b0b9667c73087cc6eb04498d0276d5011087d08566943dadb0713cf144d7d46a5753012bc7546dc3066eae7afa6b939d3aa9bbafee44447aec910fb3a65fc9e57a7bcf692b2dad3e99836b220fdaf04b8f9a185ab6b7b9731c2082a089ce9f00369f634d181bf2cabc72f2ffd4e94fe71a905828b99e47f15624437725b05d8fa754db04a470e25ca63e0d1acadf737e0f65ed276360e857d3319f847c8444a101dd0660a5dca7bea616e0747a66cc2ad36d74cd2c12dd36d467c29cf15b323d5f9df009c1a4d08d9ae5d1cbd19b39eb9b1c92a14cbbc203e313247ef2742bbe820450d809e15a2d38896c632b548acdc8d998870b5712dfb8a3d7ea9c5a6f7782cd60d0c434c22bdbe4d3a46108bb42b3f3d4dd785215ff784d12dd40471f223b1edf2e579932e7779fd7ce8da53238b55f279c225a216d1c3db873d1ac5c9e22335c104675b0b99d7c2e16dbcfc6dc4b11f0b1d8d34d41c18bedbb940268f01f3891c6122fd22b8ee70ef1d82f1082d5762d66671c4dac43fd361d4edc7670d7a74e29cae3a677a87013c2ba90a48e4f235eb3462108efccdba064c91ea5642e11cac33e8e3f5e15008b6d5d61b13b1905b7e2f2f87f7c11426d539037c2499b997fc57624b84b12fe0452e287fe491c7f571638e25553443e424ba94521bd65368251ec3db27702cfedf0439af9d9f10874541289126f8f2d0711d123550145c0638f616bc9b09214ec80cec1782df4d68937e705f517ac43bc338d884b9fef418dbafbad6c9fc485eb275aa8abb4523c61fa50cf83de84759e930293dc652fcfefcd7fda4f558094f6501214c67c030835cc98457e033e58b9042cbd087796b18e64ba559938460b19ef3169047978f0bdf75a4fdc829ccbd952c8ac9967d5d7a1f4bbd4e0541bf1773089e179b11993563d6e0e5e9208b823b92184751f091f8c89e1f360a27238fdaf3eb96a34fe476c817bf8015b7e98a1143bfc62e8db7c53cffde4c23cef0341413de01edcdaf3c13864bd160e6f567629034016a69df784fc871b3ffc9152590c2a1dc43023525de5b2d49585a9a2546974873cfab7f7691930b947b88670a281779d4e296fb98e8fa23fa19e1855b1dddc00fed7cbe5df4bdbb7938ffc7d0f8dcec673e6bc82e3d975beb04fb3e903de9c85672eb9a3146bdcabfdbb67f1d8c9e78d60a43fc756fa2492b907f9587f93ab818b494963d8fa005a7159e712fc1b0ce700bc6a6a8e07b7cf54128659e95a37508c3f98571e15908d375422739967f8fae44fc7fd74c44edd42fd91d46549dde57f9ce476a49db31ec8fb0f37cfff89e860c030fad0655c2e35212e60f492b2a7aa8a6d900e7eb04e2390438c8979444b7e385e08e3bbec4b9106392621901db350f683291d8b1c0a35bf7f821831b9a7ce65c9fbabca1e900a0bd732b7222bd081f342ee169c74f133ab863510b1cb26c356ff6fda5b12b03658fbf3c333b939e6e9c2ee7f04b45a8ab49d1ca89364db491b5722fc182e310bd8ce3fc8b8d2f084d91c3ed3cf172835b31ea1d94779955f58372df727f4ee1a8ce96e02aaed3c8ea565a257b865ee424b1ce5d94d5423af7f20d39abffff5711d9da34589a35787effef7258ab5236f199871804302e305de7cfa516fe4146bbccac1069bfad460141eb7cbf39e9e32c3918824775da46283a419423de231220753c83bfbbc925ff672bf5f8bbaf6667c2d484f25fcb620227a2a8869ce8dd1c05b1ddf5226deb3540f00fd9e8fcd9fadf8b157aa719765698ada668b9a7a9d3e78a33c3ab52fc7d78556858cbe7e337d43d5e2f5dc9605803aae6f9194764db14327494bae2e0e9ed3523ed740d5ec255c3d340113d815c1dd8427e3c2cb69fa0a1445abd37b81e612db1f83336d2e9d2b274cf3d59721a82c7a2486a4adaddf56720a4eceb68f1750a04727e03ca7a1fd8cef79473b65fd5ff332f9f7078d5aa1cdc3b64d53fb7a65001e767793856e9bac311450173e4472e2d19b48657323029b501cc96a11be8291652d1ae1cfd3ada38aee285b79a0db75b1f08558a52b1b111cd0f9e8eeabe67d134397548b0a194fe448e3bd4ec96100c6165a0f09ecd516a2877688f5b979993f18f605e2f334f585d74d0a2d7b5183c54c7cd2ca31815efb3490f1334ae02f7719aa6275ac7548a2c52216f0f7d255bce2baf4", @ANYRESOCT, @ANYRES64=r2, @ANYPTR64, @ANYRESHEX, @ANYRESOCT, @ANYRES16=r8, @ANYRES64=r10, @ANYRES16=0x0], @ANYRESDEC=r12, @ANYRESDEC=r16], 0x4}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) [ 3400.411140] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:26:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0xe00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:26 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r7, &(0x7f0000000040)="7667dd79f073b713ae0b4bd5a236c245060000000000000092259ad910e2c7b37c4b997ea8797618cd43bf38f39a62f152d935cc646001c818081b1f924dd647dd441762e800d53d1f20dbb0d1e2bb3aecaff3", &(0x7f00000001c0)=""/4094}, 0xfffffffffffffdf5) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x2400, 0x511a0000) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r11 = semget$private(0x0, 0x4, 0x0) semop(r11, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:26 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x3c, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:26 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3400.650930] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:26:27 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x3ff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:27 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r4 = dup2(r2, r3) ioctl$RTC_UIE_ON(r4, 0x7003) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) bind$packet(r7, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000004d4000000000000000", @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x25c}}, 0x0) bind$can_raw(r4, &(0x7f0000000040)={0x1d, r9}, 0x10) r10 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r10, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000000200000000af1794031d166cac000000000000000000000000000000000000000000000000000000b9cc006bdd09d807d7e5c3e4adacbbdb225c4f8e993f74dc8c5a44b71fa071661d8dcd6f640cc9aa880fabab0ec75e3d4cb2099efd2fc4625a3fe7e4cad3ebdd0d928f5aa073cf747b8bcc7e8bf852d047"], 0x48) getpid() r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r13 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r14 = dup2(r12, r13) ioctl$RTC_UIE_ON(r14, 0x7003) mq_notify(r14, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r11, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r11, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r15 = semget$private(0x0, 0x4, 0x0) semop(r15, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:27 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5, 0xffffffffffffffff}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) r9 = request_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffa) add_key$keyring(0x0, 0x0, 0x0, 0x0, r9) r10 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000001380)={'syz', 0x3}, 0x0, 0x0, r9) keyctl$read(0xb, r10, &(0x7f00000013c0)=""/86, 0x56) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3400.780599] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3400.818883] CPU: 0 PID: 30953 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 15:26:27 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3400.826748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3400.836116] Call Trace: [ 3400.838733] dump_stack+0x197/0x210 [ 3400.842383] sysfs_warn_dup.cold+0x1c/0x31 [ 3400.842403] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3400.852083] sysfs_create_link+0x65/0xc0 [ 3400.852101] device_add+0x7ce/0x1760 [ 3400.852121] ? get_device_parent.isra.0+0x570/0x570 [ 3400.852134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3400.852156] wiphy_register+0x16fa/0x21d0 [ 3400.852172] ? show_schedstat+0x832/0xbb0 [ 3400.852192] ? wiphy_unregister+0xfd0/0xfd0 [ 3400.852209] ? rcu_read_lock_sched_held+0x110/0x130 [ 3400.852225] ? __kmalloc+0x5e1/0x750 [ 3400.879149] ? trace_hardirqs_on+0x67/0x220 [ 3400.879168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3400.879186] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3400.912813] ieee80211_register_hw+0x156e/0x3800 [ 3400.912836] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3400.922420] ? hrtimer_init+0x8b/0x300 [ 3400.922439] ? mac80211_hwsim_addr_match+0x200/0x200 15:26:27 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3400.931430] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3400.936457] ? cred_has_capability+0x193/0x320 [ 3400.941074] ? hwsim_exit_net+0xc50/0xc50 [ 3400.945244] ? __mutex_lock+0xa67/0x1300 [ 3400.951253] hwsim_new_radio_nl+0x5eb/0x893 [ 3400.955595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3400.961331] ? security_capable+0x92/0xc0 [ 3400.965570] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3400.965596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3400.976311] ? nla_parse+0x1fc/0x2f0 [ 3400.980054] genl_family_rcv_msg+0x6db/0xd30 [ 3400.984579] ? genl_unregister_family+0x790/0x790 [ 3400.990484] ? rcu_read_unlock_special+0x679/0xea0 [ 3400.995429] ? find_held_lock+0x35/0x130 [ 3400.999522] genl_rcv_msg+0xca/0x170 [ 3401.003280] netlink_rcv_skb+0x17d/0x460 [ 3401.007360] ? genl_family_rcv_msg+0xd30/0xd30 [ 3401.011959] ? netlink_ack+0xb30/0xb30 [ 3401.015877] genl_rcv+0x29/0x40 [ 3401.019169] netlink_unicast+0x53a/0x730 [ 3401.023257] ? netlink_attachskb+0x770/0x770 [ 3401.027810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.033399] netlink_sendmsg+0x8ae/0xd70 [ 3401.037482] ? netlink_unicast+0x730/0x730 [ 3401.041744] ? selinux_socket_sendmsg+0x36/0x40 [ 3401.046437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.052003] ? security_socket_sendmsg+0x8d/0xc0 [ 3401.056885] ? netlink_unicast+0x730/0x730 [ 3401.061142] sock_sendmsg+0xd7/0x130 [ 3401.064876] ___sys_sendmsg+0x803/0x920 [ 3401.068874] ? copy_msghdr_from_user+0x430/0x430 [ 3401.073654] ? lock_downgrade+0x880/0x880 [ 3401.077847] ? kasan_check_read+0x11/0x20 15:26:27 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3401.082017] ? __fget+0x367/0x540 [ 3401.085491] ? iterate_fd+0x360/0x360 [ 3401.089312] ? lock_downgrade+0x880/0x880 [ 3401.093476] ? __fget_light+0x1a9/0x230 [ 3401.097466] ? __fdget+0x1b/0x20 [ 3401.100841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3401.106392] __sys_sendmsg+0x105/0x1d0 [ 3401.110294] ? __ia32_sys_shutdown+0x80/0x80 [ 3401.114735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3401.119502] ? do_syscall_64+0x26/0x620 [ 3401.123489] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3401.128867] ? do_syscall_64+0x26/0x620 [ 3401.132866] __x64_sys_sendmsg+0x78/0xb0 [ 3401.136978] do_syscall_64+0xfd/0x620 [ 3401.137001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3401.145986] RIP: 0033:0x45a6f9 [ 3401.149602] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3401.168691] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4e, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3401.176431] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3401.176440] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3401.176448] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3401.176455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3401.176462] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:27 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x160a, @empty, 0xc8d3}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xe, 0xb, 0x4000000000000800, 0x1, 0x8, 0xffffffffffffffff, 0x0, [], 0x0, r5}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3401.249882] Dev loop3: unable to read RDB block 1 [ 3401.254821] loop3: unable to read partition table [ 3401.286261] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:26:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0xe53, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:27 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:27 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x3}, 0xfffffffffffffe1d) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r6, 0x111, 0x1, 0x0, 0x4) connect(0xffffffffffffffff, 0x0, 0x0) [ 3401.312684] loop3: partition table beyond EOD, truncated [ 3401.341864] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3401.413608] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3401.434221] CPU: 0 PID: 31266 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3401.442511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3401.451884] Call Trace: [ 3401.454495] dump_stack+0x197/0x210 [ 3401.458151] sysfs_warn_dup.cold+0x1c/0x31 15:26:27 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3401.462413] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3401.467805] sysfs_create_link+0x65/0xc0 [ 3401.472046] device_add+0x7ce/0x1760 [ 3401.475792] ? get_device_parent.isra.0+0x570/0x570 [ 3401.480821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.486381] wiphy_register+0x16fa/0x21d0 [ 3401.490550] ? show_schedstat+0x832/0xbb0 [ 3401.494723] ? wiphy_unregister+0xfd0/0xfd0 [ 3401.499061] ? rcu_read_lock_sched_held+0x110/0x130 [ 3401.504095] ? __kmalloc+0x5e1/0x750 [ 3401.507823] ? trace_hardirqs_on+0x67/0x220 [ 3401.512160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.517708] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3401.522654] ieee80211_register_hw+0x156e/0x3800 [ 3401.527452] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3401.532312] ? hrtimer_init+0x8b/0x300 [ 3401.536211] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3401.541338] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3401.546400] ? cred_has_capability+0x193/0x320 [ 3401.551011] ? hwsim_exit_net+0xc50/0xc50 [ 3401.555177] ? __mutex_lock+0xa67/0x1300 [ 3401.559282] hwsim_new_radio_nl+0x5eb/0x893 [ 3401.563617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.569164] ? security_capable+0x92/0xc0 [ 3401.569184] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3401.569208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.584201] ? nla_parse+0x1fc/0x2f0 [ 3401.587930] genl_family_rcv_msg+0x6db/0xd30 [ 3401.587951] ? genl_unregister_family+0x790/0x790 [ 3401.587969] ? rcu_read_unlock_special+0x679/0xea0 [ 3401.602133] ? find_held_lock+0x35/0x130 [ 3401.606225] genl_rcv_msg+0xca/0x170 [ 3401.606243] netlink_rcv_skb+0x17d/0x460 [ 3401.614008] ? genl_family_rcv_msg+0xd30/0xd30 [ 3401.618602] ? netlink_ack+0xb30/0xb30 [ 3401.618633] genl_rcv+0x29/0x40 [ 3401.625789] netlink_unicast+0x53a/0x730 [ 3401.629889] ? netlink_attachskb+0x770/0x770 [ 3401.634321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.639872] netlink_sendmsg+0x8ae/0xd70 [ 3401.643946] ? netlink_unicast+0x730/0x730 [ 3401.648220] ? selinux_socket_sendmsg+0x36/0x40 [ 3401.652913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3401.658465] ? security_socket_sendmsg+0x8d/0xc0 [ 3401.663230] ? netlink_unicast+0x730/0x730 [ 3401.667485] sock_sendmsg+0xd7/0x130 [ 3401.671230] ___sys_sendmsg+0x803/0x920 [ 3401.675224] ? copy_msghdr_from_user+0x430/0x430 [ 3401.679995] ? lock_downgrade+0x880/0x880 [ 3401.684163] ? kasan_check_read+0x11/0x20 [ 3401.688334] ? __fget+0x367/0x540 [ 3401.691807] ? iterate_fd+0x360/0x360 [ 3401.695617] ? lock_downgrade+0x880/0x880 [ 3401.699779] ? __fget_light+0x1a9/0x230 [ 3401.703768] ? __fdget+0x1b/0x20 [ 3401.707152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 15:26:27 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r4 = dup2(r2, r3) ioctl$RTC_UIE_ON(r4, 0x7003) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x39}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x1, {0x3, 0x1, "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", 0x6, 0x3f, 0x43, 0xb8, 0x4, 0x1, 0x7, 0x1}, r8}}, 0x128) r9 = dup2(r0, r1) ioctl$RTC_UIE_ON(r9, 0x7003) sendmsg$TIPC_NL_LINK_GET(r9, &(0x7f0000000180)={0x0, 0x52, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) 15:26:27 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3401.712971] __sys_sendmsg+0x105/0x1d0 [ 3401.716873] ? __ia32_sys_shutdown+0x80/0x80 [ 3401.721308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3401.726078] ? do_syscall_64+0x26/0x620 [ 3401.730066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3401.735433] ? do_syscall_64+0x26/0x620 [ 3401.735456] __x64_sys_sendmsg+0x78/0xb0 [ 3401.735473] do_syscall_64+0xfd/0x620 [ 3401.747289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3401.752488] RIP: 0033:0x45a6f9 [ 3401.755685] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3401.774585] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3401.774601] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3401.774609] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3401.774617] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3401.774624] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 15:26:28 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x540c0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:28 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x4, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x56, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3401.774632] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3401.932973] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3401.951792] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 15:26:28 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0xf00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3401.987772] loop3: partition table partially beyond EOD, truncated [ 3402.020158] loop3: p1 start 448 is beyond EOD, truncated [ 3402.034003] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3402.060812] loop3: p3 start 958347629 is beyond EOD, truncated 15:26:28 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = accept4$inet(r2, &(0x7f00000011c0)={0x2, 0x0, @initdev}, &(0x7f0000001200)=0x10, 0x800) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f00000014c0)={0x3, {{0x2, 0x4e20, @empty}}, 0x3, 0x3, [{{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}}]}, 0x210) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) socketpair(0x4, 0x6, 0xd4, &(0x7f0000000080)) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3402.105292] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3402.114751] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3402.124845] loop3: p5 start 1813757113 is beyond EOD, truncated 15:26:28 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) r3 = dup2(r1, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001480)=0xe8) r5 = socket(0xa, 0x1, 0x0) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r6, 0x0) mount$fuseblk(&(0x7f00000012c0)='/dev/loop0\x00', &(0x7f0000001300)='./file0\x00', &(0x7f0000001340)='fuseblk\x00', 0x8808, &(0x7f0000001600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',e=000000000100000,usep_id=\x00'/42, @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303830302c64656661756c745f7065726d697373496f6e732c736d61636b66737472616e736d7574653d6d616e676c65002c726f6f74636f6e746578743d756e636f6e66696e65645f752c6673757569643d64636233650064142d356561002d393536662d3862a5312d64e96232643932602c009fe8686e9bc582a26bc22c8e375c06eddfd85a59170844d71d93f4960ff40787b87422ab79217ae543d03499ccc16cc5ff7790"]) getpid() r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) mq_notify(r10, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r7, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r11 = semget$private(0x0, 0x4, 0x0) semop(r11, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x69, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:28 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3402.155904] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3402.163435] loop3: p7 start 500206790 is beyond EOD, truncated [ 3402.189708] CPU: 0 PID: 31595 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3402.197585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3402.206958] Call Trace: [ 3402.209569] dump_stack+0x197/0x210 [ 3402.213225] sysfs_warn_dup.cold+0x1c/0x31 [ 3402.217490] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3402.222884] sysfs_create_link+0x65/0xc0 [ 3402.226963] device_add+0x7ce/0x1760 [ 3402.230698] ? get_device_parent.isra.0+0x570/0x570 [ 3402.235733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3402.241303] wiphy_register+0x16fa/0x21d0 [ 3402.245475] ? show_schedstat+0x832/0xbb0 [ 3402.249639] ? wiphy_unregister+0xfd0/0xfd0 [ 3402.253983] ? rcu_read_lock_sched_held+0x110/0x130 [ 3402.259016] ? __kmalloc+0x5e1/0x750 [ 3402.262739] ? trace_hardirqs_on+0x67/0x220 [ 3402.267081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3402.272646] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3402.277594] ieee80211_register_hw+0x156e/0x3800 [ 3402.282400] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3402.287258] ? hrtimer_init+0x8b/0x300 [ 3402.291157] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3402.296274] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3402.301304] ? cred_has_capability+0x193/0x320 [ 3402.305340] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3402.305924] ? hwsim_exit_net+0xc50/0xc50 [ 3402.316135] hwsim_new_radio_nl+0x5eb/0x893 [ 3402.320002] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3402.320482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3402.320498] ? security_capable+0x92/0xc0 [ 3402.320517] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3402.341446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3402.345552] loop3: p10 start 13460217 is beyond EOD, truncated [ 3402.346995] ? nla_parse+0x1fc/0x2f0 [ 3402.347021] genl_family_rcv_msg+0x6db/0xd30 [ 3402.347044] ? genl_unregister_family+0x790/0x790 [ 3402.347060] ? __local_bh_enable_ip+0x15a/0x270 [ 3402.347077] ? __dev_queue_xmit+0x892/0x2fe0 [ 3402.373164] loop3: p11 start 129726472 is beyond EOD, truncated [ 3402.375055] genl_rcv_msg+0xca/0x170 [ 3402.375076] netlink_rcv_skb+0x17d/0x460 [ 3402.375091] ? genl_family_rcv_msg+0xd30/0xd30 [ 3402.375111] ? netlink_ack+0xb30/0xb30 [ 3402.397392] genl_rcv+0x29/0x40 [ 3402.400684] netlink_unicast+0x53a/0x730 [ 3402.405401] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3402.406226] ? netlink_attachskb+0x770/0x770 [ 3402.416771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3402.422326] netlink_sendmsg+0x8ae/0xd70 [ 3402.426412] ? netlink_unicast+0x730/0x730 [ 3402.430680] ? selinux_socket_sendmsg+0x36/0x40 [ 3402.435363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3402.440918] ? security_socket_sendmsg+0x8d/0xc0 [ 3402.445689] ? netlink_unicast+0x730/0x730 [ 3402.448389] loop3: p13 start 471698834 is beyond EOD, truncated [ 3402.449962] sock_sendmsg+0xd7/0x130 [ 3402.449981] ___sys_sendmsg+0x803/0x920 [ 3402.450001] ? copy_msghdr_from_user+0x430/0x430 [ 3402.450023] ? lock_downgrade+0x880/0x880 [ 3402.450041] ? kasan_check_read+0x11/0x20 [ 3402.450060] ? __fget+0x367/0x540 [ 3402.450078] ? iterate_fd+0x360/0x360 [ 3402.450092] ? lock_downgrade+0x880/0x880 [ 3402.450114] ? __fget_light+0x1a9/0x230 [ 3402.450128] ? __fdget+0x1b/0x20 [ 3402.450142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3402.450159] __sys_sendmsg+0x105/0x1d0 [ 3402.450173] ? __ia32_sys_shutdown+0x80/0x80 [ 