0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3982.581890][ T30] audit: type=1804 audit(3982.542:1122): pid=22504 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1012/file0" dev="vda" ino=703 res=1 errno=0 01:06:22 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3983.050220][ T30] audit: type=1804 audit(3983.002:1123): pid=22507 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1013/file0" dev="vda" ino=703 res=1 errno=0 01:06:23 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3983.723319][ T30] audit: type=1804 audit(3983.682:1124): pid=22510 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1014/file0" dev="vda" ino=703 res=1 errno=0 01:06:23 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:24 executing program 1: r0 = socket(0x15, 0x5, 0x0) recvfrom$inet_nvme(r0, 0x0, 0x0, 0x2101, &(0x7f0000000100)=@sco={0x1f, @none}, 0x80) [ 3984.506068][ T30] audit: type=1804 audit(3984.462:1125): pid=22512 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1015/file0" dev="vda" ino=703 res=1 errno=0 01:06:24 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3985.024840][ T30] audit: type=1804 audit(3984.982:1126): pid=22514 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1016/file0" dev="vda" ino=703 res=1 errno=0 01:06:25 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x1a, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000bfaffffff00000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000240)='syzkaller\x00'}, 0x90) [ 3985.898282][ T30] audit: type=1804 audit(3985.852:1127): pid=22519 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1017/file0" dev="vda" ino=703 res=1 errno=0 01:06:26 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3986.604161][ T30] audit: type=1804 audit(3986.562:1128): pid=22521 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1018/file0" dev="vda" ino=703 res=1 errno=0 01:06:26 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0xb, 0xf, &(0x7f0000000180)=@ringbuf, &(0x7f0000000000)='syzkaller\x00'}, 0x90) [ 3987.122516][ T30] audit: type=1804 audit(3987.082:1129): pid=22524 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1019/file0" dev="vda" ino=700 res=1 errno=0 01:06:27 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3987.581116][ T30] audit: type=1804 audit(3987.532:1130): pid=22527 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1020/file0" dev="vda" ino=700 res=1 errno=0 01:06:27 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:28 executing program 1: bpf$PROG_LOAD_XDP(0x4, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0}, 0x90) [ 3988.546456][ T30] audit: type=1804 audit(3988.502:1131): pid=22530 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1021/file0" dev="vda" ino=715 res=1 errno=0 01:06:28 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3989.102525][ T30] audit: type=1804 audit(3989.062:1132): pid=22533 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1022/file0" dev="vda" ino=715 res=1 errno=0 01:06:29 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:29 executing program 1: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) [ 3990.110129][ T30] audit: type=1804 audit(3990.052:1133): pid=22536 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1023/file0" dev="vda" ino=703 res=1 errno=0 01:06:30 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bc", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3991.061339][ T30] audit: type=1804 audit(3991.002:1134): pid=22539 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1024/file0" dev="vda" ino=703 res=1 errno=0 01:06:31 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bc", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3991.846241][ T30] audit: type=1804 audit(3991.802:1135): pid=22542 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1025/file0" dev="vda" ino=703 res=1 errno=0 01:06:31 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bc", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3992.406124][ T30] audit: type=1804 audit(3992.362:1136): pid=22544 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1026/file0" dev="vda" ino=703 res=1 errno=0 01:06:32 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b6", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3993.240505][ T30] audit: type=1804 audit(3993.192:1137): pid=22546 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1027/file0" dev="vda" ino=703 res=1 errno=0 01:06:33 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b6", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:33 executing program 1: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) [ 3994.443000][ T30] audit: type=1804 audit(3994.402:1138): pid=22548 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1028/file0" dev="vda" ino=703 res=1 errno=0 01:06:34 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b6", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3995.367190][ T30] audit: type=1804 audit(3995.322:1139): pid=22552 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1029/file0" dev="vda" ino=703 res=1 errno=0 01:06:35 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b992", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3995.976496][ T30] audit: type=1804 audit(3995.932:1140): pid=22554 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1030/file0" dev="vda" ino=703 res=1 errno=0 01:06:36 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b992", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3996.597211][ T30] audit: type=1804 audit(3996.552:1141): pid=22556 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1031/file0" dev="vda" ino=703 res=1 errno=0 01:06:36 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b992", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3997.334923][ T30] audit: type=1804 audit(3997.292:1142): pid=22558 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1032/file0" dev="vda" ino=703 res=1 errno=0 01:06:37 executing program 1: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) 01:06:37 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b99204", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3997.902637][ T30] audit: type=1804 audit(3997.862:1143): pid=22560 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1033/file0" dev="vda" ino=703 res=1 errno=0 01:06:38 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b99204", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3998.482977][ T30] audit: type=1804 audit(3998.442:1144): pid=22564 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1034/file0" dev="vda" ino=703 res=1 errno=0 01:06:38 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b99204", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3998.881572][ T30] audit: type=1804 