3402.450199] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3402.450216] ? do_syscall_64+0x26/0x620 [ 3402.464889] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3402.464906] ? do_syscall_64+0x26/0x620 [ 3402.464929] __x64_sys_sendmsg+0x78/0xb0 [ 3402.464945] do_syscall_64+0xfd/0x620 [ 3402.471027] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3402.473837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3402.473850] RIP: 0033:0x45a6f9 [ 3402.473861] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3402.473872] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3402.502327] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3402.502336] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3402.502344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3402.502351] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3402.502358] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3402.622928] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3402.690679] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3402.697596] loop3: partition table partially beyond EOD, truncated [ 3402.723851] loop3: p1 start 448 is beyond EOD, truncated 15:26:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x1100, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:29 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x6e, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3402.737178] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3402.756258] loop3: p3 start 958347629 is beyond EOD, truncated [ 3402.777447] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3402.810423] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3402.830709] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3402.836848] loop3: p7 start 500206790 is beyond EOD, truncated [ 3402.837574] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3402.884493] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3402.891395] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3402.898658] loop3: p10 start 13460217 is beyond EOD, truncated [ 3402.913799] loop3: p11 start 129726472 is beyond EOD, truncated [ 3402.928411] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3402.928881] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3402.951506] CPU: 1 PID: 31918 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3402.959346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3402.959543] loop3: p13 start 471698834 is beyond EOD, truncated [ 3402.968712] Call Trace: [ 3402.968740] dump_stack+0x197/0x210 [ 3402.968765] sysfs_warn_dup.cold+0x1c/0x31 [ 3402.985247] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3402.990622] sysfs_create_link+0x65/0xc0 [ 3402.994691] device_add+0x7ce/0x1760 [ 3402.995617] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3402.998413] ? get_device_parent.isra.0+0x570/0x570 [ 3402.998429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.015136] wiphy_register+0x16fa/0x21d0 [ 3403.019289] ? show_schedstat+0x832/0xbb0 [ 3403.023444] ? wiphy_unregister+0xfd0/0xfd0 [ 3403.027759] ? rcu_read_lock_sched_held+0x110/0x130 [ 3403.032769] ? __kmalloc+0x5e1/0x750 [ 3403.036472] ? trace_hardirqs_on+0x67/0x220 [ 3403.040801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.046328] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3403.051249] ieee80211_register_hw+0x156e/0x3800 [ 3403.056001] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3403.060836] ? hrtimer_init+0x8b/0x300 [ 3403.064712] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3403.069823] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3403.074842] ? cred_has_capability+0x193/0x320 [ 3403.079438] ? hwsim_exit_net+0xc50/0xc50 [ 3403.083579] ? __mutex_lock+0xa67/0x1300 [ 3403.087635] hwsim_new_radio_nl+0x5eb/0x893 [ 3403.091963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.097503] ? security_capable+0x92/0xc0 [ 3403.101655] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3403.106852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.112383] ? nla_parse+0x1fc/0x2f0 [ 3403.116094] genl_family_rcv_msg+0x6db/0xd30 [ 3403.120501] ? genl_unregister_family+0x790/0x790 [ 3403.125336] ? __local_bh_enable_ip+0x15a/0x270 [ 3403.129996] ? __dev_queue_xmit+0x892/0x2fe0 [ 3403.134406] genl_rcv_msg+0xca/0x170 [ 3403.138113] netlink_rcv_skb+0x17d/0x460 [ 3403.142167] ? genl_family_rcv_msg+0xd30/0xd30 [ 3403.146746] ? netlink_ack+0xb30/0xb30 [ 3403.150648] genl_rcv+0x29/0x40 [ 3403.153919] netlink_unicast+0x53a/0x730 [ 3403.157973] ? netlink_attachskb+0x770/0x770 [ 3403.162376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.167905] netlink_sendmsg+0x8ae/0xd70 [ 3403.171963] ? netlink_unicast+0x730/0x730 [ 3403.176221] ? selinux_socket_sendmsg+0x36/0x40 [ 3403.180915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.186471] ? security_socket_sendmsg+0x8d/0xc0 [ 3403.191228] ? netlink_unicast+0x730/0x730 [ 3403.195465] sock_sendmsg+0xd7/0x130 [ 3403.199189] ___sys_sendmsg+0x803/0x920 [ 3403.203164] ? copy_msghdr_from_user+0x430/0x430 [ 3403.207915] ? lock_downgrade+0x880/0x880 [ 3403.212058] ? kasan_check_read+0x11/0x20 [ 3403.216199] ? __fget+0x367/0x540 [ 3403.219654] ? iterate_fd+0x360/0x360 [ 3403.223446] ? lock_downgrade+0x880/0x880 [ 3403.227585] ? __fget_light+0x1a9/0x230 [ 3403.231548] ? __fdget+0x1b/0x20 [ 3403.234905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3403.240448] __sys_sendmsg+0x105/0x1d0 [ 3403.244328] ? __ia32_sys_shutdown+0x80/0x80 [ 3403.248738] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3403.253482] ? do_syscall_64+0x26/0x620 [ 3403.257447] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3403.262798] ? do_syscall_64+0x26/0x620 [ 3403.266764] __x64_sys_sendmsg+0x78/0xb0 [ 3403.270818] do_syscall_64+0xfd/0x620 [ 3403.274610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3403.279787] RIP: 0033:0x45a6f9 [ 3403.283056] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3403.301974] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3403.309789] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3403.317193] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3403.324460] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3403.331722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3403.338994] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:29 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x2404c084}, 0x18001) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000000c0)=0x1, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7, 0xa498459712d69570) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f00000001c0)) 15:26:29 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001400)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000020000e00000000000000000000000000000000000000000000000000000000000000000000000003096f8ffffffffffffff4f374f4657242aee63d0eced862443015916013e6580393aec7a8d98fab61076a105412e24cee2fafaab9e94ca077b8172f95cb634ae91c5c5919c7882aababf4c7b955cf4b454d88dba74"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r7, &(0x7f00000013c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8080e000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001940)=ANY=[@ANYBLOB="b0010000", @ANYRES16=r8, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x8040}, 0x4a000) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r4, r9) ioctl$RTC_UIE_ON(r10, 0x7003) r11 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r11) mq_notify(r10, &(0x7f0000000140)={0x0, 0x3f, 0x4, @tid=r11}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r12 = semget$private(0x0, 0x4, 0x0) semop(r12, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:29 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) semget$private(0x0, 0x4, 0x0) r7 = semget(0x3, 0x1, 0x0) semctl$GETVAL(r7, 0x0, 0xc, &(0x7f00000002c0)=""/102) semop(r7, &(0x7f0000001380), 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x78, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:29 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x1200, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3403.485291] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:26:29 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3403.620731] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3403.634131] CPU: 0 PID: 31940 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3403.642157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3403.651660] Call Trace: [ 3403.654281] dump_stack+0x197/0x210 [ 3403.657947] sysfs_warn_dup.cold+0x1c/0x31 [ 3403.662225] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3403.667622] sysfs_create_link+0x65/0xc0 [ 3403.671712] device_add+0x7ce/0x1760 [ 3403.675453] ? get_device_parent.isra.0+0x570/0x570 [ 3403.680483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.686047] wiphy_register+0x16fa/0x21d0 [ 3403.690299] ? show_schedstat+0x832/0xbb0 [ 3403.694551] ? wiphy_unregister+0xfd0/0xfd0 [ 3403.699073] ? rcu_read_lock_sched_held+0x110/0x130 [ 3403.704199] ? __kmalloc+0x5e1/0x750 [ 3403.707932] ? trace_hardirqs_on+0x67/0x220 [ 3403.712278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.717838] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3403.722786] ieee80211_register_hw+0x156e/0x3800 [ 3403.727563] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3403.732418] ? hrtimer_init+0x8b/0x300 [ 3403.736317] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3403.741449] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3403.746492] ? cred_has_capability+0x193/0x320 [ 3403.751468] ? hwsim_exit_net+0xc50/0xc50 [ 3403.755636] ? __mutex_lock+0xa67/0x1300 [ 3403.759721] hwsim_new_radio_nl+0x5eb/0x893 [ 3403.764133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.769687] ? security_capable+0x92/0xc0 [ 3403.773853] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3403.779064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.784621] ? nla_parse+0x1fc/0x2f0 [ 3403.788353] genl_family_rcv_msg+0x6db/0xd30 [ 3403.792780] ? genl_unregister_family+0x790/0x790 [ 3403.798075] ? __local_bh_enable_ip+0x15a/0x270 [ 3403.802759] ? __dev_queue_xmit+0x892/0x2fe0 [ 3403.807247] genl_rcv_msg+0xca/0x170 [ 3403.810984] netlink_rcv_skb+0x17d/0x460 [ 3403.815073] ? genl_family_rcv_msg+0xd30/0xd30 [ 3403.819684] ? netlink_ack+0xb30/0xb30 [ 3403.823606] genl_rcv+0x29/0x40 [ 3403.826990] netlink_unicast+0x53a/0x730 [ 3403.831071] ? netlink_attachskb+0x770/0x770 [ 3403.835514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.841077] netlink_sendmsg+0x8ae/0xd70 [ 3403.845170] ? netlink_unicast+0x730/0x730 [ 3403.849434] ? selinux_socket_sendmsg+0x36/0x40 [ 3403.854121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.859693] ? security_socket_sendmsg+0x8d/0xc0 [ 3403.865759] ? netlink_unicast+0x730/0x730 [ 3403.870022] sock_sendmsg+0xd7/0x130 [ 3403.873763] ___sys_sendmsg+0x803/0x920 [ 3403.877760] ? copy_msghdr_from_user+0x430/0x430 [ 3403.882539] ? lock_downgrade+0x880/0x880 [ 3403.886707] ? kasan_check_read+0x11/0x20 [ 3403.890961] ? __fget+0x367/0x540 [ 3403.894437] ? iterate_fd+0x360/0x360 [ 3403.898258] ? lock_downgrade+0x880/0x880 [ 3403.902425] ? __fget_light+0x1a9/0x230 [ 3403.906415] ? __fdget+0x1b/0x20 [ 3403.909795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3403.915438] __sys_sendmsg+0x105/0x1d0 15:26:30 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001400)=ANY=[@ANYBLOB="7261770000000001010000ff7e00f3ffff74eb000000df00000000d116ac997529a501000000009e8f2ab9db6a0b329b9de58000000000000000000005008362b0acfde75e3dcc695a3d758941c91158"], 0x352) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) bind$netrom(r9, &(0x7f0000001380)={{0x3, @null, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x7, 0x10) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3403.919345] ? __ia32_sys_shutdown+0x80/0x80 [ 3403.923783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3403.928551] ? do_syscall_64+0x26/0x620 [ 3403.932539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3403.938018] ? do_syscall_64+0x26/0x620 [ 3403.942026] __x64_sys_sendmsg+0x78/0xb0 [ 3403.946116] do_syscall_64+0xfd/0x620 [ 3403.949942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3403.956269] RIP: 0033:0x45a6f9 [ 3403.959821] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3403.978746] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3403.986645] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3403.993921] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3404.001202] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3404.009436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 15:26:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x86, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3404.016719] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:30 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:30 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000000000000000000000800000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c00020008000100000000003400020008000100000000000800030000000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000040)) [ 3404.080018] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:26:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x1300, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:30 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3404.293214] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3404.338910] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3404.349776] loop3: partition table partially beyond EOD, truncated [ 3404.378850] CPU: 0 PID: 32366 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3404.387322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3404.396871] Call Trace: [ 3404.399481] dump_stack+0x197/0x210 [ 3404.403135] sysfs_warn_dup.cold+0x1c/0x31 [ 3404.407401] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3404.413487] sysfs_create_link+0x65/0xc0 [ 3404.417581] device_add+0x7ce/0x1760 [ 3404.421353] ? get_device_parent.isra.0+0x570/0x570 [ 3404.426393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3404.431961] wiphy_register+0x16fa/0x21d0 [ 3404.436134] ? show_schedstat+0x832/0xbb0 [ 3404.440309] ? wiphy_unregister+0xfd0/0xfd0 [ 3404.445261] ? rcu_read_lock_sched_held+0x110/0x130 [ 3404.450317] ? __kmalloc+0x5e1/0x750 [ 3404.450334] ? trace_hardirqs_on+0x67/0x220 [ 3404.450349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3404.450363] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3404.450381] ieee80211_register_hw+0x156e/0x3800 [ 3404.450402] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3404.450419] ? hrtimer_init+0x8b/0x300 [ 3404.450435] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3404.450454] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3404.450468] ? cred_has_capability+0x193/0x320 [ 3404.450491] ? hwsim_exit_net+0xc50/0xc50 [ 3404.450514] hwsim_new_radio_nl+0x5eb/0x893 [ 3404.450526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3404.450539] ? security_capable+0x92/0xc0 [ 3404.450554] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3404.450572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3404.450589] ? nla_parse+0x1fc/0x2f0 [ 3404.458871] genl_family_rcv_msg+0x6db/0xd30 [ 3404.458892] ? genl_unregister_family+0x790/0x790 15:26:30 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000013c0)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000066a2a40000000200000000000000000000000010000000000000000f402994ea230000143c22de3ce016b0080000000000"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/ocfs2_control\x00', 0x60200, 0x0) getsockopt$EBT_SO_GET_INFO(r6, 0x0, 0x80, &(0x7f0000001300)={'nat\x00'}, &(0x7f0000001380)=0x78) r7 = dup2(r4, r5) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400300, 0x0) ioctl$TUNGETVNETHDRSZ(r8, 0x800454d7, &(0x7f0000000080)) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0xc9, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:30 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:30 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x3c) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x880800) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3404.466444] loop3: p1 start 448 is beyond EOD, truncated [ 3404.469384] ? rcu_read_unlock_special+0x679/0xea0 [ 3404.469402] ? find_held_lock+0x35/0x130 [ 3404.469433] genl_rcv_msg+0xca/0x170 [ 3404.476892] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3404.479014] netlink_rcv_skb+0x17d/0x460 [ 3404.479030] ? genl_family_rcv_msg+0xd30/0xd30 [ 3404.479047] ? netlink_ack+0xb30/0xb30 [ 3404.507163] loop3: p3 start 958347629 is beyond EOD, truncated [ 3404.511682] genl_rcv+0x29/0x40 [ 3404.511697] netlink_unicast+0x53a/0x730 [ 3404.511716] ? netlink_attachskb+0x770/0x770 [ 3404.511734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3404.511752] netlink_sendmsg+0x8ae/0xd70 [ 3404.511771] ? netlink_unicast+0x730/0x730 [ 3404.521103] ? selinux_socket_sendmsg+0x36/0x40 [ 3404.521118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3404.521132] ? security_socket_sendmsg+0x8d/0xc0 [ 3404.521148] ? netlink_unicast+0x730/0x730 [ 3404.521165] sock_sendmsg+0xd7/0x130 [ 3404.521181] ___sys_sendmsg+0x803/0x920 [ 3404.534852] ? copy_msghdr_from_user+0x430/0x430 [ 3404.541537] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3404.545155] ? lock_downgrade+0x880/0x880 [ 3404.545177] ? kasan_check_read+0x11/0x20 [ 3404.595261] ? __fget+0x367/0x540 [ 3404.595280] ? iterate_fd+0x360/0x360 [ 3404.595298] ? lock_downgrade+0x880/0x880 [ 3404.614059] ? __fget_light+0x1a9/0x230 [ 3404.614076] ? __fdget+0x1b/0x20 [ 3404.634520] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3404.636505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3404.636530] __sys_sendmsg+0x105/0x1d0 [ 3404.636547] ? __ia32_sys_shutdown+0x80/0x80 [ 3404.636572] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3404.675018] ? do_syscall_64+0x26/0x620 [ 3404.675035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3404.675048] ? do_syscall_64+0x26/0x620 [ 3404.675068] __x64_sys_sendmsg+0x78/0xb0 [ 3404.709703] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3404.713648] do_syscall_64+0xfd/0x620 [ 3404.713670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3404.713681] RIP: 0033:0x45a6f9 [ 3404.713696] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3404.756288] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3404.756301] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3404.756309] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3404.756315] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:26:31 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3404.756323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3404.756330] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3404.806529] loop3: p7 start 500206790 is beyond EOD, truncated 15:26:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0xf0, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x1400, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3404.861889] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3404.880585] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3404.918180] loop3: p10 start 13460217 is beyond EOD, truncated [ 3404.942356] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3404.951145] loop3: p11 start 129726472 is beyond EOD, truncated [ 3404.951159] loop3: p12 start 1441344512 is beyond EOD, truncated 15:26:31 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r6, &(0x7f0000001340)="0c18215392cd1c520ca4721095c43d0df547c1b22dcaca6a95a6316c421b24a741f8ac083aaefb220b7269a13f9c1154afbcd81dc81ec3baa9a86d5e817e1f6c6a221f07f7827f88e6ea411c887ac13bc3d0f768addacf6d28a1602ce5c25192474c06f13846993247aa5c97fa0aaffe560ee53e7ee830f5bb9697507f4cc7ac87bf559d2d1c61d4ec7ff08ac3c27329a79244aef4a2828788c2e61f4498910d81569cb3c238459eb724998671f0b82de8c0862bff3328efcc57e62e9223e52d015505db7947041fe5752731c82d4f7a2aab28115f1dfd98aea7493e5e1116caab7d6f49caced2b6fe51f7829f606a828bbf", &(0x7f00000012c0)="a2d3b5c7eb2831a2f90ae0ae4e98529e460922b94fbba9be65f8c4cf52ba51edd64aefc91cd32b9ee5534fa6569e8cd8056020526e944df4b8a5ebb8ca7d7dae74efe8f2997bdc9945834e4bcae910fab4fc78d5503b0000"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x9) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:31 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3404.951168] loop3: p13 start 471698834 is beyond EOD, truncated [ 3404.951177] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3405.053845] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3405.086910] CPU: 1 PID: 32597 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3405.094798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3405.104866] Call Trace: [ 3405.107482] dump_stack+0x197/0x210 [ 3405.111149] sysfs_warn_dup.cold+0x1c/0x31 [ 3405.115415] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3405.120816] sysfs_create_link+0x65/0xc0 [ 3405.124895] device_add+0x7ce/0x1760 [ 3405.128649] ? get_device_parent.isra.0+0x570/0x570 [ 3405.133687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3405.139767] wiphy_register+0x16fa/0x21d0 [ 3405.143931] ? show_schedstat+0x832/0xbb0 [ 3405.148123] ? wiphy_unregister+0xfd0/0xfd0 [ 3405.152464] ? rcu_read_lock_sched_held+0x110/0x130 [ 3405.157487] ? __kmalloc+0x5e1/0x750 [ 3405.161210] ? trace_hardirqs_on+0x67/0x220 [ 3405.165545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3405.171095] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3405.171116] ieee80211_register_hw+0x156e/0x3800 [ 3405.171140] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3405.171159] ? hrtimer_init+0x8b/0x300 [ 3405.171174] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3405.171199] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3405.199718] ? cred_has_capability+0x193/0x320 [ 3405.204314] ? hwsim_exit_net+0xc50/0xc50 [ 3405.208482] ? __mutex_lock+0xa67/0x1300 [ 3405.212541] hwsim_new_radio_nl+0x5eb/0x893 [ 3405.216853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3405.223261] ? security_capable+0x92/0xc0 [ 3405.227416] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3405.232688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3405.238217] ? nla_parse+0x1fc/0x2f0 [ 