audit(3998.842:1145): pid=22566 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1035/file0" dev="vda" ino=703 res=1 errno=0 01:06:39 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3999.384098][ T30] audit: type=1804 audit(3999.342:1146): pid=22568 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1036/file0" dev="vda" ino=703 res=1 errno=0 01:06:39 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 3999.870197][ T30] audit: type=1804 audit(3999.822:1147): pid=22570 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1037/file0" dev="vda" ino=703 res=1 errno=0 01:06:39 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4000.520407][ T30] audit: type=1804 audit(4000.482:1148): pid=22572 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1038/file0" dev="vda" ino=703 res=1 errno=0 01:06:40 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [r2, r7]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:40 executing program 1: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) [ 4001.041084][ T30] audit: type=1804 audit(4001.002:1149): pid=22574 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1039/file0" dev="vda" ino=703 res=1 errno=0 01:06:41 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [r2, r7]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4001.651466][ T30] audit: type=1804 audit(4001.612:1150): pid=22577 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1040/file0" dev="vda" ino=715 res=1 errno=0 01:06:41 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [r2, r7]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4002.103512][ T30] audit: type=1804 audit(4002.062:1151): pid=22580 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1041/file0" dev="vda" ino=715 res=1 errno=0 01:06:42 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4002.575396][ T30] audit: type=1804 audit(4002.532:1152): pid=22582 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1042/file0" dev="vda" ino=715 res=1 errno=0 01:06:42 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4003.093689][ T30] audit: type=1804 audit(4003.052:1153): pid=22584 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1043/file0" dev="vda" ino=715 res=1 errno=0 01:06:43 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4003.945983][ T30] audit: type=1804 audit(4003.902:1154): pid=22586 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1044/file0" dev="vda" ino=715 res=1 errno=0 01:06:44 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:44 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000180), 0xffffffffffffffff) [ 4004.334332][ T30] audit: type=1804 audit(4004.292:1155): pid=22588 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1045/file0" dev="vda" ino=700 res=1 errno=0 01:06:44 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4004.896726][ T30] audit: type=1804 audit(4004.852:1156): pid=22591 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1046/file0" dev="vda" ino=700 res=1 errno=0 01:06:45 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4005.294949][ T30] audit: type=1804 audit(4005.252:1157): pid=22593 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1047/file0" dev="vda" ino=700 res=1 errno=0 01:06:45 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b9", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4005.790225][ T30] audit: type=1804 audit(4005.732:1158): pid=22595 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1048/file0" dev="vda" ino=700 res=1 errno=0 01:06:45 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b9", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:45 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000180), 0xffffffffffffffff) [ 4006.250219][ T30] audit: type=1804 audit(4006.202:1159): pid=22598 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1049/file0" dev="vda" ino=700 res=1 errno=0 01:06:46 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b9", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4006.717189][ T30] audit: type=1804 audit(4006.672:1160): pid=22601 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1050/file0" dev="vda" ino=700 res=1 errno=0 01:06:46 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4007.182755][ T30] audit: type=1804 audit(4007.142:1161): pid=22604 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1051/file0" dev="vda" ino=700 res=1 errno=0 01:06:47 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:47 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000180), 0xffffffffffffffff) [ 4007.725923][ T30] audit: type=1804 audit(4007.682:1162): pid=22606 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1052/file0" dev="vda" ino=700 res=1 errno=0 01:06:47 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4008.426507][ T30] audit: type=1804 audit(4008.382:1163): pid=22609 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1053/file0" dev="vda" ino=700 res=1 errno=0 01:06:48 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfc", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4009.119920][ T30] audit: type=1804 audit(4009.072:1164): pid=22611 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1054/file0" dev="vda" ino=700 res=1 errno=0 01:06:49 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfc", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4009.736189][ T30] audit: type=1804 audit(4009.692:1165): pid=22614 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1055/file0" dev="vda" ino=700 res=1 errno=0 01:06:49 executing program 1: r0 = socket(0x0, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) 01:06:49 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfc", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4010.440310][ T30] audit: type=1804 audit(4010.392:1166): pid=22616 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1056/file0" dev="vda" ino=703 res=1 errno=0 01:06:50 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc3", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4011.029828][ T30] audit: type=1804 audit(4010.972:1167): pid=22618 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1057/file0" dev="vda" ino=703 res=1 errno=0 01:06:51 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc3", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4011.792580][ T30] audit: type=1804 audit(4011.722:1168): pid=22621 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1058/file0" dev="vda" ino=715 res=1 errno=0 01:06:51 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc3", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4012.538296][ T30] audit: type=1804 audit(4012.492:1169): pid=22624 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1059/file0" dev="vda" ino=715 res=1 errno=0 01:06:52 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4013.045357][ T30] audit: type=1804 audit(4013.002:1170): pid=22627 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1060/file0" dev="vda" ino=715 res=1 errno=0 01:06:53 executing program 1: r0 = socket(0x0, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) 01:06:53 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4013.463700][ T30] audit: type=1804 audit(4013.422:1171): pid=22629 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1061/file0" dev="vda" ino=699 res=1 errno=0 01:06:53 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4013.954868][ T30] audit: type=1804 audit(4013.912:1172): pid=22632 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1062/file0" dev="vda" ino=703 res=1 errno=0 01:06:54 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4014.601127][ T30] audit: type=1804 audit(4014.552:1173): pid=22635 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1063/file0" dev="vda" ino=715 res=1 errno=0 01:06:54 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4015.114400][ T30] audit: type=1804 audit(4015.072:1174): pid=22638 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1064/file0" dev="vda" ino=715 res=1 errno=0 01:06:55 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:55 executing program 1: r0 = socket(0x0, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) [ 4015.754756][ T30] audit: type=1804 audit(4015.712:1175): pid=22640 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1065/file0" dev="vda" ino=715 res=1 errno=0 01:06:55 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4016.306490][ T30] audit: type=1804 audit(4016.262:1176): pid=22642 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1066/file0" dev="vda" ino=703 res=1 errno=0 01:06:56 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4016.996651][ T30] audit: type=1804 audit(4016.952:1177): pid=22645 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1067/file0" dev="vda" ino=711 res=1 errno=0 01:06:57 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4017.626978][ T30] audit: type=1804 audit(4017.582:1178): pid=22648 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1068/file0" dev="vda" ino=711 res=1 errno=0 01:06:57 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4018.314251][ T30] audit: type=1804 audit(4018.272:1179): pid=22651 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1069/file0" dev="vda" ino=711 res=1 errno=0 01:06:58 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:06:58 executing program 1: r0 = socket(0x29, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) [ 4018.934877][ T30] audit: type=1804 audit(4018.892:1180): pid=22653 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1070/file0" dev="vda" ino=695 res=1 errno=0 01:06:59 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4019.402802][ T30] audit: type=1804 audit(4019.362:1181): pid=22656 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1071/file0" dev="vda" ino=703 res=1 errno=0 01:06:59 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4020.243722][ T30] audit: type=1804 audit(4020.202:1182): pid=22658 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1072/file0" dev="vda" ino=703 res=1 errno=0 01:07:00 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4020.884816][ T30] audit: type=1804 audit(4020.842:1183): pid=22661 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1073/file0" dev="vda" ino=703 res=1 errno=0 01:07:01 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:01 executing program 1: r0 = socket(0x29, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) [ 4022.174252][ T30] audit: type=1804 audit(4022.132:1184): pid=22663 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1074/file0" dev="vda" ino=703 res=1 errno=0 01:07:02 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4022.960353][ T30] audit: type=1804 audit(4022.912:1185): pid=22666 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1075/file0" dev="vda" ino=711 res=1 errno=0 01:07:03 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4023.801911][ T30] audit: type=1804 audit(4023.762:1186): pid=22669 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1076/file0" dev="vda" ino=711 res=1 errno=0 01:07:03 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:03 executing program 1: r0 = socket(0x29, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), r0) [ 4024.330096][ T30] audit: type=1804 audit(4024.282:1187): pid=22671 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1077/file0" dev="vda" ino=694 res=1 errno=0 01:07:04 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4024.933637][ T30] audit: type=1804 audit(4024.892:1188): pid=22674 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1078/file0" dev="vda" ino=700 res=1 errno=0 01:07:05 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4025.472904][ T30] audit: type=1804 audit(4025.432:1189): pid=22677 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1079/file0" dev="vda" ino=700 res=1 errno=0 01:07:05 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:05 executing program 1: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(0x0, r0) [ 4025.693228][ T30] audit: type=1804 audit(4025.652:1190): pid=22679 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1080/file0" dev="vda" ino=703 res=1 errno=0 01:07:05 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000010000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4026.124687][ T30] audit: type=1804 audit(4026.082:1191): pid=22681 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1081/file0" dev="vda" ino=703 res=1 errno=0 01:07:06 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000010000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4026.680825][ T30] audit: type=1804 audit(4026.642:1192): pid=22684 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1082/file0" dev="vda" ino=703 res=1 errno=0 01:07:06 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000010000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4027.440527][ T30] audit: type=1804 audit(4027.392:1193): pid=22687 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1083/file0" dev="vda" ino=703 res=1 errno=0 01:07:07 executing program 1: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(0x0, r0) 01:07:07 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4027.992732][ T30] audit: type=1804 audit(4027.952:1194): pid=22689 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1084/file0" dev="vda" ino=703 res=1 errno=0 01:07:08 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4028.515827][ T30] audit: type=1804 audit(4028.472:1195): pid=22693 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1085/file0" dev="vda" ino=715 res=1 errno=0 01:07:08 