3405.241929] genl_family_rcv_msg+0x6db/0xd30 [ 3405.247467] ? genl_unregister_family+0x790/0x790 [ 3405.252319] ? __local_bh_enable_ip+0x15a/0x270 [ 3405.256981] ? __dev_queue_xmit+0x892/0x2fe0 [ 3405.261393] genl_rcv_msg+0xca/0x170 [ 3405.265100] netlink_rcv_skb+0x17d/0x460 [ 3405.269237] ? genl_family_rcv_msg+0xd30/0xd30 [ 3405.273812] ? netlink_ack+0xb30/0xb30 [ 3405.277703] genl_rcv+0x29/0x40 [ 3405.280972] netlink_unicast+0x53a/0x730 [ 3405.285035] ? netlink_attachskb+0x770/0x770 [ 3405.289449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3405.295077] netlink_sendmsg+0x8ae/0xd70 [ 3405.299134] ? netlink_unicast+0x730/0x730 [ 3405.303372] ? selinux_socket_sendmsg+0x36/0x40 [ 3405.308030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3405.313559] ? security_socket_sendmsg+0x8d/0xc0 [ 3405.318303] ? netlink_unicast+0x730/0x730 [ 3405.322538] sock_sendmsg+0xd7/0x130 [ 3405.326244] ___sys_sendmsg+0x803/0x920 [ 3405.330334] ? copy_msghdr_from_user+0x430/0x430 [ 3405.335097] ? lock_downgrade+0x880/0x880 [ 3405.339254] ? kasan_check_read+0x11/0x20 [ 3405.343409] ? __fget+0x367/0x540 [ 3405.346875] ? iterate_fd+0x360/0x360 [ 3405.350685] ? lock_downgrade+0x880/0x880 [ 3405.354851] ? __fget_light+0x1a9/0x230 [ 3405.358831] ? __fdget+0x1b/0x20 [ 3405.362190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3405.367740] __sys_sendmsg+0x105/0x1d0 [ 3405.371625] ? __ia32_sys_shutdown+0x80/0x80 [ 3405.376033] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3405.380778] ? do_syscall_64+0x26/0x620 [ 3405.384753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3405.390116] ? do_syscall_64+0x26/0x620 [ 3405.394084] __x64_sys_sendmsg+0x78/0xb0 [ 3405.398137] do_syscall_64+0xfd/0x620 [ 3405.401937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3405.407112] RIP: 0033:0x45a6f9 [ 3405.410316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3405.429221] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3405.436920] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3405.444185] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 15:26:31 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) r3 = gettid() r4 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = getpid() r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = fcntl$getown(r8, 0x9) syz_open_procfs(r9, &(0x7f0000000b40)='oom_adj\x00') r10 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r10, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x5, 0x0, [], [{}, {0x801, 0x0, 0x80000001}], [[]]}) r11 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r11}, &(0x7f0000044000)) r12 = open(&(0x7f0000000340)='./file0\x00', 0x208400, 0x141) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001600)='/proc/capi/capi20\x00', 0x400200, 0x0) r13 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r14 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r15 = dup2(r13, r14) ioctl$RTC_UIE_ON(r15, 0x7003) setsockopt$bt_l2cap_L2CAP_CONNINFO(r15, 0x6, 0x2, &(0x7f0000001640)={0x7fff, 0x8b, 0x1, 0x6}, 0x6) ioctl$KVM_SET_VCPU_EVENTS(r12, 0x4040aea0, &(0x7f00000003c0)={0x8, 0xf1, 0xff, 0x0, 0xfbcb, 0xe4, 0x58, 0xdc, 0x7, 0x80, 0x9, 0x1, 0x0, 0xffff, 0xff, 0x20, 0x2, 0x0, 0x2c}) r16 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r17 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r18 = fcntl$dupfd(r16, 0x0, r17) r19 = gettid() ioctl$BLKTRACESETUP(r18, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x0, 0x1, r19}) r20 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) waitid(0x0, r22, 0x0, 0x5, 0x0) r23 = getpgid(r22) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') r25 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r26 = openat$cgroup_ro(r25, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r28 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r28) getpid() r29 = socket(0xa, 0x3, 0x8) r30 = syz_open_dev$amidi(&(0x7f0000000680)='/dev/amidi#\x00', 0x3769, 0x468800) ioctl$sock_inet_SIOCSIFFLAGS(r29, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r30, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r29, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r32 = gettid() waitid(0x3, r28, &(0x7f0000000780), 0x8, &(0x7f0000000800)) sendmsg$key(r29, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRESHEX=r31, @ANYRESDEC=r32]], 0x8}}, 0x20004850) r33 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r34 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r35 = dup2(r34, r33) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r32, r35, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) r37 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r38 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r39 = dup2(r37, r38) ioctl$RTC_UIE_ON(r39, 0x7003) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000015c0)={r39, 0xc0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=0x3e, 0x0, 0x0, 0x0, &(0x7f0000001400)={0x6, 0x3}, 0x0, 0x0, &(0x7f0000001440)={0x5, 0xf, 0x2, 0x5a5}, &(0x7f0000001480)=0x29ad, 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=0xeb8f}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r23, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r40}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r28, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='ppp0eth1]*em0\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r27, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r26, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r24, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r23, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r19, r20, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='team0\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005540)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000005500)='bdevvmnet1\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r12, 0x0, 0x0, 0x0, r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r11, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000080)='cgroup\\GPLppp0ð1+:\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r10, 0x0, 0xb, &(0x7f0000000140)='/dev/vsock\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r9, r7, 0x0, 0xb, &(0x7f0000000040)='ppp1vmnet1\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r6, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000000)='/dev/sequencer\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r3, r5, 0x0, 0xc, &(0x7f0000000000)=')-\'selinux}\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001380)={0x0, r2, 0x0, 0x25, &(0x7f0000000080)=')]md5sum/--vmnet1.selinux+\\mime_type\x00', r36}, 0x30) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r41 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r42 = syz_open_dev$video(&(0x7f0000001680)='/duv/video#\x00', 0x0, 0x0) r43 = dup2(r41, r42) ioctl$RTC_UIE_ON(r43, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r43, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e636c65000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000800"/72], 0x48) getpid() r44 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r45 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r46 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r47 = dup2(r45, r46) ioctl$RTC_UIE_ON(r47, 0x7003) mq_notify(r47, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r44, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r44, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r48 = semget$private(0x0, 0x4, 0x0) semop(r48, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r49 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r49, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r49, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:31 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3405.451452] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3405.458735] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3405.466013] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:31 executing program 3: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0xa0000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000380)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r5, r6) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000001c0)='\xdf\x17^]/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(r12, 0x7003) r13 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r14 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r13, r14) r15 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r16 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r15, r16) ioctl$RTC_AIE_ON(r15, 0x7001) ioctl$RTC_ALM_SET(r15, 0x40247007, &(0x7f0000000380)={0x1c, 0x0, 0x15, 0x0, 0x0, 0x0, 0xfffffffc}) r17 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r18 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r17, r18) ioctl$RTC_AIE_ON(r17, 0x7001) ioctl$RTC_ALM_SET(r17, 0x40247007, &(0x7f0000000380)) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYRES32=r9, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYRES16=r2, @ANYRESHEX=r13, @ANYBLOB="aa9b78adf9beaafd03afa771e1542cadcf92706d809dc8482110fec80484778cdfac22b7001a7449b2b0d87d691a24042ead7c1b48acba88276fd59057eb253fdb13982cb85b42f85c9706bebbc61f780e1f9b0c94d084c52805b8e24b9674655ed3c48f2662486d53bf3f51bd299f0100000000000000ea5c3e4b3d9232dc2b37bf272c4552c76584f6e1e1a39e3a765c8297af001000000000000033a933f4d138aa22c0acb23df4148e7a76442d58ff9258e8371e6d75670a7cfc6ac845e1cb6eecc71384b19fb62cd869c313d92ad6000080001000000000000000000000000067ecfc98", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r15], @ANYRES32], @ANYPTR=&(0x7f00000005c0)=ANY=[]], 0x3}, 0x1, 0x0, 0x0, 0x40040881}, 0x10) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 15:26:31 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:31 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000004c6ccbdb2088c76a0e0048abc3b14ba1ffeb465a22649fd4b0c754a9e684eac01b1c55877a5739bbcbf0e2dd0a1d0c8e3d9d57b234b4ade576ff1d9fe227cd60132a393e3fb7fa5e3fe0a93b0e0b62802f7b01abd38fc01c1a"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1, 0x28}, 0x3c) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r8, r9) ioctl$VIDIOC_QUERYBUF(r9, 0xc0585609, &(0x7f0000000040)={0x2, 0xa, 0x4, 0x10000, {0x0, 0x7530}, {0x2, 0x199d2f8f27725c52, 0xa6, 0x7f, 0xf, 0x1, "974c7f71"}, 0x0, 0x0, @userptr=0x6, 0x4}) 15:26:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x1e00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:32 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c6500000000000000040000000000000000000000000000000000000200fcc6f97b00004000000000000000000000000000000000000000000000000000000000000000109ab10a39efadd2f868219e908dd0e9edfc8d148394959e88f49676c405a8d6f132b76bbe43de1b5ca670"], 0x48) getpid() r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) accept4$packet(r5, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001440)=0x14, 0x80000) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1, 0x4000000000000800, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x2}, 0x3c) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) mq_notify(r10, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r7, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r11 = semget$private(0x0, 0x4, 0x0) semop(r11, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r12 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r12, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r12, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) ioctl$KVM_KVMCLOCK_CTRL(r10, 0xaead) 15:26:32 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x19, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:32 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000040)={0x6, 0x5, 0x100, 0x9, 0x93, 0x7f, 0x9}, 0xc) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="0000000000000000d798e5ee000030000500080001006962000008000100657468001c0002000800010000000000080002000000000008000100000000001c0007000c00030000000000000000000c00040000000000000000001c0006000000020004000200040002000800010000000000180007000c0004000000000000000000000000000500090008000100000000000c000900080001000000000010000600040002000800010000000000180006000400020004000200080001000000000004000200ec0005000c00020008000100000000001c0002000800030000000000080001000000000008000300000000000c000200080001000000000034000200080001000000000008000300043bdd00000000080002fc00010000000800040000000000080004000000000008000300000000004c000200080004000000000008000200000000000800020000000000080001000000000008000300000000000800020000000000080003000c000000080004000000000008000400000000003400020008000400000000000800010000bf2a70f07a16ff87000000080001000000000008000300000000000800010000000000d6f22b402bd761180018b5a4e9e77d0a0f"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x1) 15:26:32 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) 15:26:32 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x921d82) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60d1, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x200000000000000, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:32 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x479ad70fb15a868d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x509400, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3406.240992] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3406.253834] CPU: 0 PID: 583 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3406.261501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3406.270891] Call Trace: [ 3406.273514] dump_stack+0x197/0x210 [ 3406.277186] sysfs_warn_dup.cold+0x1c/0x31 [ 3406.281444] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3406.286919] sysfs_create_link+0x65/0xc0 [ 3406.291524] device_add+0x7ce/0x1760 [ 3406.295261] ? get_device_parent.isra.0+0x570/0x570 [ 3406.300302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3406.305864] wiphy_register+0x16fa/0x21d0 [ 3406.310019] ? show_schedstat+0x832/0xbb0 [ 3406.314183] ? wiphy_unregister+0xfd0/0xfd0 [ 3406.318530] ? rcu_read_lock_sched_held+0x110/0x130 [ 3406.323552] ? __kmalloc+0x5e1/0x750 [ 3406.327269] ? trace_hardirqs_on+0x67/0x220 [ 3406.331605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3406.337152] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3406.342181] ieee80211_register_hw+0x156e/0x3800 [ 3406.346958] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3406.351813] ? hrtimer_init+0x8b/0x300 [ 3406.355708] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3406.361173] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3406.366292] ? cred_has_capability+0x193/0x320 [ 3406.370900] ? hwsim_exit_net+0xc50/0xc50 [ 3406.375095] ? __mutex_lock+0xa67/0x1300 [ 3406.379173] hwsim_new_radio_nl+0x5eb/0x893 [ 3406.383505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:26:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x1b, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3406.389059] ? security_capable+0x92/0xc0 [ 3406.393228] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3406.398441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3406.403995] ? nla_parse+0x1fc/0x2f0 [ 3406.407753] genl_family_rcv_msg+0x6db/0xd30 [ 3406.412186] ? genl_unregister_family+0x790/0x790 [ 3406.417069] ? __local_bh_enable_ip+0x15a/0x270 [ 3406.421780] ? __dev_queue_xmit+0x892/0x2fe0 [ 3406.426244] genl_rcv_msg+0xca/0x170 [ 3406.429982] netlink_rcv_skb+0x17d/0x460 [ 3406.434144] ? genl_family_rcv_msg+0xd30/0xd30 [ 3406.438741] ? netlink_ack+0xb30/0xb30 [ 3406.442654] genl_rcv+0x29/0x40 [ 3406.445942] netlink_unicast+0x53a/0x730 [ 3406.450019] ? netlink_attachskb+0x770/0x770 [ 3406.454442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3406.459994] netlink_sendmsg+0x8ae/0xd70 [ 3406.464075] ? netlink_unicast+0x730/0x730 [ 3406.468325] ? selinux_socket_sendmsg+0x36/0x40 [ 3406.473035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3406.478611] ? security_socket_sendmsg+0x8d/0xc0 [ 3406.483388] ? netlink_unicast+0x730/0x730 [ 3406.487652] sock_sendmsg+0xd7/0x130 [ 3406.491384] ___sys_sendmsg+0x803/0x920 [ 3406.495375] ? copy_msghdr_from_user+0x430/0x430 [ 3406.500150] ? lock_downgrade+0x880/0x880 [ 3406.504313] ? kasan_check_read+0x11/0x20 [ 3406.508474] ? __fget+0x367/0x540 [ 3406.511942] ? iterate_fd+0x360/0x360 [ 3406.515756] ? lock_downgrade+0x880/0x880 [ 3406.519917] ? __fget_light+0x1a9/0x230 [ 3406.523906] ? __fdget+0x1b/0x20 [ 3406.527292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3406.532873] __sys_sendmsg+0x105/0x1d0 [ 3406.536790] ? __ia32_sys_shutdown+0x80/0x80 15:26:32 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000d0002a9444d73fc00000000000000"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8f68, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0xfffffffffffffffc, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) ioctl$EVIOCGABS3F(r10, 0x8018457f, &(0x7f0000001400)=""/183) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3406.541230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3406.546002] ? do_syscall_64+0x26/0x620 [ 3406.549991] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3406.555368] ? do_syscall_64+0x26/0x620 [ 3406.559380] __x64_sys_sendmsg+0x78/0xb0 [ 3406.563452] do_syscall_64+0xfd/0x620 [ 3406.567276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3406.572475] RIP: 0033:0x45a6f9 [ 3406.575679] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3406.595034] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3406.602757] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3406.610053] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3406.617329] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3406.624602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3406.631879] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:33 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffffc5, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x54}, 0x4000) 15:26:33 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3406.900937] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 15:26:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x1f00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:33 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="6d616e676c65a756ea00000000000000000000000000000000000000000000000000000200"/75], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:33 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r10, &(0x7f0000001380)="da03c8e7e7a9f3fa74547a8c5b4983c33cc2c0f84e3ab33bb8995dd4491a3e930dd7db2534f90a3c3f7774fe38f89f61486b3d22cbaa878c7675dec0b8b4b01821f7296902e0dca23d868a70da4d81a72cb7afb8725c1655817132c8381c9bb44c5b47b54528453869eade654a40c94e1af7f7f4a4af7faf45e6ddcc7dd6dd1a13de669305b5f5c55fe99c25269b5f39049c7668c265c8ddfedb73142691984acdbf82e02b331f08629627cb7d05a502689e41f086b0864a2e35171c27419ec96d5d3a2b5e7d359e8cae619dc841aff5551b63c2a985f75a3f", &(0x7f0000001480)="6fdd83b5dfa7f80a2704c8ee8bd799f65283973ecd2857b88ca8e33f3e77628505b52366100d4efc7518d32ce11d590cd2131f6d32927afeef6413dbf4bfca38f8b12e1f2d97fb35ccdd4a30de3f6b61d68e3f9c747bca62844da142a620f36f1c2d4cddf41268c6a96641c0c63e7e4cde8a1647d04d9ddd7beb72dd91c433062c14c3d4505b0636eda0e9d3d35c9512374ba217d324", 0x4}, 0x20) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3406.946958] loop3: partition table partially beyond EOD, truncated [ 3406.953742] loop3: p1 start 448 is beyond EOD, truncated [ 3406.959359] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3406.965956] loop3: p3 start 958347629 is beyond EOD, truncated 15:26:33 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, &(0x7f00000000c0)) [ 3406.990513] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3407.030779] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3407.058181] loop3: p6 start 3633969955 is beyond EOD, truncated 15:26:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x27, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3407.102798] loop3: p7 start 500206790 is beyond EOD, truncated [ 3407.131624] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3407.157232] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3407.159912] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3407.179849] CPU: 0 PID: 926 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3407.187532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3407.196988] Call Trace: [ 3407.199602] dump_stack+0x197/0x210 [ 3407.203259] sysfs_warn_dup.cold+0x1c/0x31 [ 3407.207522] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3407.209734] loop3: p10 start 13460217 is beyond EOD, truncated [ 3407.212950] sysfs_create_link+0x65/0xc0 [ 3407.212971] device_add+0x7ce/0x1760 [ 3407.212991] ? get_device_parent.isra.0+0x570/0x570 [ 3407.213007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.237896] loop3: p11 start 129726472 is beyond EOD, truncated [ 3407.238445] wiphy_register+0x16fa/0x21d0 [ 3407.248655] ? show_schedstat+0x832/0xbb0 [ 3407.252846] ? wiphy_unregister+0xfd0/0xfd0 [ 3407.255373] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3407.257179] ? rcu_read_lock_sched_held+0x110/0x130 [ 3407.257194] ? __kmalloc+0x5e1/0x750 [ 3407.257209] ? trace_hardirqs_on+0x67/0x220 [ 3407.257228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.270117] loop3: p13 start 471698834 is beyond EOD, truncated [ 3407.272178] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3407.272201] ieee80211_register_hw+0x156e/0x3800 [ 3407.272230] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3407.277199] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3407.282598] ? hrtimer_init+0x8b/0x300 [ 3407.282617] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3407.282638] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3407.282651] ? cred_has_capability+0x193/0x320 [ 3407.282678] ? hwsim_exit_net+0xc50/0xc50 [ 3407.282701] hwsim_new_radio_nl+0x5eb/0x893 [ 3407.282715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.282727] ? security_capable+0x92/0xc0 [ 3407.282743] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3407.282764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:26:33 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) r3 = dup2(r1, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x1) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f0000000000), 0x4}, 0x20) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) ioctl$KVM_GET_XSAVE(r7, 0x9000aea4, &(0x7f00000012c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x7, &(0x7f0000000500)={0x7, 0x2000000, 0x0, 0xfffffffffffffffe, 0x60d3, 0x1000000008, 0xfffffffbffffffff, 0x2000000004, 0x0, 0xfffffffffffffffc, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1100, 0xfffffffffffffffe, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3407.282775] ? nla_parse+0x1fc/0x2f0 [ 3407.282795] genl_family_rcv_msg+0x6db/0xd30 [ 3407.282815] ? genl_unregister_family+0x790/0x790 [ 3407.371298] ? __local_bh_enable_ip+0x15a/0x270 [ 3407.375988] ? __dev_queue_xmit+0x892/0x2fe0 [ 3407.380434] genl_rcv_msg+0xca/0x170 [ 3407.384162] netlink_rcv_skb+0x17d/0x460 [ 3407.388238] ? genl_family_rcv_msg+0xd30/0xd30 [ 3407.392925] ? netlink_ack+0xb30/0xb30 [ 3407.396842] genl_rcv+0x29/0x40 [ 3407.400135] netlink_unicast+0x53a/0x730 [ 3407.404208] ? netlink_attachskb+0x770/0x770 [ 3407.408638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.414190] netlink_sendmsg+0x8ae/0xd70 [ 3407.418282] ? netlink_unicast+0x730/0x730 [ 3407.422546] ? selinux_socket_sendmsg+0x36/0x40 [ 3407.427231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.432788] ? security_socket_sendmsg+0x8d/0xc0 [ 3407.437565] ? netlink_unicast+0x730/0x730 [ 3407.441819] sock_sendmsg+0xd7/0x130 [ 3407.445557] ___sys_sendmsg+0x803/0x920 [ 3407.449577] ? copy_msghdr_from_user+0x430/0x430 [ 3407.454358] ? lock_downgrade+0x880/0x880 [ 3407.462273] ? kasan_check_read+0x11/0x20 [ 3407.466455] ? __fget+0x367/0x540 [ 3407.469934] ? iterate_fd+0x360/0x360 [ 3407.473761] ? lock_downgrade+0x880/0x880 [ 3407.478017] ? __fget_light+0x1a9/0x230 [ 3407.482016] ? __fdget+0x1b/0x20 [ 3407.485406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3407.491186] __sys_sendmsg+0x105/0x1d0 [ 3407.495087] ? __ia32_sys_shutdown+0x80/0x80 [ 3407.499529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3407.504302] ? do_syscall_64+0x26/0x620 15:26:33 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000f90200"/56], 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) fsetxattr(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="74bc34d9b5c2727573"], &(0x7f0000001380)='mangle\x00', 0x7, 0x1) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) mq_notify(r8, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r5, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x183, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r10, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r10, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3407.508306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3407.514210] ? do_syscall_64+0x26/0x620 [ 3407.518561] __x64_sys_sendmsg+0x78/0xb0 [ 3407.522641] do_syscall_64+0xfd/0x620 [ 3407.526468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3407.531664] RIP: 0033:0x45a6f9 [ 3407.534868] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3407.553783] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:33 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0xc04c5349, &(0x7f00000000c0)) [ 3407.561546] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3407.569095] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3407.576386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3407.583682] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3407.591428] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2000, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:33 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) accept$inet(r2, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10) getsockopt$sock_int(r2, 0x1, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:34 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0xc04c5349, &(0x7f00000000c0)) 15:26:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x4e, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3407.790981] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3407.846025] CPU: 0 PID: 1152 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3407.853800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3407.863258] Call Trace: [ 3407.865872] dump_stack+0x197/0x210 [ 3407.869554] sysfs_warn_dup.cold+0x1c/0x31 [ 3407.874337] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3407.879733] sysfs_create_link+0x65/0xc0 [ 3407.883822] device_add+0x7ce/0x1760 [ 3407.887658] ? get_device_parent.isra.0+0x570/0x570 [ 3407.892691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.898268] wiphy_register+0x16fa/0x21d0 [ 3407.902448] ? show_schedstat+0x832/0xbb0 [ 3407.906621] ? wiphy_unregister+0xfd0/0xfd0 [ 3407.910964] ? rcu_read_lock_sched_held+0x110/0x130 [ 3407.915998] ? __kmalloc+0x5e1/0x750 [ 3407.919730] ? trace_hardirqs_on+0x67/0x220 [ 3407.924280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.929944] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3407.934912] ieee80211_register_hw+0x156e/0x3800 [ 3407.939725] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3407.944598] ? hrtimer_init+0x8b/0x300 [ 3407.948504] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3407.953633] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3407.960747] ? cred_has_capability+0x193/0x320 [ 3407.965398] ? hwsim_exit_net+0xc50/0xc50 [ 3407.969567] hwsim_new_radio_nl+0x5eb/0x893 [ 3407.973898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.979443] ? security_capable+0x92/0xc0 [ 3407.983607] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3407.988812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3407.994360] ? nla_parse+0x1fc/0x2f0 [ 3407.999132] genl_family_rcv_msg+0x6db/0xd30 [ 3408.003559] ? genl_unregister_family+0x790/0x790 [ 3408.008414] ? __local_bh_enable_ip+0x15a/0x270 [ 3408.013125] ? __dev_queue_xmit+0x892/0x2fe0 [ 3408.017567] genl_rcv_msg+0xca/0x170 [ 3408.021307] netlink_rcv_skb+0x17d/0x460 [ 3408.025383] ? genl_family_rcv_msg+0xd30/0xd30 [ 3408.030326] ? netlink_ack+0xb30/0xb30 [ 3408.034240] genl_rcv+0x29/0x40 [ 3408.037524] netlink_unicast+0x53a/0x730 [ 3408.041600] ? netlink_attachskb+0x770/0x770 [ 3408.046117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.051683] netlink_sendmsg+0x8ae/0xd70 [ 3408.055768] ? netlink_unicast+0x730/0x730 [ 3408.060029] ? selinux_socket_sendmsg+0x36/0x40 [ 3408.064709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.070262] ? security_socket_sendmsg+0x8d/0xc0 [ 3408.075032] ? netlink_unicast+0x730/0x730 [ 3408.079278] sock_sendmsg+0xd7/0x130 [ 3408.083001] ___sys_sendmsg+0x803/0x920 [ 3408.086986] ? copy_msghdr_from_user+0x430/0x430 [ 3408.091762] ? lock_downgrade+0x880/0x880 [ 3408.095920] ? kasan_check_read+0x11/0x20 [ 3408.100182] ? __fget+0x367/0x540 [ 3408.103655] ? iterate_fd+0x360/0x360 [ 3408.107473] ? lock_downgrade+0x880/0x880 [ 3408.111639] ? __fget_light+0x1a9/0x230 [ 3408.115624] ? __fdget+0x1b/0x20 [ 3408.119004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3408.124557] __sys_sendmsg+0x105/0x1d0 [ 3408.128453] ? __ia32_sys_shutdown+0x80/0x80 [ 3408.133148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3408.137910] ? do_syscall_64+0x26/0x620 [ 3408.141894] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3408.147262] ? do_syscall_64+0x26/0x620 [ 3408.151248] __x64_sys_sendmsg+0x78/0xb0 [ 3408.155322] do_syscall_64+0xfd/0x620 [ 3408.159132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3408.164327] RIP: 0033:0x45a6f9 [ 3408.167529] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3408.186436] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x56, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:34 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000000200000000000000000000002e44a59c1d2ffc4310000000050000000000000000000000000000000000003f0000000000"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f00000011c0)={0x3, 0x2, 0x1, {0x8, 0x9, 0x8, 0x3}}) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r9, &(0x7f0000001400)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}, 0x2, 0x0, 0x1, 0x2}}, 0x80) 15:26:34 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0xc04c5349, &(0x7f00000000c0)) [ 3408.194152] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3408.201432] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3408.208703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3408.215978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3408.223249] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:34 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:34 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) wait4(r7, &(0x7f0000000080), 0x40000000, 0x0) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) fremovexattr(r5, &(0x7f0000000040)=@known='trusted.overlay.nlink\x00') r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:34 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, 0x0) 15:26:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2200, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x69, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3408.490817] Dev loop3: unable to read RDB block 1 [ 3408.495849] loop3: unable to read partition table [ 3408.515596] loop3: partition table beyond EOD, truncated [ 3408.530381] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3408.545845] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3408.560147] CPU: 1 PID: 1493 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3408.567886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3408.577257] Call Trace: [ 3408.579868] dump_stack+0x197/0x210 [ 3408.583549] sysfs_warn_dup.cold+0x1c/0x31 [ 3408.587875] sysfs_do_create_link_sd.isra.0+0x118/0x130 15:26:34 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000013c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000800000000000000000000080000020000000000000000000700000000000000010000000000000000000000000000000000000000000be67107a76cc1818a2816b00cce0415f3502965920a6e60b4cbf6a92f3f6c453124a96ed0d1d6546ee75c41d306f332ec03de42c187ecedf921b26862e5e299a615f13055aea11da237819dbe8d6ed358735c1f4032d26835808d63f63482d64c525652d0609c4b16665ee563c3538b08c9eb832062ebd18767885aacc446d4eded9953b28940aef8c23390a43e291bbddf63166368"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='\x0fdev/video#\x00', 0x2000000000000, 0x500) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) ioctl$sock_SIOCSIFBR(r9, 0x8941, &(0x7f0000000040)=@generic={0x0, 0x7, 0x7}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f00000012c0)={0x0, 0x1f, 0x0, 0x0, 0x60c7, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3f, 0x8001, 0x6, 0xfff, 0xfffffffffffffffe, 0x6, 0x80000001, 0xffffffff00000000, 0x0, 0x3, 0x7, 0x5, 0x0, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3408.593285] sysfs_create_link+0x65/0xc0 [ 3408.597380] device_add+0x7ce/0x1760 [ 3408.601556] ? get_device_parent.isra.0+0x570/0x570 [ 3408.606587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.612146] wiphy_register+0x16fa/0x21d0 [ 3408.616309] ? show_schedstat+0x832/0xbb0 [ 3408.620482] ? wiphy_unregister+0xfd0/0xfd0 [ 3408.624828] ? rcu_read_lock_sched_held+0x110/0x130 [ 3408.629859] ? __kmalloc+0x5e1/0x750 [ 3408.633756] ? trace_hardirqs_on+0x67/0x220 [ 3408.638082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.643638] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3408.648564] ieee80211_register_hw+0x156e/0x3800 [ 3408.653342] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3408.658197] ? hrtimer_init+0x8b/0x300 [ 3408.662087] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3408.667210] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3408.672236] ? cred_has_capability+0x193/0x320 [ 3408.676892] ? hwsim_exit_net+0xc50/0xc50 [ 3408.681036] hwsim_new_radio_nl+0x5eb/0x893 [ 3408.685348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.691146] ? security_capable+0x92/0xc0 [ 3408.695301] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3408.700499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.706034] ? nla_parse+0x1fc/0x2f0 [ 3408.709742] genl_family_rcv_msg+0x6db/0xd30 [ 3408.714149] ? genl_unregister_family+0x790/0x790 [ 3408.719104] ? __local_bh_enable_ip+0x15a/0x270 [ 3408.723779] ? __dev_queue_xmit+0x892/0x2fe0 [ 3408.728220] genl_rcv_msg+0xca/0x170 [ 3408.731938] netlink_rcv_skb+0x17d/0x460 [ 3408.736005] ? genl_family_rcv_msg+0xd30/0xd30 [ 3408.740599] ? netlink_ack+0xb30/0xb30 [ 3408.744500] genl_rcv+0x29/0x40 [ 3408.747766] netlink_unicast+0x53a/0x730 [ 3408.751866] ? netlink_attachskb+0x770/0x770 [ 3408.756267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.761795] netlink_sendmsg+0x8ae/0xd70 [ 3408.765849] ? netlink_unicast+0x730/0x730 [ 3408.770094] ? selinux_socket_sendmsg+0x36/0x40 [ 3408.774757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3408.780302] ? security_socket_sendmsg+0x8d/0xc0 [ 3408.785059] ? netlink_unicast+0x730/0x730 [ 3408.789292] sock_sendmsg+0xd7/0x130 [ 3408.793006] ___sys_sendmsg+0x803/0x920 [ 3408.796984] ? copy_msghdr_from_user+0x430/0x430 [ 3408.801744] ? lock_downgrade+0x880/0x880 [ 3408.805895] ? kasan_check_read+0x11/0x20 [ 3408.810054] ? __fget+0x367/0x540 [ 3408.813496] ? iterate_fd+0x360/0x360 [ 3408.817295] ? lock_downgrade+0x880/0x880 [ 3408.821443] ? __fget_light+0x1a9/0x230 [ 3408.825407] ? __fdget+0x1b/0x20 [ 3408.828757] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3408.834281] __sys_sendmsg+0x105/0x1d0 [ 3408.838160] ? __ia32_sys_shutdown+0x80/0x80 [ 3408.842574] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3408.847435] ? do_syscall_64+0x26/0x620 [ 3408.851419] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3408.856792] ? do_syscall_64+0x26/0x620 [ 3408.860790] __x64_sys_sendmsg+0x78/0xb0 [ 3408.864851] do_syscall_64+0xfd/0x620 [ 3408.868655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3408.874008] RIP: 0033:0x45a6f9 [ 3408.877191] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:26:35 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c650000000000604c00000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000002479377f72a4328e451545a8c74119e8452d1e626c99b153d9d3c5408231f8cf2db962b093dd96f45f571615a87cac0e8fda4e4fd24f5c662de00749d697fdf37f721be85bdd3b479eeb93e3597c1211fe9aaddac72944f4f8635f4f88e2ca1b1515fbec9a9a5565d2266e4b43ce3e61d50aa08525acb5b587789267dfdf8f404a6e96c5ded0b0ea6d63877fc7"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3408.896522] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3408.904222] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3408.911495] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3408.918783] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3408.926048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3408.933318] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:35 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, 0x0) 15:26:35 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000c80)={0x20, 0x0, 0x2, {0xffffffff, 0x0, 0x1, 0x7fff}}, 0x20) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80044d1b, &(0x7f0000000100)) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$RTC_UIE_ON(r5, 0x7003) flock(r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r2}) write$binfmt_elf64(r6, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9f, 0x80, 0x5, 0xaf, 0x3, 0x2, 0x5, 0x0, 0x17c, 0x40, 0x2eb, 0x6, 0x3, 0x38, 0x1, 0x0, 0x1, 0x4}, [{0x1, 0xeec2, 0xffffffffffffff81, 0x5, 0x4, 0xffffffffffff0000, 0x0, 0x40}], "846d9e85bbbacad39c84015d7ac70bcada63461f6b56e807129db155b779aa3163a00d2fa4d0e21e47712e", [[], [], [], [], [], [], [], [], [], []]}, 0xaa3) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:35 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc04c5349, 0x0) [ 3409.237415] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3409.244934] loop3: partition table partially beyond EOD, truncated 15:26:35 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) socket$nl_xfrm(0x10, 0x3, 0x6) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3409.288902] loop3: p1 size 1687525121 extends beyond EOD, truncated 15:26:35 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3409.338295] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3409.376872] loop3: p3 start 958347629 is beyond EOD, truncated 15:26:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) [ 3409.399595] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3409.459270] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3409.485801] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3409.515316] loop3: p7 start 500206790 is beyond EOD, truncated [ 3409.577199] loop3: p8 start 3893716989 is beyond EOD, truncated 15:26:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x86, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:35 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000010000000000000332da10673f35f7c9ac601621a1f921a344816a78ed1d49ea166500b6fe71368bbc181e593e1473c941833c6809dc3eaf6"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3409.628348] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3409.661840] loop3: p10 start 13460217 is beyond EOD, truncated [ 3409.685038] loop3: p11 start 129726472 is beyond EOD, truncated [ 3409.734665] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3409.775421] loop3: p13 start 471698834 is beyond EOD, truncated [ 3409.804763] loop3: p14 start 3733177086 is beyond EOD, truncated 15:26:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2300, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 15:26:36 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r3 = getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) fcntl$lock(r1, 0x5, &(0x7f0000000040)={0x5e97626dadea7e3d, 0x0, 0x80000, 0x6, r3}) 15:26:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0xc9, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:36 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000002000000000000"], 0x48) r3 = getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x43d, 0x4, @tid=r3}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(r12, 0x7003) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r12, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000001380)=0x10) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3409.949658] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3409.956583] loop3: partition table partially beyond EOD, truncated [ 3409.966742] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3410.005015] CPU: 0 PID: 2278 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3410.012792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3410.022162] Call Trace: [ 3410.024781] dump_stack+0x197/0x210 [ 3410.028460] sysfs_warn_dup.cold+0x1c/0x31 [ 3410.032738] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3410.032763] sysfs_create_link+0x65/0xc0 [ 3410.042314] device_add+0x7ce/0x1760 [ 3410.045534] loop3: p1 size 1687525121 extends beyond EOD, truncated [ 3410.046053] ? get_device_parent.isra.0+0x570/0x570 [ 3410.046068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.046094] wiphy_register+0x16fa/0x21d0 [ 3410.067203] ? show_schedstat+0x832/0xbb0 [ 3410.071388] ? wiphy_unregister+0xfd0/0xfd0 [ 3410.075991] ? rcu_read_lock_sched_held+0x110/0x130 [ 3410.081024] ? __kmalloc+0x5e1/0x750 [ 3410.084760] ? trace_hardirqs_on+0x67/0x220 [ 3410.084778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.084796] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3410.099570] ieee80211_register_hw+0x156e/0x3800 [ 3410.104355] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3410.104376] ? hrtimer_init+0x8b/0x300 [ 3410.113094] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3410.118227] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3410.118242] ? cred_has_capability+0x193/0x320 [ 3410.118266] ? hwsim_exit_net+0xc50/0xc50 [ 3410.131997] hwsim_new_radio_nl+0x5eb/0x893 [ 3410.136340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.141880] ? security_capable+0x92/0xc0 [ 3410.141898] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3410.141919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.151259] ? nla_parse+0x1fc/0x2f0 [ 3410.151280] genl_family_rcv_msg+0x6db/0xd30 [ 3410.151301] ? genl_unregister_family+0x790/0x790 [ 3410.151323] ? __local_bh_enable_ip+0x15a/0x270 [ 3410.164965] ? __dev_queue_xmit+0x892/0x2fe0 [ 3410.164997] genl_rcv_msg+0xca/0x170 [ 3410.174442] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3410.174482] netlink_rcv_skb+0x17d/0x460 [ 3410.179118] loop3: p3 start 958347629 is beyond EOD, truncated [ 3410.182573] ? genl_family_rcv_msg+0xd30/0xd30 [ 3410.182588] ? netlink_ack+0xb30/0xb30 [ 3410.182618] genl_rcv+0x29/0x40 [ 3410.182632] netlink_unicast+0x53a/0x730 [ 3410.182651] ? netlink_attachskb+0x770/0x770 [ 3410.188906] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3410.192739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.192757] netlink_sendmsg+0x8ae/0xd70 [ 3410.192780] ? netlink_unicast+0x730/0x730 [ 3410.192800] ? selinux_socket_sendmsg+0x36/0x40 [ 3410.192812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.192829] ? security_socket_sendmsg+0x8d/0xc0 [ 3410.207285] ? netlink_unicast+0x730/0x730 [ 3410.207304] sock_sendmsg+0xd7/0x130 [ 3410.207320] ___sys_sendmsg+0x803/0x920 [ 3410.214472] ? copy_msghdr_from_user+0x430/0x430 [ 3410.214495] ? lock_downgrade+0x880/0x880 [ 3410.214513] ? kasan_check_read+0x11/0x20 [ 3410.222970] ? __fget+0x367/0x540 [ 3410.222989] ? iterate_fd+0x360/0x360 [ 3410.223008] ? lock_downgrade+0x880/0x880 [ 3410.223032] ? __fget_light+0x1a9/0x230 [ 3410.223048] ? __fdget+0x1b/0x20 [ 3410.223061] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3410.223081] __sys_sendmsg+0x105/0x1d0 [ 3410.234694] ? __ia32_sys_shutdown+0x80/0x80 [ 3410.234723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3410.234739] ? do_syscall_64+0x26/0x620 [ 3410.239019] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3410.243010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3410.243027] ? do_syscall_64+0x26/0x620 [ 3410.243049] __x64_sys_sendmsg+0x78/0xb0 [ 3410.243067] do_syscall_64+0xfd/0x620 [ 