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:08 executing program 1: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(0x0, r0) [ 4029.283143][ T30] audit: type=1804 audit(4029.242:1196): pid=22695 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1086/file0" dev="vda" ino=715 res=1 errno=0 01:07:09 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4029.825101][ T30] audit: type=1804 audit(4029.782:1197): pid=22697 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1087/file0" dev="vda" ino=703 res=1 errno=0 01:07:09 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4030.501398][ T30] audit: type=1804 audit(4030.432:1198): pid=22700 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1088/file0" dev="vda" ino=715 res=1 errno=0 01:07:10 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:10 executing program 1: socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), 0xffffffffffffffff) [ 4031.055614][ T30] audit: type=1804 audit(4031.012:1199): pid=22703 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1089/file0" dev="vda" ino=715 res=1 errno=0 01:07:11 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4031.603752][ T30] audit: type=1804 audit(4031.562:1200): pid=22705 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1090/file0" dev="vda" ino=703 res=1 errno=0 01:07:11 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4032.101968][ T30] audit: type=1804 audit(4032.062:1201): pid=22708 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1091/file0" dev="vda" ino=703 res=1 errno=0 01:07:12 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4032.350047][ T30] audit: type=1804 audit(4032.302:1202): pid=22711 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1092/file0" dev="vda" ino=703 res=1 errno=0 01:07:12 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4032.863139][ T30] audit: type=1804 audit(4032.822:1203): pid=22713 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1093/file0" dev="vda" ino=703 res=1 errno=0 01:07:12 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:13 executing program 1: socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), 0xffffffffffffffff) [ 4033.352063][ T30] audit: type=1804 audit(4033.312:1204): pid=22715 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1094/file0" dev="vda" ino=703 res=1 errno=0 01:07:13 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4033.840565][ T30] audit: type=1804 audit(4033.802:1205): pid=22717 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1095/file0" dev="vda" ino=703 res=1 errno=0 01:07:13 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4034.392529][ T30] audit: type=1804 audit(4034.352:1206): pid=22720 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1096/file0" dev="vda" ino=703 res=1 errno=0 01:07:14 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4034.968750][ T30] audit: type=1804 audit(4034.922:1207): pid=22722 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1097/file0" dev="vda" ino=715 res=1 errno=0 01:07:15 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:15 executing program 1: socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180), 0xffffffffffffffff) [ 4035.656755][ T30] audit: type=1804 audit(4035.612:1208): pid=22725 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1098/file0" dev="vda" ino=715 res=1 errno=0 01:07:15 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4036.162281][ T30] audit: type=1804 audit(4036.122:1209): pid=22727 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1099/file0" dev="vda" ino=703 res=1 errno=0 01:07:16 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4036.673738][ T30] audit: type=1804 audit(4036.632:1210): pid=22730 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1100/file0" dev="vda" ino=703 res=1 errno=0 01:07:16 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4037.483410][ T30] audit: type=1804 audit(4037.442:1211): pid=22732 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1101/file0" dev="vda" ino=715 res=1 errno=0 01:07:17 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:17 executing program 1: r0 = socket(0x29, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) [ 4038.422539][ T30] audit: type=1804 audit(4038.382:1212): pid=22735 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1102/file0" dev="vda" ino=715 res=1 errno=0 01:07:18 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4038.981695][ T30] audit: type=1804 audit(4038.942:1213): pid=22737 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1103/file0" dev="vda" ino=703 res=1 errno=0 01:07:19 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4039.785944][ T30] audit: type=1804 audit(4039.742:1214): pid=22740 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1104/file0" dev="vda" ino=715 res=1 errno=0 01:07:19 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r0) 01:07:19 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4040.520209][ T30] audit: type=1804 audit(4040.472:1215): pid=22743 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1105/file0" dev="vda" ino=715 res=1 errno=0 01:07:20 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4041.112204][ T30] audit: type=1804 audit(4041.072:1216): pid=22746 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1106/file0" dev="vda" ino=703 res=1 errno=0 01:07:21 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4041.681398][ T30] audit: type=1804 audit(4041.642:1217): pid=22748 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1107/file0" dev="vda" ino=715 res=1 errno=0 01:07:21 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4042.090948][ T30] audit: type=1804 audit(4042.052:1218): pid=22751 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1108/file0" dev="vda" ino=715 res=1 errno=0 01:07:22 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4042.707345][ T30] audit: type=1804 audit(4042.662:1219): pid=22753 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1109/file0" dev="vda" ino=715 res=1 errno=0 01:07:22 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4043.441680][ T30] audit: type=1804 audit(4043.382:1220): pid=22755 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1110/file0" dev="vda" ino=715 res=1 errno=0 01:07:23 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4043.882562][ T30] audit: type=1804 audit(4043.842:1221): pid=22757 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1111/file0" dev="vda" ino=715 res=1 errno=0 01:07:23 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:24 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r0) [ 4044.250608][ T30] audit: type=1804 audit(4044.202:1222): pid=22759 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1112/file0" dev="vda" ino=715 res=1 errno=0 01:07:24 