3410.243082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3410.243092] RIP: 0033:0x45a6f9 [ 3410.243107] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3410.253530] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3410.258036] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3410.258051] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3410.258058] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3410.258069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3410.287962] loop3: p7 start 500206790 is beyond EOD, truncated [ 3410.290247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3410.290258] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3410.368264] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3410.501119] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3410.519670] loop3: p10 start 13460217 is beyond EOD, truncated [ 3410.526862] loop3: p11 start 129726472 is beyond EOD, truncated [ 3410.537525] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3410.544169] loop3: p13 start 471698834 is beyond EOD, truncated 15:26:36 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f8a1db69ff2a9cba3c16ef6bc781f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d5bb1cbc523d7d12c7e90234f8ac3d0767387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f5f15457bf8a118284b4045102f4ac1e6458c006a05332", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0x2, 0x4) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000340)=""/94, 0x5e) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r2, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, 0x0, &(0x7f0000000080)=0x2666bf0eaae667e2) 15:26:36 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x18602, 0x0) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x30000, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2400, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:36 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r2, r3) r4 = dup2(r3, r1) ioctl$RTC_UIE_ON(r4, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r6, r7) ioctl$RTC_UIE_ON(r8, 0x7003) mq_notify(r8, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r5, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60d0, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r10, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r10, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x0, 0x0, 0x0, 0x4}}, 0x80) 15:26:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x0, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3410.550797] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3410.754564] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3410.790988] CPU: 0 PID: 2517 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3410.798815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3410.808181] Call Trace: [ 3410.810793] dump_stack+0x197/0x210 [ 3410.814446] sysfs_warn_dup.cold+0x1c/0x31 [ 3410.818702] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3410.824115] sysfs_create_link+0x65/0xc0 [ 3410.828291] device_add+0x7ce/0x1760 [ 3410.832039] ? get_device_parent.isra.0+0x570/0x570 [ 3410.837417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.842985] wiphy_register+0x16fa/0x21d0 [ 3410.847158] ? show_schedstat+0x832/0xbb0 [ 3410.851325] ? wiphy_unregister+0xfd0/0xfd0 [ 3410.855660] ? rcu_read_lock_sched_held+0x110/0x130 [ 3410.860686] ? __kmalloc+0x5e1/0x750 [ 3410.864410] ? trace_hardirqs_on+0x67/0x220 [ 3410.868834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.874380] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3410.879308] ieee80211_register_hw+0x156e/0x3800 [ 3410.884064] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3410.888923] ? hrtimer_init+0x8b/0x300 [ 3410.893260] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3410.898357] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3410.903361] ? cred_has_capability+0x193/0x320 [ 3410.907940] ? hwsim_exit_net+0xc50/0xc50 [ 3410.912088] ? __mutex_lock+0xa67/0x1300 [ 3410.916145] hwsim_new_radio_nl+0x5eb/0x893 [ 3410.920541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.926066] ? security_capable+0x92/0xc0 [ 3410.930206] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3410.935389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.940918] ? nla_parse+0x1fc/0x2f0 [ 3410.944628] genl_family_rcv_msg+0x6db/0xd30 [ 3410.949030] ? genl_unregister_family+0x790/0x790 [ 3410.953962] ? __local_bh_enable_ip+0x15a/0x270 [ 3410.958646] ? __dev_queue_xmit+0x892/0x2fe0 [ 3410.963069] genl_rcv_msg+0xca/0x170 [ 3410.966775] netlink_rcv_skb+0x17d/0x460 [ 3410.970826] ? genl_family_rcv_msg+0xd30/0xd30 [ 3410.975398] ? netlink_ack+0xb30/0xb30 [ 3410.979283] genl_rcv+0x29/0x40 [ 3410.982554] netlink_unicast+0x53a/0x730 [ 3410.986607] ? netlink_attachskb+0x770/0x770 [ 3410.992418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3410.998044] netlink_sendmsg+0x8ae/0xd70 [ 3411.002098] ? netlink_unicast+0x730/0x730 [ 3411.006335] ? selinux_socket_sendmsg+0x36/0x40 [ 3411.010994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3411.016531] ? security_socket_sendmsg+0x8d/0xc0 [ 3411.021292] ? netlink_unicast+0x730/0x730 [ 3411.025524] sock_sendmsg+0xd7/0x130 [ 3411.029229] ___sys_sendmsg+0x803/0x920 [ 3411.033202] ? copy_msghdr_from_user+0x430/0x430 [ 3411.037956] ? lock_downgrade+0x880/0x880 [ 3411.042111] ? kasan_check_read+0x11/0x20 [ 3411.046255] ? __fget+0x367/0x540 [ 3411.050249] ? iterate_fd+0x360/0x360 [ 3411.054042] ? lock_downgrade+0x880/0x880 [ 3411.058268] ? __fget_light+0x1a9/0x230 [ 3411.062247] ? __fdget+0x1b/0x20 [ 3411.065602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3411.071154] __sys_sendmsg+0x105/0x1d0 [ 3411.075033] ? __ia32_sys_shutdown+0x80/0x80 [ 3411.079878] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3411.084634] ? do_syscall_64+0x26/0x620 [ 3411.088626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3411.094083] ? do_syscall_64+0x26/0x620 [ 3411.098065] __x64_sys_sendmsg+0x78/0xb0 [ 3411.102122] do_syscall_64+0xfd/0x620 [ 3411.106435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3411.111614] RIP: 0033:0x45a6f9 [ 3411.114932] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3411.134202] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3411.142779] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:37 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x20004, 0x0, 0x9905}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e010000000100000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000b37c00"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r5, r6) r7 = dup3(0xffffffffffffffff, r6, 0x80000) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r7, 0x40044104, &(0x7f0000000040)=0x7) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev\x0f\x00\x00^\x00\x00\x00\a', 0x0, 0x20000) r9 = dup2(r4, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0xfffe, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3411.150038] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3411.157297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3411.164671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3411.171930] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2500, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x28, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:37 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f00000000c0)={0x800, 0x6, 0x8, 0x8}) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1\x00', 0x40100, 0x0) 15:26:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x86, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:37 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850000004c0000000000"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r4 = dup2(r2, r3) ioctl$RTC_UIE_ON(r4, 0x7003) r5 = dup2(r4, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) r10 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x801) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f00000012c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x2, @rand_addr="b9d0cede14da9359b8fa190675136944", 0x1f}, {0xa, 0x4e20, 0x8f4, @mcast2, 0xc0}, r0, 0x4}}, 0x48) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r11 = semget$private(0x0, 0x4, 0x0) semop(r11, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 15:26:37 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e675e650000000000000000008495ebb08718ec142ff6d710a2c66a820080829a1fbc2874ab00000000070000000200"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x1, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000000010000000000000006000000000000000000000000000000000000000000120000000000000000000700000069472bfa71"]) 15:26:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x88, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:37 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffe68, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESDEC], 0x3}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2600, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:38 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r6, r5) r7 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r8 = dup2(r4, r7) ioctl$RTC_UIE_ON(r8, 0x7003) mq_notify(r8, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002680)=0x14) setsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f00000026c0)={r11, @multicast2, @rand_addr=0x6}, 0xc) 15:26:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0xb4, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:38 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r6, 0x2287, &(0x7f0000000080)) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:38 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x2, 0xaaaaaaaaaaaae10, &(0x7f0000000040)=[{&(0x7f00000000c0)="e7e98b7ae49c70be622a1f2837c0b976559a33602fc0048b96376a131ad42cb9d64e8e739f1ff3caaa3f7a57743c80ac2efeb201c46c8cbd483abd787ea1b284f95c57106256e57deab72616b8b36591a8efe1f26b61edbf649c13e30361a756066a32def7cdef9ffda5d373", 0xdb}, {&(0x7f0000000300)="98f3539e6d4f2afc08c373848d82d230b3d28afea99e5a4b9ab180269d65da21a62073af703e247a659894e3c8ef3561c6b6f057ce9075dcd959aef8ee9e3aee86ed2e06c19467941d65fedeaf8e51bcacc2b9fe23b10101ad2b02a6b18fceb8d9f1adcfd431f67a142000d2b9f7b586688c7d87e81dacca7689281e770ab7e0dfa14ba60008fe787c5a424f4bc7a59728613ff93311463e0fc58d0f4843486a41f874d1d3360e0d4af42d1b2a2a052b5e27b907552539cb31d0e6c275666d41092fb44a0f36c173c714b17963f705c4333727fca286994d9791e46663ccd77a732394b45ebc63cf337395d9ef06842d4742899514ad53d172db165a1541cd9dc3728938ab9aeaebe8f41141d892a1294f8a62990e795708ef270371646f2481d52be84c48cbe96789fb202828aaa8ead91ed6bfc611a7fb32c4e7079365ff2fe96d6ddec12d1e9ffed5895523a857d8dce4ac790ac0370a7f03ffcc43084e0434fcfddd9bf8095727ffe03c5bf6f852138499eaa13a", 0x80, 0x7}]) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x3a) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000000)) 15:26:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0xc9, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2700, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:38 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r9, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3412.157519] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3412.197712] CPU: 1 PID: 3556 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3412.205477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3412.205485] Call Trace: [ 3412.205506] dump_stack+0x197/0x210 [ 3412.205529] sysfs_warn_dup.cold+0x1c/0x31 [ 3412.225345] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3412.230829] sysfs_create_link+0x65/0xc0 [ 3412.234911] device_add+0x7ce/0x1760 [ 3412.238647] ? get_device_parent.isra.0+0x570/0x570 [ 3412.243677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.249235] wiphy_register+0x16fa/0x21d0 [ 3412.249253] ? show_schedstat+0x832/0xbb0 [ 3412.257564] ? wiphy_unregister+0xfd0/0xfd0 [ 3412.261912] ? rcu_read_lock_sched_held+0x110/0x130 [ 3412.266941] ? __kmalloc+0x5e1/0x750 [ 3412.266958] ? trace_hardirqs_on+0x67/0x220 [ 3412.266974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.266993] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3412.275012] ieee80211_register_hw+0x156e/0x3800 [ 3412.275039] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3412.275058] ? hrtimer_init+0x8b/0x300 [ 3412.298971] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3412.304100] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3412.309126] ? cred_has_capability+0x193/0x320 [ 3412.313730] ? hwsim_exit_net+0xc50/0xc50 [ 3412.317894] ? __mutex_lock+0xa67/0x1300 [ 3412.321970] hwsim_new_radio_nl+0x5eb/0x893 [ 3412.326303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.331857] ? security_capable+0x92/0xc0 [ 3412.336018] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3412.341224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.346769] ? nla_parse+0x1fc/0x2f0 [ 3412.350497] genl_family_rcv_msg+0x6db/0xd30 [ 3412.354920] ? genl_unregister_family+0x790/0x790 [ 3412.359772] ? __local_bh_enable_ip+0x15a/0x270 [ 3412.364449] ? __dev_queue_xmit+0x892/0x2fe0 [ 3412.368884] genl_rcv_msg+0xca/0x170 [ 3412.372606] netlink_rcv_skb+0x17d/0x460 [ 3412.376676] ? genl_family_rcv_msg+0xd30/0xd30 [ 3412.381354] ? netlink_ack+0xb30/0xb30 [ 3412.385272] genl_rcv+0x29/0x40 [ 3412.388557] netlink_unicast+0x53a/0x730 [ 3412.392632] ? netlink_attachskb+0x770/0x770 [ 3412.397084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.402637] netlink_sendmsg+0x8ae/0xd70 [ 3412.406711] ? netlink_unicast+0x730/0x730 [ 3412.410958] ? selinux_socket_sendmsg+0x36/0x40 [ 3412.415630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.421177] ? security_socket_sendmsg+0x8d/0xc0 [ 3412.425942] ? netlink_unicast+0x730/0x730 [ 3412.430193] sock_sendmsg+0xd7/0x130 [ 3412.433943] ___sys_sendmsg+0x803/0x920 [ 3412.437928] ? copy_msghdr_from_user+0x430/0x430 [ 3412.443657] ? lock_downgrade+0x880/0x880 [ 3412.447991] ? kasan_check_read+0x11/0x20 [ 3412.452156] ? __fget+0x367/0x540 [ 3412.455974] ? iterate_fd+0x360/0x360 [ 3412.459814] ? lock_downgrade+0x880/0x880 [ 3412.463982] ? __fget_light+0x1a9/0x230 [ 3412.467966] ? __fdget+0x1b/0x20 [ 3412.471517] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3412.477074] __sys_sendmsg+0x105/0x1d0 [ 3412.481879] ? __ia32_sys_shutdown+0x80/0x80 [ 3412.486378] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3412.491139] ? do_syscall_64+0x26/0x620 [ 3412.495128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.500505] ? do_syscall_64+0x26/0x620 [ 3412.504497] __x64_sys_sendmsg+0x78/0xb0 [ 3412.508576] do_syscall_64+0xfd/0x620 [ 3412.512402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.517600] RIP: 0033:0x45a6f9 [ 3412.520806] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3412.539709] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:38 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:38 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000002c350b36cf92978da421ddf80c3e645fca1bde4b7eed67f94747933cd20999f10c84fb"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f00000011c0)='/dev/video#\x00', 0xfffffffffffffffa, 0x464840) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r5, r6) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) r10 = dup2(r4, r9) ioctl$RTC_UIE_ON(r10, 0x7003) mq_notify(r10, &(0x7f0000000140)={0x0, 0x803f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r11 = semget$private(0x0, 0x4, 0x0) semop(r11, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r12 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r12, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r12, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x9]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3412.548299] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3412.555573] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3412.562846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3412.570121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3412.577482] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2800, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:39 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x7fff, 0x4) 15:26:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000000010000000000000006000000000000000000000000000000000000000000120000000000000000000700000069472bfa71"]) 15:26:39 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={0x0}, 0x2d8ac, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x303000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000011c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2}) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) r3 = dup2(r1, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0xa]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3412.891664] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3412.900550] CPU: 1 PID: 4005 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3412.907796] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3412.908287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3412.908296] Call Trace: [ 3412.927212] dump_stack+0x197/0x210 [ 3412.930920] sysfs_warn_dup.cold+0x1c/0x31 [ 3412.935206] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3412.935225] sysfs_create_link+0x65/0xc0 [ 3412.944658] device_add+0x7ce/0x1760 [ 3412.948400] ? get_device_parent.isra.0+0x570/0x570 [ 3412.953462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.959015] wiphy_register+0x16fa/0x21d0 [ 3412.963172] ? show_schedstat+0x832/0xbb0 [ 3412.963194] ? wiphy_unregister+0xfd0/0xfd0 [ 3412.963212] ? rcu_read_lock_sched_held+0x110/0x130 [ 3412.976517] loop3: partition table partially beyond EOD, truncated [ 3412.976679] ? __kmalloc+0x5e1/0x750 [ 3412.986691] ? trace_hardirqs_on+0x67/0x220 15:26:39 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001400)=ANY=[@ANYBLOB="6d616e676c65000000140000ff0f0000000000000000000001000000000000000200000000000000000000000000000000000000000000000000000000000000f3ffffff0000000098c73eb74b46f6027fb76f70113f"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) r8 = dup2(r7, r4) ioctl$RTC_UIE_ON(r8, 0x7003) mq_notify(r8, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r10 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r11 = dup2(r9, r10) ioctl$RTC_UIE_ON(r11, 0x7003) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000001380)=0xc) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) r14 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r15 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r14, r15) ioctl$RTC_AIE_ON(r14, 0x7001) ioctl$RTC_ALM_SET(r14, 0x40247007, &(0x7f0000000380)) r16 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r17 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r18 = dup2(r16, r17) ioctl$RTC_UIE_ON(r18, 0x7003) r19 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r20 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r21 = dup2(r19, r20) ioctl$RTC_UIE_ON(r21, 0x7003) kcmp$KCMP_EPOLL_TFD(r12, r13, 0x7, r14, &(0x7f00000013c0)={r18, r21, 0x40}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r22 = semget$private(0x0, 0x4, 0x0) semop(r22, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r23 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r23, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r23, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3412.986709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.986727] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3413.001510] ieee80211_register_hw+0x156e/0x3800 [ 3413.006288] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3413.006310] ? hrtimer_init+0x8b/0x300 [ 3413.006330] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3413.015082] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3413.015098] ? cred_has_capability+0x193/0x320 [ 3413.015126] ? hwsim_exit_net+0xc50/0xc50 [ 3413.015150] hwsim_new_radio_nl+0x5eb/0x893 [ 3413.025258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.025274] ? security_capable+0x92/0xc0 [ 3413.025294] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3413.025313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.048018] ? nla_parse+0x1fc/0x2f0 [ 3413.048044] genl_family_rcv_msg+0x6db/0xd30 [ 3413.048069] ? genl_unregister_family+0x790/0x790 [ 3413.071729] ? __local_bh_enable_ip+0x15a/0x270 [ 3413.076432] ? __dev_queue_xmit+0x892/0x2fe0 [ 3413.080871] genl_rcv_msg+0xca/0x170 [ 3413.084599] netlink_rcv_skb+0x17d/0x460 [ 3413.087543] loop3: p1 start 448 is beyond EOD, truncated [ 3413.088669] ? genl_family_rcv_msg+0xd30/0xd30 [ 3413.088688] ? netlink_ack+0xb30/0xb30 [ 3413.088721] genl_rcv+0x29/0x40 [ 3413.105889] netlink_unicast+0x53a/0x730 [ 3413.109975] ? netlink_attachskb+0x770/0x770 [ 3413.114399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.119957] netlink_sendmsg+0x8ae/0xd70 [ 3413.124037] ? netlink_unicast+0x730/0x730 [ 3413.125499] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3413.128305] ? selinux_socket_sendmsg+0x36/0x40 [ 3413.128321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.128335] ? security_socket_sendmsg+0x8d/0xc0 [ 3413.128351] ? netlink_unicast+0x730/0x730 [ 3413.153608] sock_sendmsg+0xd7/0x130 [ 3413.157338] ___sys_sendmsg+0x803/0x920 [ 3413.161330] ? copy_msghdr_from_user+0x430/0x430 [ 3413.166091] loop3: p3 start 958347629 is beyond EOD, [ 3413.166105] ? lock_downgrade+0x880/0x880 [ 3413.166108] truncated [ 3413.166118] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3413.171295] ? kasan_check_read+0x11/0x20 [ 3413.171317] ? __fget+0x367/0x540 [ 3413.171338] ? iterate_fd+0x360/0x360 [ 3413.171355] ? lock_downgrade+0x880/0x880 [ 3413.171374] ? __fget_light+0x1a9/0x230 [ 3413.171389] ? __fdget+0x1b/0x20 [ 3413.189040] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3413.191584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3413.191609] __sys_sendmsg+0x105/0x1d0 [ 3413.191624] ? __ia32_sys_shutdown+0x80/0x80 [ 3413.191656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3413.191667] ? do_syscall_64+0x26/0x620 [ 3413.191684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3413.204487] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3413.204713] ? do_syscall_64+0x26/0x620 [ 3413.204734] __x64_sys_sendmsg+0x78/0xb0 [ 3413.204751] do_syscall_64+0xfd/0x620 [ 3413.220890] loop3: p7 start 500206790 is beyond EOD, truncated [ 3413.221180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3413.241376] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3413.243536] RIP: 0033:0x45a6f9 [ 3413.243552] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3413.243560] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3413.243574] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3413.243582] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3413.243590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3413.243597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 15:26:39 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001280)=ANY=[@ANYBLOB="6d616e676c65000000140000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000371115346c23c98f8061b955dcf3e8fe9f805bf0786eefb81970606f0d316c804604a04fea3c672b37c88e5bf7fa3cb0ff063eb830f9a6558fd5d34aacd45aa18763bf93009ef62f1a18dd900800"/150], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000080)=0x401) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3413.243608] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3413.279061] loop3: p9 start 1723989497 is beyond EOD, truncated 15:26:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2a00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:39 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e676c6500000000000040000000000000000000000000000000000000000200000000000000000000000000000000000000000000efa405f828dca9a10000000000000000004e0d3927328352dda92c7aa62f5755c1c248da95b596419aefde7206b6e3d3c3c723f0dd35f6d69191fc6a3e6d577e6604aae613c940472b0d25"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x25]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3413.505564] loop3: p10 start 13460217 is beyond EOD, truncated [ 3413.512925] loop3: p11 start 129726472 is beyond EOD, truncated [ 3413.519342] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3413.533828] loop3: p13 start 471698834 is beyond EOD, truncated [ 3413.544691] loop3: p14 start 3733177086 is beyond EOD, truncated 15:26:39 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r3 = getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) fcntl$lock(r1, 0x5, &(0x7f0000000040)={0x5e97626dadea7e3d, 0x0, 0x80000, 0x6, r3}) 15:26:39 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r2, 0xc1004111, &(0x7f00000001c0)={0xa5, [[0x8001, 0x1, 0xf, 0x3f, 0x8, 0x9, 0x5, 0xf5c7], [0xa46c, 0x10001, 0x2, 0xadbd, 0x8, 0x8001, 0x5, 0xffffffff], [0xc59, 0x601, 0x81, 0x1, 0x8bc6, 0xd8a2, 0x10000, 0x7f]], [{0x9, 0x78cc, 0xffffff00}, {0xfffffffd, 0x47d2, 0x4}, {0x0, 0x4, 0x80000000}, {0x2, 0xfe7, 0xff}, {0x1, 0x2, 0x400}, {0x1f, 0xdca5, 0x3}, {0x8, 0x6, 0x9}, {0xfffffffb, 0x6, 0x4}, {0x90, 0xffffff26}, {0x2, 0x218, 0x8}, {0x3, 0x30a, 0xd6}, {0x10000, 0x9, 0x3}], 0x8}) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) [ 3413.645926] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3413.707059] CPU: 1 PID: 4361 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3413.714833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3413.724206] Call Trace: [ 3413.724233] dump_stack+0x197/0x210 [ 3413.724259] sysfs_warn_dup.cold+0x1c/0x31 [ 3413.724280] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3413.724298] sysfs_create_link+0x65/0xc0 [ 3413.724317] device_add+0x7ce/0x1760 [ 3413.724338] ? get_device_parent.isra.0+0x570/0x570 [ 3413.744202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.744232] wiphy_register+0x16fa/0x21d0 [ 3413.744247] ? show_schedstat+0x832/0xbb0 [ 3413.744267] ? wiphy_unregister+0xfd0/0xfd0 [ 3413.771213] ? rcu_read_lock_sched_held+0x110/0x130 [ 3413.777131] ? __kmalloc+0x5e1/0x750 [ 3413.780856] ? trace_hardirqs_on+0x67/0x220 [ 3413.785192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.790748] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3413.795721] ieee80211_register_hw+0x156e/0x3800 [ 3413.800501] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3413.805365] ? hrtimer_init+0x8b/0x300 [ 3413.809280] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3413.814415] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3413.819449] ? cred_has_capability+0x193/0x320 [ 3413.824187] ? hwsim_exit_net+0xc50/0xc50 [ 3413.824203] ? __mutex_lock+0xa67/0x1300 [ 3413.824225] hwsim_new_radio_nl+0x5eb/0x893 [ 3413.836846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.836863] ? security_capable+0x92/0xc0 [ 3413.836882] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3413.851764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.857320] ? nla_parse+0x1fc/0x2f0 [ 3413.861059] genl_family_rcv_msg+0x6db/0xd30 [ 3413.865491] ? genl_unregister_family+0x790/0x790 [ 3413.870364] ? __local_bh_enable_ip+0x15a/0x270 [ 3413.875045] ? __dev_queue_xmit+0x892/0x2fe0 [ 3413.879623] genl_rcv_msg+0xca/0x170 [ 3413.883370] netlink_rcv_skb+0x17d/0x460 [ 3413.887476] ? genl_family_rcv_msg+0xd30/0xd30 [ 3413.892080] ? netlink_ack+0xb30/0xb30 [ 3413.896003] genl_rcv+0x29/0x40 [ 3413.899298] netlink_unicast+0x53a/0x730 [ 3413.903375] ? netlink_attachskb+0x770/0x770 [ 3413.907819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.913379] netlink_sendmsg+0x8ae/0xd70 [ 3413.917465] ? netlink_unicast+0x730/0x730 [ 3413.921719] ? selinux_socket_sendmsg+0x36/0x40 [ 3413.926402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3413.931971] ? security_socket_sendmsg+0x8d/0xc0 [ 3413.936740] ? netlink_unicast+0x730/0x730 [ 3413.941003] sock_sendmsg+0xd7/0x130 [ 3413.944730] ___sys_sendmsg+0x803/0x920 [ 3413.948721] ? copy_msghdr_from_user+0x430/0x430 [ 3413.953493] ? lock_downgrade+0x880/0x880 [ 3413.957651] ? kasan_check_read+0x11/0x20 [ 3413.961815] ? __fget+0x367/0x540 [ 3413.966235] ? iterate_fd+0x360/0x360 [ 3413.970061] ? lock_downgrade+0x880/0x880 [ 3413.974219] ? __fget_light+0x1a9/0x230 [ 3413.978200] ? __fdget+0x1b/0x20 [ 3413.981575] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3413.987129] __sys_sendmsg+0x105/0x1d0 [ 3413.991153] ? __ia32_sys_shutdown+0x80/0x80 [ 3413.995609] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3414.000376] ? do_syscall_64+0x26/0x620 [ 3414.004364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3414.009744] ? do_syscall_64+0x26/0x620 [ 3414.013746] __x64_sys_sendmsg+0x78/0xb0 [ 3414.017825] do_syscall_64+0xfd/0x620 [ 3414.022166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3414.027362] RIP: 0033:0x45a6f9 [ 3414.030570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3414.049826] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:40 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:40 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001280)=ANY=[@ANYBLOB="6d616e676c65000000140000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000371115346c23c98f8061b955dcf3e8fe9f805bf0786eefb81970606f0d316c804604a04fea3c672b37c88e5bf7fa3cb0ff063eb830f9a6558fd5d34aacd45aa18763bf93009ef62f1a18dd900800"/150], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000080)=0x401) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3414.057545] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3414.064821] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3414.072116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3414.079397] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3414.086764] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x4e]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x3}, 0x6ca44e646730e911, 0xffffffffffffffff, 0x4, 0x0, 0xfffffffffffffffc, 0xfffffffe}, 0x0, 0xfffffffffffffffe, r0, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x144720, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="77616e676c650000000000000000000000000000000000000000000000000000020000120000f6d32971b5c60000000080000000020000000000000000000000f700000000170000"], 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x200000) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x9, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0xd2}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r10 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r11 = dup2(r9, r10) ioctl$RTC_UIE_ON(r11, 0x7003) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r13 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r14 = dup2(r12, r13) ioctl$RTC_UIE_ON(r14, 0x7003) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r14, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0xa95e}, &(0x7f0000001380)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r11, 0x84, 0x7c, &(0x7f00000013c0)={r15, 0x40, 0x200}, &(0x7f0000001400)=0x8) r16 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x1, @dev={0xac, 0x14, 0x14, 0x27}}, 0x212) r17 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r18 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r19 = dup2(r17, r18) ioctl$RTC_UIE_ON(r19, 0x7003) connect(r16, &(0x7f0000001480)=@pppol2tpv3={0x2, 0x1, {0x0, r19, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x8004}}, 0x80) 15:26:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2c00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3414.261259] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3414.287825] loop3: partition table partially beyond EOD, truncated 15:26:40 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3414.326669] loop3: p1 size 1687525121 extends beyond EOD, truncated [ 3414.354895] loop3: p2 start 2874689328 is beyond EOD, truncated [ 3414.370554] loop3: p3 start 958347629 is beyond EOD, truncated 15:26:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c65e7f40011000000000000000d00000000000000000000000000000000e21ed026020000000000000000000000000000002000"/78], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x20003f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x100000000000000, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) r8 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r8) ptrace(0x4208, r8) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r10, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r10, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:40 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x2, 0x1f, 0xfa8, 0x101, "889f693ce8a23aea2c516065b7685e99b0354e85080f6997a6421b6d81e8000e"}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3414.397967] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3414.408846] loop3: p5 start 1813757113 is beyond EOD, truncated [ 3414.416027] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3414.438017] loop3: p7 start 500206790 is beyond EOD, truncated [ 3414.447985] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3414.455465] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3414.491916] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3414.494446] CPU: 1 PID: 4766 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3414.505774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3414.515148] Call Trace: [ 3414.517763] dump_stack+0x197/0x210 [ 3414.521420] sysfs_warn_dup.cold+0x1c/0x31 [ 3414.525677] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3414.531059] sysfs_create_link+0x65/0xc0 [ 3414.535138] device_add+0x7ce/0x1760 [ 3414.538607] loop3: p10 start 13460217 is beyond EOD, truncated [ 3414.538870] ? get_device_parent.isra.0+0x570/0x570 [ 3414.538887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3414.555409] wiphy_register+0x16fa/0x21d0 [ 3414.559570] ? show_schedstat+0x832/0xbb0 [ 3414.563739] ? wiphy_unregister+0xfd0/0xfd0 [ 3414.568076] ? rcu_read_lock_sched_held+0x110/0x130 [ 3414.573106] ? __kmalloc+0x5e1/0x750 [ 3414.576834] ? trace_hardirqs_on+0x67/0x220 [ 3414.581180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3414.587141] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3414.592103] ieee80211_register_hw+0x156e/0x3800 [ 3414.592609] loop3: p11 start 129726472 is beyond EOD, truncated [ 3414.596882] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3414.596904] ? hrtimer_init+0x8b/0x300 [ 3414.596921] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3414.596940] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3414.621992] ? cred_has_capability+0x193/0x320 [ 3414.626630] ? hwsim_exit_net+0xc50/0xc50 [ 3414.630809] ? __mutex_lock+0xa67/0x1300 [ 3414.634908] hwsim_new_radio_nl+0x5eb/0x893 [ 3414.639258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3414.644945] ? security_capable+0x92/0xc0 [ 3414.649126] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3414.654358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3414.659927] ? nla_parse+0x1fc/0x2f0 [ 3414.663703] genl_family_rcv_msg+0x6db/0xd30 [ 3414.668147] ? genl_unregister_family+0x790/0x790 [ 3414.671611] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3414.673010] ? __local_bh_enable_ip+0x15a/0x270 [ 3414.673026] ? __dev_queue_xmit+0x892/0x2fe0 [ 3414.673056] genl_rcv_msg+0xca/0x170 15:26:40 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x8000, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000080)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) r3 = dup2(r1, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="6d616e676c00000000a85030ea00000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000da50e492a7b2841e1385bd1071407334089dec796ab68436a4d4cc3388244edc595bf9addcb13a817bb8b3889607a46c5b3dbf75019da579e10583e5099ab5f3d3fe55b33903fd3e3375e724efc4b60084272e78a32bf1130dce38db9aa3a01af82"], 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0xff11) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semget$private(0x0, 0x4, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3414.688042] loop3: p13 start 471698834 is beyond EOD, truncated [ 3414.688609] netlink_rcv_skb+0x17d/0x460 [ 3414.688624] ? genl_family_rcv_msg+0xd30/0xd30 [ 3414.688640] ? netlink_ack+0xb30/0xb30 [ 3414.711031] genl_rcv+0x29/0x40 [ 3414.714416] netlink_unicast+0x53a/0x730 [ 3414.715406] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3414.718490] ? netlink_attachskb+0x770/0x770 [ 3414.718508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3414.718525] netlink_sendmsg+0x8ae/0xd70 [ 3414.738667] ? netlink_unicast+0x730/0x730 [ 3414.742931] ? selinux_socket_sendmsg+0x36/0x40 [ 3414.747618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3414.753178] ? security_socket_sendmsg+0x8d/0xc0 [ 3414.757952] ? netlink_unicast+0x730/0x730 [ 3414.762211] sock_sendmsg+0xd7/0x130 [ 3414.765937] ___sys_sendmsg+0x803/0x920 [ 3414.769926] ? copy_msghdr_from_user+0x430/0x430 [ 3414.774708] ? lock_downgrade+0x880/0x880 [ 3414.778881] ? kasan_check_read+0x11/0x20 [ 3414.783079] ? __fget+0x367/0x540 [ 3414.786537] ? iterate_fd+0x360/0x360 [ 3414.786557] ? lock_downgrade+0x880/0x880 [ 3414.786577] ? __fget_light+0x1a9/0x230 [ 3414.786593] ? __fdget+0x1b/0x20 [ 3414.801865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3414.807430] __sys_sendmsg+0x105/0x1d0 [ 3414.811338] ? __ia32_sys_shutdown+0x80/0x80 [ 3414.815882] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3414.820679] ? do_syscall_64+0x26/0x620 [ 3414.824695] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3414.830091] ? do_syscall_64+0x26/0x620 [ 3414.834099] __x64_sys_sendmsg+0x78/0xb0 [ 3414.838187] do_syscall_64+0xfd/0x620 15:26:41 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000080)={0x0, 0x2, 0x4, [], &(0x7f0000000040)=0x39}) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3414.842017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3414.847216] RIP: 0033:0x45a6f9 [ 3414.850420] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3414.869335] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3414.877229] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:41 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3414.884588] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3414.896026] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3414.903300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3414.910577] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x56]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:41 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r0, r1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x100000001, 0x0) r4 = dup2(r2, r3) ioctl$RTC_UIE_ON(r4, 0x7003) truncate(&(0x7f0000000040)='./file0\x00', 0x7) sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYRESHEX=r1], 0x3}}, 0x20000002) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:41 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000001380)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}, 0x0, 0x0, 0x1}}, 0x80) 15:26:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2d00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:41 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) ioctl$SIOCAX25DELUID(r9, 0x89e2, &(0x7f0000000040)={0x3, @null, r11}) r12 = semget$private(0x0, 0x4, 0x0) semop(r12, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x63]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:41 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="c001000001979564304758ab91e340266d391f3965f8f04943f03df03772f0aab9bc1b6c1c0539a723fb99d87460842ac68cd01d34965f98fd6715e8cf0bf2fcf9fdc166f5f90b3af962cd0056da82890878bb073154cc95002ce955e54721db928d1d1c3f77ac5ffec283de6325493500000000000000000000bae7498328075efcb4e894d7f881f0aea9a1826d9affd89d1427d3c9f8f5ea8281eb5e390268471a649a468e8ca0b321d622bc3c1f836468fba0d9cd5f5ef0a0ad9a3c66c26487fde1dcdbf9f0cebcf29eac98d4fd206494238b4bb448e32f407db02e4d97299aa4825c0a3f589c31c6c69ef5bae722d62d8800fd0814e5057ecc430b97b0696add873cab85c6ca717076d80e9a6b9359dd1370eadead529dd63206f6ef2b4bc07dbbf9c7923d551fb14c53687ef7f1f3a4b1d42c21ac3325cfa13dc27c3b01c979c3873995e642e8517b3ac980864644562717550523ed56144c63c4b412950a5ea1948c3278fa81fec5b1e2b7f516ea4ac2cc75fbd7aaa5df1577c8f2f1d3f9cb274db13ae6fcddd0164931e775c1b784d100c332b1cf5eab08fc3f11e15c75672580ae3db04cb67133c6571f3d93c004d86b8d56b1cbc523d7d17387fef3ae60aa2e93bf0a4615345d3d310f54fe387bbdd5d110d3ae58fdc808e520f7f15457bf8a118284b4045102f4ac1e6458c006a05332fbc8b778012b4a849b", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) [ 3415.424797] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3415.467181] CPU: 1 PID: 5315 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3415.474975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3415.484347] Call Trace: [ 3415.487074] dump_stack+0x197/0x210 [ 3415.490732] sysfs_warn_dup.cold+0x1c/0x31 [ 3415.494988] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3415.500395] sysfs_create_link+0x65/0xc0 [ 3415.504477] device_add+0x7ce/0x1760 [ 3415.508219] ? get_device_parent.isra.0+0x570/0x570 [ 3415.513252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3415.518822] wiphy_register+0x16fa/0x21d0 [ 3415.522992] ? show_schedstat+0x832/0xbb0 [ 3415.527165] ? wiphy_unregister+0xfd0/0xfd0 [ 3415.531517] ? rcu_read_lock_sched_held+0x110/0x130 [ 3415.536553] ? __kmalloc+0x5e1/0x750 [ 3415.540284] ? trace_hardirqs_on+0x67/0x220 [ 3415.544637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3415.550214] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3415.555288] ieee80211_register_hw+0x156e/0x3800 [ 3415.560073] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3415.564937] ? hrtimer_init+0x8b/0x300 [ 3415.568848] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3415.573992] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3415.579023] ? cred_has_capability+0x193/0x320 [ 3415.583747] ? hwsim_exit_net+0xc50/0xc50 [ 3415.587970] hwsim_new_radio_nl+0x5eb/0x893 [ 3415.592309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3415.598008] ? security_capable+0x92/0xc0 [ 3415.602454] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3415.607689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3415.613249] ? nla_parse+0x1fc/0x2f0 [ 3415.616990] genl_family_rcv_msg+0x6db/0xd30 [ 3415.621430] ? genl_unregister_family+0x790/0x790 [ 3415.626303] ? __local_bh_enable_ip+0x15a/0x270 [ 3415.631004] ? __dev_queue_xmit+0x892/0x2fe0 [ 3415.635451] genl_rcv_msg+0xca/0x170 [ 3415.639273] netlink_rcv_skb+0x17d/0x460 [ 3415.643359] ? genl_family_rcv_msg+0xd30/0xd30 [ 3415.647953] ? netlink_ack+0xb30/0xb30 [ 3415.651865] genl_rcv+0x29/0x40 [ 3415.655150] netlink_unicast+0x53a/0x730 [ 3415.659571] ? netlink_attachskb+0x770/0x770 [ 3415.663993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3415.669556] netlink_sendmsg+0x8ae/0xd70 [ 3415.673640] ? netlink_unicast+0x730/0x730 [ 3415.677895] ? selinux_socket_sendmsg+0x36/0x40 [ 3415.682576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3415.688152] ? security_socket_sendmsg+0x8d/0xc0 [ 3415.692922] ? netlink_unicast+0x730/0x730 [ 3415.697172] sock_sendmsg+0xd7/0x130 [ 3415.701041] ___sys_sendmsg+0x803/0x920 [ 3415.705046] ? copy_msghdr_from_user+0x430/0x430 [ 3415.709827] ? lock_downgrade+0x880/0x880 [ 3415.713995] ? kasan_check_read+0x11/0x20 [ 3415.718158] ? __fget+0x367/0x540 [ 3415.721648] ? iterate_fd+0x360/0x360 [ 3415.725488] ? lock_downgrade+0x880/0x880 [ 3415.729649] ? __fget_light+0x1a9/0x230 [ 3415.733632] ? __fdget+0x1b/0x20 [ 3415.737004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3415.742556] __sys_sendmsg+0x105/0x1d0 [ 3415.746473] ? __ia32_sys_shutdown+0x80/0x80 [ 3415.750908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3415.755669] ? do_syscall_64+0x26/0x620 [ 3415.759652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3415.765022] ? do_syscall_64+0x26/0x620 [ 3415.769012] __x64_sys_sendmsg+0x78/0xb0 [ 3415.773082] do_syscall_64+0xfd/0x620 [ 3415.776902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3415.782095] RIP: 0033:0x45a6f9 [ 3415.785297] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3415.804216] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:26:42 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:42 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$SG_IO(r3, 0x2285, &(0x7f0000002ac0)={0x0, 0xfffffffffffffffe, 0xb6, 0x6, @scatter={0xa, 0x0, &(0x7f0000002840)=[{&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000080)=""/4, 0x4}, {&(0x7f0000002380)=""/158, 