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4044.820839][ T30] audit: type=1804 audit(4044.772:1223): pid=22761 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1113/file0" dev="vda" ino=703 res=1 errno=0 01:07:25 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4045.511544][ T30] audit: type=1804 audit(4045.472:1224): pid=22764 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1114/file0" dev="vda" ino=715 res=1 errno=0 01:07:25 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4045.800629][ T30] audit: type=1804 audit(4045.742:1225): pid=22767 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1115/file0" dev="vda" ino=715 res=1 errno=0 01:07:25 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4046.282792][ T30] audit: type=1804 audit(4046.242:1226): pid=22769 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1116/file0" dev="vda" ino=715 res=1 errno=0 01:07:26 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c47", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4046.701696][ T30] audit: type=1804 audit(4046.662:1227): pid=22771 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1117/file0" dev="vda" ino=715 res=1 errno=0 01:07:26 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c47", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4047.953990][ T30] audit: type=1804 audit(4047.912:1228): pid=22773 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1118/file0" dev="vda" ino=715 res=1 errno=0 01:07:28 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c47", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:28 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r0) [ 4048.943121][ T30] audit: type=1804 audit(4048.902:1229): pid=22775 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1119/file0" dev="vda" ino=703 res=1 errno=0 01:07:29 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4049.905418][ T30] audit: type=1804 audit(4049.862:1230): pid=22779 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1120/file0" dev="vda" ino=703 res=1 errno=0 01:07:30 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4050.444193][ T30] audit: type=1804 audit(4050.402:1231): pid=22781 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1121/file0" dev="vda" ino=703 res=1 errno=0 01:07:30 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4051.253422][ T30] audit: type=1804 audit(4051.212:1232): pid=22783 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1122/file0" dev="vda" ino=703 res=1 errno=0 01:07:31 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4051.878903][ T30] audit: type=1804 audit(4051.832:1233): pid=22785 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1123/file0" dev="vda" ino=703 res=1 errno=0 01:07:31 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:32 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r0) [ 4052.440134][ T30] audit: type=1804 audit(4052.392:1234): pid=22787 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1124/file0" dev="vda" ino=700 res=1 errno=0 01:07:32 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4052.786020][ T30] audit: type=1804 audit(4052.742:1235): pid=22790 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1125/file0" dev="vda" ino=700 res=1 errno=0 01:07:32 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e30", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4053.312101][ T30] audit: type=1804 audit(4053.272:1236): pid=22792 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1126/file0" dev="vda" ino=700 res=1 errno=0 01:07:33 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e30", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4053.984534][ T30] audit: type=1804 audit(4053.942:1237): pid=22795 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1127/file0" dev="vda" ino=700 res=1 errno=0 01:07:34 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e30", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4054.744006][ T30] audit: type=1804 audit(4054.702:1238): pid=22797 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1128/file0" dev="vda" ino=700 res=1 errno=0 01:07:34 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe8", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4055.165494][ T30] audit: type=1804 audit(4055.122:1239): pid=22799 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1129/file0" dev="vda" ino=700 res=1 errno=0 01:07:35 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe8", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:35 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4056.101520][ T30] audit: type=1804 audit(4056.062:1240): pid=22801 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1130/file0" dev="vda" ino=700 res=1 errno=0 01:07:36 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe8", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4056.575887][ T30] audit: type=1804 audit(4056.532:1241): pid=22804 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1131/file0" dev="vda" ino=715 res=1 errno=0 01:07:36 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31b", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4056.890369][ T30] audit: type=1804 audit(4056.842:1242): pid=22807 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1132/file0" dev="vda" ino=715 res=1 errno=0 01:07:36 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31b", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:37 executing program 1: sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4057.327779][ T30] audit: type=1804 audit(4057.282:1243): pid=22809 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1133/file0" dev="vda" ino=703 res=1 errno=0 01:07:37 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31b", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4057.879718][ T30] audit: type=1804 audit(4057.832:1244): pid=22812 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1134/file0" dev="vda" ino=703 res=1 errno=0 01:07:37 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a4", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4058.347706][ T30] audit: type=1804 audit(4058.302:1245): pid=22814 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1135/file0" dev="vda" ino=715 res=1 errno=0 01:07:38 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a4", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4058.952830][ T30] audit: type=1804 audit(4058.912:1246): pid=22817 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1136/file0" dev="vda" ino=715 res=1 errno=0 01:07:39 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a4", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:39 executing program 1: sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4059.519319][ T30] audit: type=1804 audit(4059.472:1247): pid=22819 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1137/file0" dev="vda" ino=715 res=1 errno=0 01:07:39 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4060.204378][ T30] audit: type=1804 audit(4060.162:1248): pid=22821 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1138/file0" dev="vda" ino=703 res=1 errno=0 01:07:40 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4060.795170][ T30] audit: type=1804 audit(4060.752:1249): pid=22823 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1139/file0" dev="vda" ino=703 res=1 errno=0 01:07:40 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4061.356446][ T30] audit: type=1804 audit(4061.312:1250): pid=22826 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1140/file0" dev="vda" ino=703 res=1 errno=0 01:07:41 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:41 executing program 1: sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4062.370116][ T30] audit: type=1804 audit(4062.322:1251): pid=22829 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1141/file0" dev="vda" ino=703 res=1 errno=0 01:07:42 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4063.162367][ T30] audit: type=1804 audit(4063.122:1252): pid=22832 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1142/file0" dev="vda" ino=711 res=1 errno=0 01:07:43 executing program 1: r0 = socket(0x0, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) 01:07:43 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4064.074785][ T30] audit: type=1804 audit(4064.032:1253): pid=22836 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1143/file0" dev="vda" ino=703 res=1 errno=0 01:07:44 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4065.110734][ T30] audit: type=1804 audit(4065.062:1254): pid=22840 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1144/file0" dev="vda" ino=715 res=1 errno=0 01:07:45 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4065.541584][ T30] audit: type=1804 audit(4065.502:1255): pid=22843 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1145/file0" dev="vda" ino=715 res=1 errno=0 01:07:45 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:45 executing program 1: r0 = socket(0x0, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4066.133701][ T30] audit: type=1804 audit(4066.092:1256): pid=22845 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1146/file0" dev="vda" ino=703 res=1 errno=0 01:07:46 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4066.837144][ T30] audit: type=1804 audit(4066.792:1257): pid=22848 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1147/file0" dev="vda" ino=703 res=1 errno=0 01:07:47 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4067.550391][ T30] audit: type=1804 audit(4067.502:1258): pid=22851 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1148/file0" dev="vda" ino=703 res=1 errno=0 01:07:47 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:47 executing program 1: r0 = socket(0x0, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4068.003097][ T30] audit: type=1804 audit(4067.962:1259): pid=22854 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1149/file0" dev="vda" ino=703 res=1 errno=0 01:07:48 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4068.731724][ T30] audit: type=1804 audit(4068.692:1260): pid=22856 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1150/file0" dev="vda" ino=703 res=1 errno=0 01:07:48 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4069.420494][ T30] audit: type=1804 audit(4069.382:1261): pid=22858 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1151/file0" dev="vda" ino=703 res=1 errno=0 01:07:49 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4070.174790][ T30] audit: type=1804 audit(4070.132:1262): pid=22861 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1152/file0" dev="vda" ino=711 res=1 errno=0 01:07:50 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4070.588662][ T30] audit: type=1804 audit(4070.542:1263): pid=22864 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1153/file0" dev="vda" ino=711 res=1 errno=0 01:07:50 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4071.187144][ T30] audit: type=1804 audit(4071.142:1264): pid=22867 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1154/file0" dev="vda" ino=711 res=1 errno=0 01:07:51 executing program 1: r0 = socket(0x29, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) 01:07:51 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4071.549893][ T30] audit: type=1804 audit(4071.502:1265): pid=22869 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1155/file0" dev="vda" ino=711 res=1 errno=0 01:07:51 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4072.260880][ T30] audit: type=1804 audit(4072.202:1266): pid=22872 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1156/file0" dev="vda" ino=711 res=1 errno=0 01:07:52 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4072.605299][ T30] audit: type=1804 audit(4072.562:1267): pid=22875 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1157/file0" dev="vda" ino=711 res=1 errno=0 01:07:52 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4073.123325][ T30] audit: type=1804 audit(4073.082:1268): pid=22877 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1158/file0" dev="vda" ino=711 res=1 errno=0 01:07:53 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:53 executing program 1: r0 = socket(0x29, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4073.605779][ T30] audit: type=1804 audit(4073.562:1269): pid=22879 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1159/file0" dev="vda" ino=700 res=1 errno=0 01:07:53 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4074.165253][ T30] audit: type=1804 audit(4074.122:1270): pid=22882 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1160/file0" dev="vda" ino=707 res=1 errno=0 01:07:54 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4074.745652][ T30] audit: type=1804 audit(4074.702:1271): pid=22885 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1161/file0" dev="vda" ino=707 res=1 errno=0 01:07:54 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:54 executing program 1: r0 = socket(0x29, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4075.320211][ T30] audit: type=1804 audit(4075.252:1272): pid=22887 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1162/file0" dev="vda" ino=703 res=1 errno=0 01:07:55 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4075.930702][ T30] audit: type=1804 audit(4075.882:1273): pid=22890 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1163/file0" dev="vda" ino=703 res=1 errno=0 01:07:56 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:07:56 executing