0x9e}, {&(0x7f0000002440)=""/84, 0x54}, {&(0x7f00000024c0)=""/20, 0x14}, {&(0x7f0000002500)=""/185, 0xb9}, {&(0x7f00000025c0)=""/94, 0x5e}, {&(0x7f0000002640)=""/183, 0xb7}, {&(0x7f0000002700)=""/169, 0xa9}, {&(0x7f00000027c0)=""/117, 0x75}]}, &(0x7f0000002900)="0852688a2c1fb533dea47c21e45ca859d9d1a2728b2311a35f795c1a0275b70c59156d2f7602df514e44de085b92b26302cf0f87580633381a598753d264b6ed247465b33406b7e9fb78835421067291b4519e0c475ac5d6535fca197d2503b0c4658a5b9b095040e83e04f8051bd509210c428244859a465ff17fb94d0f7a96716aa762ba043a4c440b568721bd79d89d2374c1b69965bedd6d20f17b47b1312b690223f1cab5d1c3979643196537b3debb4325df3a", &(0x7f00000029c0)=""/131, 0xfff, 0x5, 0x2, &(0x7f0000002a80)}) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r5 = dup2(r0, r4) ioctl$RTC_UIE_ON(r5, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r11 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r11, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r11, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3415.811954] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3415.819231] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3415.826505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3415.833901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3415.841180] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3415.910841] loop3: [ICS] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 [ 3415.941083] loop3: partition table partially beyond EOD, truncated 15:26:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2e00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:42 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$UHID_DESTROY(r8, &(0x7f0000000080), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3415.988791] loop3: p1 start 448 is beyond EOD, truncated [ 3416.024512] loop3: p2 start 2874689328 is beyond EOD, truncated 15:26:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x69]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3416.060340] loop3: p3 start 958347629 is beyond EOD, truncated [ 3416.079453] loop3: p4 start 4030591043 is beyond EOD, truncated [ 3416.097078] loop3: p5 start 1813757113 is beyond EOD, truncated 15:26:42 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) [ 3416.125395] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3416.139095] loop3: p6 start 3633969955 is beyond EOD, truncated [ 3416.172121] CPU: 0 PID: 5565 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3416.175069] loop3: p7 start 500206790 is beyond EOD, truncated [ 3416.179883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3416.179889] Call Trace: [ 3416.179915] dump_stack+0x197/0x210 [ 3416.179938] sysfs_warn_dup.cold+0x1c/0x31 [ 3416.179959] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3416.179979] sysfs_create_link+0x65/0xc0 [ 3416.179998] device_add+0x7ce/0x1760 [ 3416.180019] ? get_device_parent.isra.0+0x570/0x570 [ 3416.196159] loop3: p8 start 3893716989 is beyond EOD, truncated [ 3416.197929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3416.197956] wiphy_register+0x16fa/0x21d0 [ 3416.197973] ? show_schedstat+0x832/0xbb0 [ 3416.209744] loop3: p9 start 1723989497 is beyond EOD, truncated [ 3416.211185] ? wiphy_unregister+0xfd0/0xfd0 [ 3416.211207] ? rcu_read_lock_sched_held+0x110/0x130 [ 3416.211221] ? __kmalloc+0x5e1/0x750 [ 3416.211237] ? trace_hardirqs_on+0x67/0x220 [ 3416.216246] loop3: p10 start 13460217 is beyond EOD, truncated [ 3416.218999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3416.219016] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3416.219037] ieee80211_register_hw+0x156e/0x3800 [ 3416.219061] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3416.244309] loop3: p11 start 129726472 is beyond EOD, truncated [ 3416.249971] ? hrtimer_init+0x8b/0x300 [ 3416.249992] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3416.250010] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3416.250024] ? cred_has_capability+0x193/0x320 [ 3416.250049] ? hwsim_exit_net+0xc50/0xc50 [ 3416.250070] hwsim_new_radio_nl+0x5eb/0x893 [ 3416.250086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3416.260784] loop3: p12 start 1441344512 is beyond EOD, truncated [ 3416.263131] ? security_capable+0x92/0xc0 [ 3416.263153] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3416.263180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3416.267750] loop3: p13 start 471698834 is beyond EOD, truncated [ 3416.273444] ? nla_parse+0x1fc/0x2f0 [ 3416.273468] genl_family_rcv_msg+0x6db/0xd30 [ 3416.273488] ? genl_unregister_family+0x790/0x790 [ 3416.273504] ? __local_bh_enable_ip+0x15a/0x270 [ 3416.273520] ? __dev_queue_xmit+0x892/0x2fe0 [ 3416.273549] genl_rcv_msg+0xca/0x170 [ 3416.283139] loop3: p14 start 3733177086 is beyond EOD, truncated [ 3416.284013] netlink_rcv_skb+0x17d/0x460 [ 3416.284031] ? genl_family_rcv_msg+0xd30/0xd30 [ 3416.284049] ? netlink_ack+0xb30/0xb30 [ 3416.404874] genl_rcv+0x29/0x40 [ 3416.408173] netlink_unicast+0x53a/0x730 [ 3416.412261] ? netlink_attachskb+0x770/0x770 [ 3416.416683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3416.422238] netlink_sendmsg+0x8ae/0xd70 [ 3416.426312] ? netlink_unicast+0x730/0x730 [ 3416.430559] ? selinux_socket_sendmsg+0x36/0x40 [ 3416.435244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3416.440795] ? security_socket_sendmsg+0x8d/0xc0 [ 3416.445571] ? netlink_unicast+0x730/0x730 [ 3416.449867] sock_sendmsg+0xd7/0x130 [ 3416.453605] ___sys_sendmsg+0x803/0x920 [ 3416.457608] ? copy_msghdr_from_user+0x430/0x430 [ 3416.462395] ? lock_downgrade+0x880/0x880 [ 3416.466563] ? kasan_check_read+0x11/0x20 15:26:42 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e670000000000000000000000000000000000000200eecb133000"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3416.470725] ? __fget+0x367/0x540 [ 3416.474194] ? iterate_fd+0x360/0x360 [ 3416.478138] ? lock_downgrade+0x880/0x880 [ 3416.482304] ? __fget_light+0x1a9/0x230 [ 3416.486286] ? __fdget+0x1b/0x20 [ 3416.489660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3416.495216] __sys_sendmsg+0x105/0x1d0 [ 3416.499115] ? __ia32_sys_shutdown+0x80/0x80 [ 3416.503553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3416.508336] ? do_syscall_64+0x26/0x620 [ 3416.512319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3416.517689] ? do_syscall_64+0x26/0x620 [ 3416.521678] __x64_sys_sendmsg+0x78/0xb0 [ 3416.525755] do_syscall_64+0xfd/0x620 [ 3416.529578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3416.534777] RIP: 0033:0x45a6f9 [ 3416.537974] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3416.556888] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3416.564731] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:42 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000004800000000000000faffffff180000000000100000"], 0x48) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000001380)='./file0\x00') getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3416.572139] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3416.579453] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3416.586734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3416.594015] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x2f00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x86]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:43 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r0, r1) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000380)) fchdir(r0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001800)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3f02000000000000000001000000000000000b636173742d6c696e6b0200"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000001940)={&(0x7f0000001840), 0xc, &(0x7f0000001900)={&(0x7f0000001880)={0x68, r4, 0x100, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x8, @link='broadcast-link\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x10000001}, 0x4040) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) [ 3416.881467] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3416.933804] CPU: 0 PID: 5841 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3416.941600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3416.951054] Call Trace: [ 3416.953666] dump_stack+0x197/0x210 [ 3416.957324] sysfs_warn_dup.cold+0x1c/0x31 [ 3416.961586] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3416.966973] sysfs_create_link+0x65/0xc0 [ 3416.971056] device_add+0x7ce/0x1760 [ 3416.974800] ? get_device_parent.isra.0+0x570/0x570 15:26:43 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) [ 3416.979830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3416.985385] wiphy_register+0x16fa/0x21d0 [ 3416.989566] ? show_schedstat+0x832/0xbb0 [ 3416.993729] ? wiphy_unregister+0xfd0/0xfd0 [ 3416.998083] ? rcu_read_lock_sched_held+0x110/0x130 [ 3417.003118] ? __kmalloc+0x5e1/0x750 [ 3417.006834] ? trace_hardirqs_on+0x67/0x220 [ 3417.011160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3417.011178] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3417.011199] ieee80211_register_hw+0x156e/0x3800 [ 3417.011225] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3417.011242] ? hrtimer_init+0x8b/0x300 [ 3417.011259] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3417.011279] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3417.011293] ? cred_has_capability+0x193/0x320 [ 3417.011320] ? hwsim_exit_net+0xc50/0xc50 [ 3417.011343] hwsim_new_radio_nl+0x5eb/0x893 [ 3417.058523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3417.064076] ? security_capable+0x92/0xc0 [ 3417.068247] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3417.073459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3417.079096] ? nla_parse+0x1fc/0x2f0 [ 3417.082832] genl_family_rcv_msg+0x6db/0xd30 [ 3417.087262] ? genl_unregister_family+0x790/0x790 [ 3417.092213] ? __local_bh_enable_ip+0x15a/0x270 [ 3417.096912] ? __dev_queue_xmit+0x892/0x2fe0 [ 3417.101354] genl_rcv_msg+0xca/0x170 [ 3417.105085] netlink_rcv_skb+0x17d/0x460 [ 3417.109157] ? genl_family_rcv_msg+0xd30/0xd30 [ 3417.113753] ? netlink_ack+0xb30/0xb30 [ 3417.117668] genl_rcv+0x29/0x40 [ 3417.120960] netlink_unicast+0x53a/0x730 [ 3417.125043] ? netlink_attachskb+0x770/0x770 15:26:43 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) r3 = dup2(r1, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000002700)=ANY=[@ANYBLOB="6d616e676c6500000000f8ffffff00000000000000000000000000000000000002002ae51910bc0000000000000000000000000000000000000000070000000000000000000000000000000032ab7d30dda65b79dc44e24db3abc27c00cc2ba741244ea0884b69235dd21b400add673ecb2701e9e3c21bd743fde35b2e9f6124fed7f708cf2d00acabee38f27ad67b15883a7d33cddcd8bcfa3649067e5344ba3781f2d0b92681097918d14bf7576a5c984af55742870544ea58f9b9555751d6e04f3027c179248b5d21e07fb41addb6f413fa38ceadbf6295900979c738927951c038bb5e28667f8e9a1e9a1a28196a42b17a"], 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) recvmsg(r10, &(0x7f0000002580)={&(0x7f00000012c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/186, 0xba}, {&(0x7f0000000080)=""/1, 0x1}, {&(0x7f0000002400)=""/181, 0xb5}], 0x4, &(0x7f0000002500)=""/79, 0x4f}, 0x2) bind$packet(r0, &(0x7f00000025c0)={0x11, 0x5, r11}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r12 = semget$private(0x0, 0x4, 0x0) semop(r12, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3417.129639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3417.135277] netlink_sendmsg+0x8ae/0xd70 [ 3417.139356] ? netlink_unicast+0x730/0x730 [ 3417.143605] ? selinux_socket_sendmsg+0x36/0x40 [ 3417.148291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3417.153842] ? security_socket_sendmsg+0x8d/0xc0 [ 3417.158612] ? netlink_unicast+0x730/0x730 [ 3417.162868] sock_sendmsg+0xd7/0x130 [ 3417.166595] ___sys_sendmsg+0x803/0x920 [ 3417.170584] ? copy_msghdr_from_user+0x430/0x430 [ 3417.175361] ? lock_downgrade+0x880/0x880 [ 3417.179525] ? kasan_check_read+0x11/0x20 [ 3417.183797] ? __fget+0x367/0x540 [ 3417.187269] ? iterate_fd+0x360/0x360 [ 3417.191115] ? lock_downgrade+0x880/0x880 [ 3417.195277] ? __fget_light+0x1a9/0x230 [ 3417.199263] ? __fdget+0x1b/0x20 [ 3417.202640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3417.208369] __sys_sendmsg+0x105/0x1d0 [ 3417.212271] ? __ia32_sys_shutdown+0x80/0x80 [ 3417.217261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3417.222027] ? do_syscall_64+0x26/0x620 [ 3417.226010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3417.231482] ? do_syscall_64+0x26/0x620 [ 3417.235479] __x64_sys_sendmsg+0x78/0xb0 [ 3417.239557] do_syscall_64+0xfd/0x620 [ 3417.243374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3417.248566] RIP: 0033:0x45a6f9 [ 3417.251768] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3417.270678] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3417.278400] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:43 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) [ 3417.285689] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3417.292970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3417.300250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3417.307533] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:43 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001580)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000005fd599ab8c8d6c8408e95c1e5a80e9b7cbdda3378986c8cc72878e309c2c821592c0c2d2fceadae14f2e0027749dfbd10b777b9c9731b2315a136ebddb5b14a501509eccca78837d6a1fc7ec66ddb02f1fc9ef5bf99b1b0c43f0f3c40caa125433dbf2afe5beb8fe581e78a7f2ca7f8753f6245e25832ed2848dbf2beab31b7d66"], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r3, &(0x7f0000001380)="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", &(0x7f0000001480)=""/242, 0x4}, 0x20) ptrace(0x10, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x26a) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r8, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:43 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x3000, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:44 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4080, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r7 = semget$private(0x0, 0x4, 0x0) semop(r7, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) ioctl$EVIOCGABS20(r10, 0x80184560, &(0x7f00000012c0)=""/4096) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0xc9]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:44 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x10, 0xfe, 0x0, 0x3c47, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r9 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r10 = dup2(r8, r9) ioctl$RTC_UIE_ON(r10, 0x7003) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000001380)={0xff, 0x5, 0x4, 0x0, {}, {0x4, 0x1, 0x6, 0xd6, 0x5, 0x7, "8fbc32ff"}, 0x3ff, 0x3, @fd=r10, 0x4}) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r11 = semget$private(0x0, 0x4, 0x0) semop(r11, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r12 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r12, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r12, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 3417.843935] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3417.896552] CPU: 1 PID: 6207 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3417.904319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3417.913694] Call Trace: [ 3417.916301] dump_stack+0x197/0x210 [ 3417.919950] sysfs_warn_dup.cold+0x1c/0x31 [ 3417.924201] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3417.929593] sysfs_create_link+0x65/0xc0 [ 3417.933679] device_add+0x7ce/0x1760 [ 3417.937411] ? get_device_parent.isra.0+0x570/0x570 [ 3417.942458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3417.948016] wiphy_register+0x16fa/0x21d0 [ 3417.952180] ? show_schedstat+0x832/0xbb0 [ 3417.956352] ? wiphy_unregister+0xfd0/0xfd0 [ 3417.960695] ? rcu_read_lock_sched_held+0x110/0x130 [ 3417.960710] ? __kmalloc+0x5e1/0x750 [ 3417.960723] ? trace_hardirqs_on+0x67/0x220 [ 3417.960756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3417.979300] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3417.984249] ieee80211_register_hw+0x156e/0x3800 [ 3417.984273] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3417.993883] ? hrtimer_init+0x8b/0x300 [ 3417.997792] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3418.002920] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3418.007943] ? cred_has_capability+0x193/0x320 [ 3418.012556] ? hwsim_exit_net+0xc50/0xc50 [ 3418.016718] hwsim_new_radio_nl+0x5eb/0x893 [ 3418.021046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.026593] ? security_capable+0x92/0xc0 [ 3418.030755] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3418.035966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.041512] ? nla_parse+0x1fc/0x2f0 [ 3418.045255] genl_family_rcv_msg+0x6db/0xd30 [ 3418.049690] ? genl_unregister_family+0x790/0x790 [ 3418.054556] ? __local_bh_enable_ip+0x15a/0x270 [ 3418.059241] ? __dev_queue_xmit+0x892/0x2fe0 [ 3418.063678] genl_rcv_msg+0xca/0x170 [ 3418.067404] netlink_rcv_skb+0x17d/0x460 [ 3418.071485] ? genl_family_rcv_msg+0xd30/0xd30 [ 3418.076093] ? netlink_ack+0xb30/0xb30 [ 3418.079999] genl_rcv+0x29/0x40 [ 3418.083298] netlink_unicast+0x53a/0x730 [ 3418.087375] ? netlink_attachskb+0x770/0x770 [ 3418.091799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.097354] netlink_sendmsg+0x8ae/0xd70 [ 3418.101432] ? netlink_unicast+0x730/0x730 [ 3418.105680] ? selinux_socket_sendmsg+0x36/0x40 [ 3418.110354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.115899] ? security_socket_sendmsg+0x8d/0xc0 [ 3418.120677] ? netlink_unicast+0x730/0x730 [ 3418.124929] sock_sendmsg+0xd7/0x130 [ 3418.128650] ___sys_sendmsg+0x803/0x920 [ 3418.132641] ? copy_msghdr_from_user+0x430/0x430 [ 3418.137408] ? lock_downgrade+0x880/0x880 [ 3418.141578] ? kasan_check_read+0x11/0x20 [ 3418.145737] ? __fget+0x367/0x540 [ 3418.149232] ? iterate_fd+0x360/0x360 [ 3418.153051] ? lock_downgrade+0x880/0x880 [ 3418.157218] ? __fget_light+0x1a9/0x230 [ 3418.161209] ? __fdget+0x1b/0x20 [ 3418.164585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3418.170139] __sys_sendmsg+0x105/0x1d0 [ 3418.174038] ? __ia32_sys_shutdown+0x80/0x80 [ 3418.178460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3418.183223] ? do_syscall_64+0x26/0x620 [ 3418.187212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3418.192589] ? do_syscall_64+0x26/0x620 [ 3418.196578] __x64_sys_sendmsg+0x78/0xb0 [ 3418.200647] do_syscall_64+0xfd/0x620 [ 3418.204466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3418.209655] RIP: 0033:0x45a6f9 [ 3418.212854] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3418.231771] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3418.239498] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 15:26:44 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000300)=@dstopts, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e20, 0x101, @rand_addr="16ecfdfb5da577fba85b959983db5dc9"}}, 0x6, 0x40, 0x0, 0x5, 0x80}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r5, 0x5}, &(0x7f0000000100)=0x8) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080f0656250", 0x40, 0x1c0}]) 15:26:44 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) connect(0xffffffffffffffff, 0x0, 0x0) [ 3418.246802] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3418.254093] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3418.261578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3418.268863] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:44 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:44 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$RTC_UIE_ON(r3, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet6_opts(r8, 0x29, 0x36, &(0x7f0000000300)=@dstopts, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x70, &(0x7f0000001380)=[@in6={0xa, 0x4e21, 0xffff8feb, @mcast2, 0x8}, @in6={0xa, 0x4e20, 0x8, @mcast2, 0x3ff}, @in6={0xa, 0x4e23, 0x101, @mcast1, 0xd74}, @in6={0xa, 0x4e20, 0x922b9ee0, @empty, 0x1}]}, &(0x7f0000001400)=0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r10, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r10, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x3f00, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 15:26:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3418.788474] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3418.819489] CPU: 1 PID: 6623 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 3418.827269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3418.836668] Call Trace: [ 3418.839285] dump_stack+0x197/0x210 [ 3418.842948] sysfs_warn_dup.cold+0x1c/0x31 [ 3418.847209] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3418.852638] sysfs_create_link+0x65/0xc0 [ 3418.856714] device_add+0x7ce/0x1760 [ 3418.860447] ? get_device_parent.isra.0+0x570/0x570 [ 3418.865472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.871030] wiphy_register+0x16fa/0x21d0 [ 3418.875187] ? show_schedstat+0x832/0xbb0 [ 3418.879357] ? wiphy_unregister+0xfd0/0xfd0 [ 3418.883687] ? rcu_read_lock_sched_held+0x110/0x130 [ 3418.888812] ? __kmalloc+0x5e1/0x750 [ 3418.892552] ? trace_hardirqs_on+0x67/0x220 [ 3418.896883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.902473] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3418.907412] ieee80211_register_hw+0x156e/0x3800 [ 3418.912185] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3418.917040] ? hrtimer_init+0x8b/0x300 [ 3418.920940] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3418.926229] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3418.931255] ? cred_has_capability+0x193/0x320 [ 3418.935858] ? hwsim_exit_net+0xc50/0xc50 [ 3418.940025] hwsim_new_radio_nl+0x5eb/0x893 [ 3418.944354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.949896] ? security_capable+0x92/0xc0 [ 3418.954053] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3418.959259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3418.964800] ? nla_parse+0x1fc/0x2f0 [ 3418.968530] genl_family_rcv_msg+0x6db/0xd30 [ 3418.972953] ? genl_unregister_family+0x790/0x790 [ 3418.977954] ? __local_bh_enable_ip+0x15a/0x270 [ 3418.982723] ? __dev_queue_xmit+0x892/0x2fe0 [ 3418.987157] genl_rcv_msg+0xca/0x170 [ 3418.990883] netlink_rcv_skb+0x17d/0x460 [ 3418.994954] ? genl_family_rcv_msg+0xd30/0xd30 [ 3418.999545] ? netlink_ack+0xb30/0xb30 [ 3419.003457] genl_rcv+0x29/0x40 [ 3419.006744] netlink_unicast+0x53a/0x730 [ 3419.010826] ? netlink_attachskb+0x770/0x770 [ 3419.015249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.020794] netlink_sendmsg+0x8ae/0xd70 [ 3419.024870] ? netlink_unicast+0x730/0x730 [ 3419.029473] ? selinux_socket_sendmsg+0x36/0x40 [ 3419.034145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.039700] ? security_socket_sendmsg+0x8d/0xc0 [ 3419.044464] ? netlink_unicast+0x730/0x730 [ 3419.048707] sock_sendmsg+0xd7/0x130 [ 3419.052433] ___sys_sendmsg+0x803/0x920 [ 3419.056701] ? copy_msghdr_from_user+0x430/0x430 [ 3419.061470] ? lock_downgrade+0x880/0x880 [ 3419.065644] ? kasan_check_read+0x11/0x20 [ 3419.069804] ? __fget+0x367/0x540 [ 3419.073271] ? iterate_fd+0x360/0x360 [ 3419.077084] ? lock_downgrade+0x880/0x880 [ 3419.081242] ? __fget_light+0x1a9/0x230 [ 3419.085224] ? __fdget+0x1b/0x20 [ 3419.088599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3419.094146] __sys_sendmsg+0x105/0x1d0 [ 3419.098135] ? __ia32_sys_shutdown+0x80/0x80 [ 3419.102922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3419.107685] ? do_syscall_64+0x26/0x620 [ 3419.111668] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.117035] ? do_syscall_64+0x26/0x620 [ 3419.121023] __x64_sys_sendmsg+0x78/0xb0 [ 3419.125093] do_syscall_64+0xfd/0x620 [ 3419.128913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.134106] RIP: 0033:0x45a6f9 [ 3419.137307] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3419.156212] RSP: 002b:00007fa089d9ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3419.163927] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3419.171199] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3419.178556] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:26:45 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) r3 = dup2(r1, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000011c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r7 = dup2(r5, r6) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1, 0x0) getsockname$packet(r8, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000012c0)=0x14) ioctl$RTC_UIE_ON(r7, 0x7003) mq_notify(r7, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r4, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r9 = semget$private(0x0, 0x4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001400)=0xe8) r11 = socket(0xa, 0x1, 0x0) fstat(r11, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) getgroups(0x2, &(0x7f0000001440)=[0xee01, r12]) r14 = socket(0xa, 0x1, 0x0) fstat(r14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r15, 0x0) r16 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r17 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r18 = dup2(r16, r17) ioctl$RTC_UIE_ON(r18, 0x7003) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000001480)={0x0, 0x0}, &(0x7f00000014c0)=0xc) r20 = socket(0xa, 0x1, 0x0) fstat(r20, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r21, 0x0) getresgid(&(0x7f0000001500)=0x0, &(0x7f0000001540), &(0x7f0000001580)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r24, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000015c0)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000016c0)=0xe8) r26 = socket(0xa, 0x1, 0x0) fstat(r26, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r27, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001700)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001800)=0xe8) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000001900)=0x0, &(0x7f0000001940), &(0x7f0000001980)) r31 = getgid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r33, 0x0) r34 = socket(0xa, 0x1, 0x0) fstat(r34, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r35, 0x0) write$FUSE_DIRENTPLUS(r8, &(0x7f00000019c0)=ANY=[@ANYBLOB="d80500000000000003000000000000000300000000000000000000000000000000020000000000000104000000000000000000009200cb0b0300000000000000fdffffffffffffff992a000000000000000000000000000002000000000000008600000000000000af26c154f80000000200000091000000ffffffff", @ANYRES32=r10, @ANYRES32=r13, @ANYBLOB="070000000180000000000000040000000000000000000000000000000c000000000000002f6465762f766964656f230000000000020000000000000000000000000000000800000000000000030000000000000001800000dd0000000300000000000000000800000000000073e84661000000000000000000004f046e0c000000000000020000000000000000000000ac0000008fa40000ff01000002f10000", @ANYRES32=0xee01, @ANYRES32=r15, @ANYBLOB="fdffffffc200000000000000050000000000000034c100000000000008000000030000007365637572697479050000000000000002000000000000000600000000000000c1ffffffffffffff00100000ffff000006000000000000000300000000000000e84f0000000000000400000000000000ff7f00000000000004000000000000000600000004000000080000000000008009000000", @ANYRES32=r19, @ANYRES32=r21, @ANYBLOB="05000000fe0a000000000000020000000000000001000000000000000a000000040000002a6d643573756d656d31000000000000050000000000000003000000000000000000000000000000060000000000000007000000050000000600000000000000950000000000000007000000000000000000008000000000a9000000000000000400000000000000ffff0000040000003f000000030000001d000000", @ANYRES32=0xee01, @ANYRES32=r22, @ANYBLOB="06000000ffff00000000000006000000000000000000e0ffffff1f000100000040000000210000000000000005000000000000000200000000000000ff000000000000002000000000000000000000002757a74e040000000000000001000000000000000400000000000000018000000000000002000000000000000900000000000000ffff000007000000020000000300000005000000", @ANYRES32=r24, @ANYRES32=0xee01, @ANYBLOB="06000000ff07000000000000040000000000000001040000000000000a000000050000002f6465762f7274633000000000000000000000000000000000000000000000001f00000000000000f7ffffffffffffff04000000ff03000000000000000000000000000000000000ffff0000000000000500000000000000060000000000000007000000000000000180000080000000050000000700000005000000", @ANYRES32=r25, @ANYRES32=r27, @ANYBLOB="02000000ca3c3004000000000400000000000000f8ffffffffffffff0d0000000000000073656c696e7578707070302e7b00000002000000000000000300000000000000400b0000000000000300000000000000040000000300000006000000000000009808000000000000020000000000000002000000000000006b0000000000000005000000000000000100000001040000b20800000300000009000000", @ANYRES32=r28, @ANYRES32=r29, @ANYBLOB="2000000043000000000000000000000000000000feffffffffffffff07000000018000006d616e676c65000000000000000000000300000000000000040000000000000005000000000000000400000002000000040000effffffffffeffff7f0000000000088c4a0000000009000000000000000800000000000000070000000000000007000000150e0000130000000000080000000000", @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB="00000000e5000000000000000200000000000000070000000000000007000000000000806d616e676c650000060000000000000002000000000000008ab80000000000000400000000000000280000000800000002000000000000000010000000000000020000000000000002000000000000000300000000000000000000c9283fec225db469126a0e94edbb7852000000000005000000", @ANYRES32=r33, @ANYRES32=r35, @ANYBLOB="00010000ff00000000000000040000000000000007000000000000000a000000340e00002f6465762f7274633000000000000000"], 0x5d8) semop(r9, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 15:26:45 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000000200"/72], 0x48) getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$RTC_UIE_ON(r6, 0x7003) mq_notify(r6, &(0x7f0000000140)={0x0, 0x3f, 0x4, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f90cc6", &(0x7f0000001300)="1ef8a143f9b47ca867bd08160dda7af99e310ac715639a43ce4dde283a17b55e2aabf3c80a53e849c6d47354b28b138d7af97264223a8c24ff9bf336ee11e4c1de76d5c24fa34a9ff70ec5c37880c9b4cf10a241b2fb9a025cb75314d32c94b7eb903482d9ba0e84"}}) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r7, 0x4008af14, &(0x7f0000001380)={0x674fbd436edb6d35, 0x8001}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040), &(0x7f00000001c0)=""/4096}, 0x18) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x0, 0x0, 0x7, 0x5}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0x10, 0x0) r8 = semget$private(0x0, 0x4, 0x0) semop(r8, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r9 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r9, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r9, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 15:26:45 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xa9f00, 0x0) r0 = syz_open_dev$video(0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) dup2(r3, r4) r5 = dup2(r4, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d7236616edb676c65fffc000000000000deffffff469b6c8df7f85f0000000006000000000000000000020000000000000000000000000000000000000000000000000000000000000000d1bf941bcac60de0a2d27040b3bc4a9919074a4d79fc53927766cc8990ee63dcf79547949cf3fb489f6f131a6acc99f56daec4bb041f593b438d8f47066842929b74eda98082f409028e1726b66a2d880bb99f0f65dfc42301770e523a5875ddcfe3df1e4e56ab83ae2d69407e4874058dc450652e39a6f1237c8f7c9c63b749b38eab113f3b916aa7927f00"/227], 0x48) getpid() r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xd, 0x4000000000000800, 0x100, 0x0, 0xffffffffffffffff, 0x7}, 0x3c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$RTC_UIE_ON(r9, 0x7003) mq_notify(r9, &(0x7f0000000080)={0x0, 0x42, 0x5, @thr={&(0x7f0000001280)="329785163e88f8b306a587150c10913aa0bc42175b75128aebb686c9d4bac8d10f7ea2f4a445ebae6c886f8fdc6f5b7ae029352ba4cc381017999797321693f9", &(0x7f0000001300)}}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) r11 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r12 = dup2(r10, r11) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$SOUND_OLD_MIXER_INFO(r12, 0x80304d65, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r6, &(0x7f0000000040), &(0x7f0000002300)=""/4110}, 0x20) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x100000001, 0x0, 0x3, 0x8001, 0x7, 0xffb, 0xfffffffffffffffe, 0x0, 0x80000001, 0xa3f5, 0x8, 0x0, 0x7, 0x5, 0x4, 0x1}) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) [ 3419.185847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa089d9b6d4 [ 3419.193124] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff [ 3419.213092] sysfs: cannot create duplicate filename '/class/ieee80211/þ€!' [ 3419.241731] CPU: 0 PID: 6643 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 3419.249514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3419.259145] Call Trace: [ 3419.261750] dump_stack+0x197/0x210 [ 3419.265404] sysfs_warn_dup.cold+0x1c/0x31 [ 3419.270663] sysfs_do_create_link_sd.isra.0+0x118/0x130 [ 3419.276134] sysfs_create_link+0x65/0xc0 [ 3419.280195] device_add+0x7ce/0x1760 [ 3419.283931] ? get_device_parent.isra.0+0x570/0x570 [ 3419.288946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.294479] wiphy_register+0x16fa/0x21d0 [ 3419.298622] ? show_schedstat+0x832/0xbb0 [ 3419.302772] ? wiphy_unregister+0xfd0/0xfd0 [ 3419.307085] ? rcu_read_lock_sched_held+0x110/0x130 [ 3419.312101] ? __kmalloc+0x5e1/0x750 [ 3419.315803] ? trace_hardirqs_on+0x67/0x220 [ 3419.320152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.325712] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 3419.330835] ieee80211_register_hw+0x156e/0x3800 [ 3419.335595] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 3419.340457] ? hrtimer_init+0x8b/0x300 [ 3419.344343] ? mac80211_hwsim_addr_match+0x200/0x200 [ 3419.349448] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 3419.354461] ? cred_has_capability+0x193/0x320 [ 3419.359042] ? hwsim_exit_net+0xc50/0xc50 [ 3419.363181] ? __mutex_lock+0xa67/0x1300 [ 3419.367237] hwsim_new_radio_nl+0x5eb/0x893 [ 3419.371551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.377094] ? security_capable+0x92/0xc0 [ 3419.381238] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 3419.386434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.391974] ? nla_parse+0x1fc/0x2f0 [ 3419.395683] genl_family_rcv_msg+0x6db/0xd30 [ 3419.400087] ? genl_unregister_family+0x790/0x790 [ 3419.405207] ? __local_bh_enable_ip+0x15a/0x270 [ 3419.409881] ? __dev_queue_xmit+0x892/0x2fe0 [ 3419.414291] genl_rcv_msg+0xca/0x170 [ 3419.417995] netlink_rcv_skb+0x17d/0x460 [ 3419.422844] ? genl_family_rcv_msg+0xd30/0xd30 [ 3419.427506] ? netlink_ack+0xb30/0xb30 [ 3419.431404] genl_rcv+0x29/0x40 [ 3419.434859] netlink_unicast+0x53a/0x730 [ 3419.438914] ? netlink_attachskb+0x770/0x770 [ 3419.443325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.448857] netlink_sendmsg+0x8ae/0xd70 [ 3419.452946] ? netlink_unicast+0x730/0x730 [ 3419.457178] ? selinux_socket_sendmsg+0x36/0x40 [ 3419.461836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.467394] ? security_socket_sendmsg+0x8d/0xc0 [ 3419.472142] ? netlink_unicast+0x730/0x730 [ 3419.476376] sock_sendmsg+0xd7/0x130 [ 3419.480092] ___sys_sendmsg+0x803/0x920 [ 3419.484159] ? copy_msghdr_from_user+0x430/0x430 [ 3419.488908] ? lock_downgrade+0x880/0x880 [ 3419.493049] ? kasan_check_read+0x11/0x20 [ 3419.497448] ? __fget+0x367/0x540 [ 3419.500912] ? iterate_fd+0x360/0x360 [ 3419.504977] ? lock_downgrade+0x880/0x880 [ 3419.509117] ? __fget_light+0x1a9/0x230 [ 3419.513082] ? __fdget+0x1b/0x20 [ 3419.516459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3419.521999] __sys_sendmsg+0x105/0x1d0 [ 3419.525877] ? __ia32_sys_shutdown+0x80/0x80 [ 3419.530293] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3419.535048] ? do_syscall_64+0x26/0x620 [ 3419.539013] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.544366] ? do_syscall_64+0x26/0x620 [ 3419.548334] __x64_sys_sendmsg+0x78/0xb0 [ 3419.553365] do_syscall_64+0xfd/0x620 [ 3419.557158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.562422] RIP: 0033:0x45a6f9 [ 3419.565609] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3419.584848] RSP: 002b:00007ff11fa30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3419.592547] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3419.599807] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 3419.607162] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3419.615202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11fa316d4 [ 3419.622578] R13: 00000000004c975c R14: 00000000004e14b0 R15: 00000000ffffffff 15:26:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local={0xfe, 0x80, [0x2f, 0x2]}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 3419.869310] ================================================================== [ 3419.869468] BUG: KASAN: slab-out-of-bounds in vcs_scr_readw+0xc2/0xd0 [ 3419.869483] Read of size 2 at addr ffff888057f64ba0 by task syz-executor.5/6646 [ 3419.869487] [ 3419.869502] CPU: 1 PID: 6646 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 3419.869511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3419.869516] Call Trace: [ 3419.869535] dump_stack+0x197/0x210 [ 3419.869554] ? vcs_scr_readw+0xc2/0xd0 [ 3419.869574] print_address_description.cold+0x7c/0x20d [ 3419.869591] ? vcs_scr_readw+0xc2/0xd0 [ 3419.869607] kasan_report.cold+0x8c/0x2ba [ 3419.869628] __asan_report_load2_noabort+0x14/0x20 [ 3419.869640] vcs_scr_readw+0xc2/0xd0 [ 3419.869656] vcs_write+0x646/0xcf0 [ 3419.869686] ? vcs_size+0x240/0x240 [ 3419.869715] __vfs_write+0x114/0x810 [ 3419.869730] ? vcs_size+0x240/0x240 [ 3419.869744] ? kernel_read+0x120/0x120 [ 3419.869759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3419.869773] ? __inode_security_revalidate+0xda/0x120 [ 3419.869789] ? avc_policy_seqno+0xd/0x70 [ 3419.869801] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3419.869815] ? selinux_file_permission+0x92/0x550 [ 3419.869833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.869846] ? security_file_permission+0x89/0x230 [ 3419.869863] ? rw_verify_area+0x118/0x360 [ 3419.869881] vfs_write+0x20c/0x560 [ 3419.869901] ksys_write+0x14f/0x2d0 [ 3419.869926] ? __ia32_sys_read+0xb0/0xb0 [ 3419.869946] ? do_syscall_64+0x26/0x620 [ 3419.869965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.869980] ? do_syscall_64+0x26/0x620 [ 3419.870001] __x64_sys_write+0x73/0xb0 [ 3419.870019] do_syscall_64+0xfd/0x620 [ 3419.870037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.870049] RIP: 0033:0x45a6f9 [ 3419.870064] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3419.870074] RSP: 002b:00007fd216b9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3419.870088] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3419.870097] RDX: 00000000000005d8 RSI: 00000000200019c0 RDI: 0000000000000007 [ 3419.870106] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3419.870116] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd216b9d6d4 [ 3419.870125] R13: 00000000004cb3f6 R14: 00000000004e4cc0 R15: 00000000ffffffff [ 3419.870148] [ 3419.870156] Allocated by task 4314: [ 3419.870173] save_stack+0x45/0xd0 [ 3419.870187] kasan_kmalloc+0xce/0xf0 [ 3419.870200] __kmalloc+0x15d/0x750 [ 3419.870213] vc_do_resize+0x262/0x14a0 [ 3419.870224] vc_resize+0x4d/0x60 [ 3419.870273] fbcon_do_set_font+0x4c1/0xa40 [ 3419.870286] fbcon_set_font+0x72e/0x860 [ 3419.870299] con_font_op+0xe18/0x1250 [ 3419.870312] vt_ioctl+0x35a/0x2530 [ 3419.870373] tty_ioctl+0x7f3/0x1510 [ 3419.870388] do_vfs_ioctl+0xd5f/0x1380 [ 3419.870408] ksys_ioctl+0xab/0xd0 [ 3419.870422] __x64_sys_ioctl+0x73/0xb0 [ 3419.870437] do_syscall_64+0xfd/0x620 [ 3419.870456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.870459] [ 3419.870466] Freed by task 3668: [ 3419.870478] save_stack+0x45/0xd0 [ 3419.870491] __kasan_slab_free+0x102/0x150 [ 3419.870504] kasan_slab_free+0xe/0x10 [ 3419.870520] kfree+0xcf/0x220 [ 3419.870537] kobject_uevent_env+0xfbe/0x101f [ 3419.870557] kobject_synth_uevent.cold+0xa0/0xfe [ 3419.870570] uevent_store+0x26/0x80 [ 3419.870582] dev_attr_store+0x59/0x80 [ 3419.870600] sysfs_kf_write+0x116/0x170 [ 3419.870612] kernfs_fop_write+0x2b8/0x480 [ 3419.870624] __vfs_write+0x114/0x810 [ 3419.870635] vfs_write+0x20c/0x560 [ 3419.870647] ksys_write+0x14f/0x2d0 [ 3419.870658] __x64_sys_write+0x73/0xb0 [ 3419.870672] do_syscall_64+0xfd/0x620 [ 3419.870690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.870694] [ 3419.870705] The buggy address belongs to the object at ffff888057f64240 [ 3419.870705] which belongs to the cache kmalloc-4096 of size 4096 [ 3419.870719] The buggy address is located 2400 bytes inside of [ 3419.870719] 4096-byte region [ffff888057f64240, ffff888057f65240) [ 3419.870724] The buggy address belongs to the page: [ 3419.870736] page:ffffea00015fd900 count:1 mapcount:0 mapping:ffff88812c31cdc0 index:0x0 compound_mapcount: 0 [ 3419.870751] flags: 0xfffe0000008100(slab|head) [ 3419.870769] raw: 00fffe0000008100 ffffea00022c3608 ffffea0002071a08 ffff88812c31cdc0 [ 3419.870786] raw: 0000000000000000 ffff888057f64240 0000000100000001 0000000000000000 [ 3419.870792] page dumped because: kasan: bad access detected [ 3419.870796] [ 3419.870800] Memory state around the buggy address: [ 3419.870812] ffff888057f64a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3419.870822] ffff888057f64b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3419.870833] >ffff888057f64b80: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc [ 3419.870839] ^ [ 3419.870850] ffff888057f64c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3419.870860] ffff888057f64c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3419.870865] ================================================================== [ 3419.870870] Disabling lock debugging due to kernel taint [ 3419.880155] Kernel panic - not syncing: panic_on_warn set ... [ 3419.880155] [ 3419.880176] CPU: 1 PID: 6646 Comm: syz-executor.5 Tainted: G B 4.19.88-syzkaller #0 [ 3419.880184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3419.880188] Call Trace: [ 3419.880209] dump_stack+0x197/0x210 [ 3419.880229] ? vcs_scr_readw+0xc2/0xd0 [ 3419.880243] panic+0x26a/0x50e [ 3419.880256] ? __warn_printk+0xf3/0xf3 [ 3419.880272] ? vcs_scr_readw+0xc2/0xd0 [ 3419.880289] ? preempt_schedule+0x4b/0x60 [ 3419.880303] ? ___preempt_schedule+0x16/0x18 [ 3419.880334] ? trace_hardirqs_on+0x5e/0x220 [ 3419.880352] ? vcs_scr_readw+0xc2/0xd0 [ 3419.880369] kasan_end_report+0x47/0x4f [ 3419.880384] kasan_report.cold+0xa9/0x2ba [ 3419.880406] __asan_report_load2_noabort+0x14/0x20 [ 3419.880420] vcs_scr_readw+0xc2/0xd0 [ 3419.880436] vcs_write+0x646/0xcf0 [ 3419.880460] ? vcs_size+0x240/0x240 [ 3419.880484] __vfs_write+0x114/0x810 [ 3419.880499] ? vcs_size+0x240/0x240 [ 3419.880514] ? kernel_read+0x120/0x120 [ 3419.880529] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3419.880544] ? __inode_security_revalidate+0xda/0x120 [ 3419.880559] ? avc_policy_seqno+0xd/0x70 [ 3419.880576] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3419.880590] ? selinux_file_permission+0x92/0x550 [ 3419.880605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3419.880617] ? security_file_permission+0x89/0x230 [ 3419.880632] ? rw_verify_area+0x118/0x360 [ 3419.880653] vfs_write+0x20c/0x560 [ 3419.880671] ksys_write+0x14f/0x2d0 [ 3419.880686] ? __ia32_sys_read+0xb0/0xb0 [ 3419.880702] ? do_syscall_64+0x26/0x620 [ 3419.880717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.880732] ? do_syscall_64+0x26/0x620 [ 3419.880750] __x64_sys_write+0x73/0xb0 [ 3419.880767] do_syscall_64+0xfd/0x620 [ 3419.880783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3419.880794] RIP: 0033:0x45a6f9 [ 3419.880808] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3419.880816] RSP: 002b:00007fd216b9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3419.880829] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 3419.880837] RDX: 00000000000005d8 RSI: 00000000200019c0 RDI: 0000000000000007 [ 3419.880845] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3419.880854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd216b9d6d4 [ 3419.880862] R13: 00000000004cb3f6 R14: 00000000004e4cc0 R15: 00000000ffffffff [ 3419.882293] Kernel Offset: disabled [ 3420.621562] Rebooting in 86400 seconds..