program 1: socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4076.636586][ T30] audit: type=1804 audit(4076.592:1274): pid=22893 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1164/file0" dev="vda" ino=715 res=1 errno=0 01:07:56 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4077.104945][ T30] audit: type=1804 audit(4077.062:1275): pid=22895 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1165/file0" dev="vda" ino=703 res=1 errno=0 01:07:57 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4077.791431][ T30] audit: type=1804 audit(4077.752:1276): pid=22898 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1166/file0" dev="vda" ino=703 res=1 errno=0 01:07:57 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4078.264294][ T30] audit: type=1804 audit(4078.222:1277): pid=22900 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1167/file0" dev="vda" ino=711 res=1 errno=0 01:07:58 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4078.822081][ T30] audit: type=1804 audit(4078.782:1278): pid=22903 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1168/file0" dev="vda" ino=711 res=1 errno=0 01:07:58 executing program 1: socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) 01:07:58 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4079.324293][ T30] audit: type=1804 audit(4079.282:1279): pid=22905 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1169/file0" dev="vda" ino=703 res=1 errno=0 01:07:59 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4079.827408][ T30] audit: type=1804 audit(4079.782:1280): pid=22908 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1170/file0" dev="vda" ino=711 res=1 errno=0 01:08:00 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4080.436020][ T30] audit: type=1804 audit(4080.392:1281): pid=22911 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1171/file0" dev="vda" ino=715 res=1 errno=0 01:08:00 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:08:00 executing program 1: socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}, {0xc}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0xfdb7}}, 0x0) [ 4081.319929][ T30] audit: type=1804 audit(4081.272:1282): pid=22914 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1172/file0" dev="vda" ino=703 res=1 errno=0 01:08:01 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4082.302620][ T30] audit: type=1804 audit(4082.262:1283): pid=22916 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1173/file0" dev="vda" ino=711 res=1 errno=0 01:08:02 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4083.100056][ T30] audit: type=1804 audit(4083.042:1284): pid=22919 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1174/file0" dev="vda" ino=711 res=1 errno=0 01:08:03 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4083.392809][ T30] audit: type=1804 audit(4083.352:1285): pid=22921 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1175/file0" dev="vda" ino=711 res=1 errno=0 01:08:03 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) 01:08:03 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4083.984913][ T30] audit: type=1804 audit(4083.942:1286): pid=22923 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1176/file0" dev="vda" ino=703 res=1 errno=0 01:08:04 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c0000000000000001000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4084.521889][ T30] audit: type=1804 audit(4084.482:1287): pid=22926 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1177/file0" dev="vda" ino=715 res=1 errno=0 01:08:04 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c0000000000000001000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4084.828780][ T30] audit: type=1804 audit(4084.782:1288): pid=22929 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1178/file0" dev="vda" ino=715 res=1 errno=0 01:08:04 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) 01:08:04 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c0000000000000001000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4085.547272][ T30] audit: type=1804 audit(4085.502:1289): pid=22931 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1179/file0" dev="vda" ino=711 res=1 errno=0 01:08:05 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4086.064517][ T30] audit: type=1804 audit(4086.022:1290): pid=22933 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1180/file0" dev="vda" ino=703 res=1 errno=0 01:08:06 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4086.522702][ T30] audit: type=1804 audit(4086.482:1291): pid=22936 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1181/file0" dev="vda" ino=703 res=1 errno=0 01:08:06 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 4087.017054][ T30] audit: type=1804 audit(4086.972:1292): pid=22938 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1182/file0" dev="vda" ino=715 res=1 errno=0 01:08:07 executing program 0: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x4004662b, &(0x7f00000000c0)=ANY=[]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001d80)={'syztnl2\x00', &(0x7f0000000d00)={'syztnl0\x00', 0x0, 0x2f, 0x7b, 0x1f, 0xffffffff, 0x14, @dev={0xfe, 0x80, '\x00', 0x43}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x700, 0x700, 0x27f, 0x101}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad417e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'tunl0\x00', r1, 0x8000, 0x8040, 0xfff, 0x101, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x65, 0x0, 0x4, 0x4, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x83, 0x7, "c2c9ea81d1"}]}}}}}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000640)=@raw=[@ldst={0x0, 0x0, 0x6, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @ldst={0x0, 0x1, 0x1, 0x6, 0x2, 0x4, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0x8, 0x4, 0x8}, @alu={0x4, 0x0, 0x6, 0xb, 0x4, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0xfffffeff, 0x58, &(0x7f00000006c0)=""/88, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x0, 0x4, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1, 0x1], 0x0, 0x10, 0x1}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x294, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xc3}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0x9c, &(0x7f0000000480)=""/156, 0x41100, 0x10, '\x00', r4, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x8, 0x1, 0xfffffffd}, 0x10, 0xc609, r5, 0x2, 0x0, &(0x7f0000000940)=[{0x5, 0x3}, {0x4, 0x4, 0x0, 0xc}]}, 0x90) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x106) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="1c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYBLOB="c702ba19a2fe26d597579b57149caee6746000cd13d85358811532f1e24c3b43e3f622de3a668c2a52dc7fbda8c3ae6b33531c51f95186469d6c93d19fa56171fc640a5489faa02cb9957b0d168d14ae7d46f0b1f217d738d68df478b128a6e09c022cb4224d2d7aa5e0f53c475cc8181293f914aa910f44c6af99691afead8c3a340e35f74e5b99ce38ebab1cb78267df028cbdeaf0c5300b53d869f931c636268136d0cba0e8de8668ab12bc5c89331e509d648dd01915cc029c9e2f5293347a25d8682b96782995fb673e304af423e28b4fe88dd31be9a46d", @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001000000", @ANYRES32, @ANYBLOB="ef1fd755d075ce1e865ffdd7c08a9d5e30d3ba6fe79f10cf2bf7e84569d9c6b66a5b98defa2ab57fc2e6d14b9c826a15ba4b81307d530769229db567aabb44480a70725fa72b249d80025b3c8cc0900784f59fcdac31422b94e5119d524b6d45be74407f2af1fae6b93352c0e39b710052975d75b62ba33cdd203efa2e2c89247f025f189991ef31faad173df1a4b9d7299e2627d86abb2425186ed900cb5ef08135cbe3b583979cf4eb02f319a6fea32d06864fddccfcd3d311a70043f95ea1f3c08dc32a83cf4d0b6efe780caa6749bb", @ANYRES32=r6, @ANYBLOB="b0acc9c067c8557619565d348d5b16a782f23380ac33cf0488cdb11f95bccc5e3613b625b9920436", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000400001000000020007000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0xd8}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000003080)="c5808f9aca5ab972a93116e18a07dc3e1d17deddd0170a15b7feb64822f8ed20c1f671a2dff3217cd0b0a22e64d6d9460d7455e4f53b9a34962cc4070a1f8a06c20cd5c3bcc2173fbbfe406b9fbc484bc48c9199f06905664b2024add713e2b38d6de62500fa27ada3ec1df33b081a2d1988def972bc6104bc1385b1099eba87708378af98b8896c2b6b94e2583d022bd76e9a2d42d4e187c8fd53aef311ba10efc0c62889db17e54ba1ed6be9d4ee24671743d8593956186b9c56b9b319f223bd558ce1760dbc15d8cbbf04ec03e10f519042914446367934f4d3a60321acfc7b40a2f76b2d4b87cdb56fdd2f8b16ed810d148abc", 0xf5}, {0x0}, {&(0x7f0000004180)}, {&(0x7f0000000100)="924a94ebec42264132c9b0bf0c07022186fd7b6e1fdd40d0534e439b3e69f5c5091f4ed84c1c", 0x26}], 0x4, &(0x7f0000004480)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18}}, @rights={{0x14, 0x1, 0x1, [r2, r7]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc4, 0x24000081}}], 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x8, 0x0, 0x0, @multicast}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 01:08:07 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) [ 4087.541073][ T31] INFO: task kworker/1:3:12577 blocked for more than 430 seconds. [ 4087.541711][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.542415][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.543425][ T31] task:kworker/1:3 state:D stack:0 pid:12577 tgid:12577 ppid:2 flags:0x00000000 [ 4087.544749][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.545430][ T31] Backtrace: [ 4087.545933][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.546873][ T31] r10:82c16205 r9:00000000 r8:8270dd78 r7:00000002 r6:eb001dac r5:83506000 [ 4087.547744][ T31] r4:83506000 [ 4087.548255][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.565159][ T31] r5:83506000 r4:8270dd74 [ 4087.565453][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.565796][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.566091][ T31] r10:82c16205 r9:eb001e38 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3fc0 [ 4087.566336][ T31] r4:00000000 [ 4087.566459][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.566705][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.566954][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.567205][ T31] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3fc0 [ 4087.567413][ T31] r4:00000000 [ 4087.567534][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.567775][ T31] r9:83506000 r8:00000080 r7:00000000 r6:82c16200 r5:00001000 r4:7f02f000 [ 4087.568020][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.568279][ T31] r5:00001000 r4:dfa3b000 [ 4087.568418][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.568664][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.568964][ T31] r5:844c9b50 r4:844c9800 [ 4087.569101][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.569398][ T31] r7:ddde4280 r6:82c16200 r5:844c9b50 r4:90922980 [ 4087.594653][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.595313][ T31] r10:61c88647 r9:83506000 r8:ddde42a0 r7:82604d40 r6:ddde4280 r5:909229ac [ 4087.595550][ T31] r4:90922980 [ 4087.595677][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.595999][ T31] r10:00000000 r9:e06e1e90 r8:84907900 r7:90922980 r6:8026736c r5:83506000 [ 4087.596234][ T31] r4:9093e480 [ 4087.596352][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.596564][ T31] Exception stack(0xeb001fb0 to 0xeb001ff8) [ 4087.596754][ T31] 1fa0: 00000000 00000000 00000000 00000000 [ 4087.597013][ T31] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.597252][ T31] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.597467][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:9093e480 [ 4087.597914][ T31] INFO: task kworker/0:2:19420 blocked for more than 430 seconds. [ 4087.598123][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.598290][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.598493][ T31] task:kworker/0:2 state:D stack:0 pid:19420 tgid:19420 ppid:2 flags:0x00000000 [ 4087.598778][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.598982][ T31] Backtrace: [ 4087.599120][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.599366][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:dfe05dac r5:84075400 [ 4087.612226][ T31] r4:84075400 [ 4087.612503][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.613407][ T31] r5:84075400 r4:8270dd74 [ 4087.613603][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.613909][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.614202][ T31] r10:82c16005 r9:dfe05e38 r8:00000000 r7:ffffffff r6:00000000 r5:84b598c0 [ 4087.614426][ T31] r4:00000000 [ 4087.614547][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.614801][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.615049][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.615301][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b598c0 [ 4087.615536][ T31] r4:00000000 [ 4087.615643][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.615892][ T31] r9:84075400 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f05b000 [ 4087.616151][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.616395][ T31] r5:00001000 r4:e0775000 [ 4087.616532][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.616783][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.617050][ T31] r5:84b0d350 r4:84b0d000 [ 4087.617189][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.617455][ T31] r7:dddd1280 r6:82c16000 r5:84b0d350 r4:9857c080 [ 4087.617639][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.617929][ T31] r10:61c88647 r9:84075400 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:9857c0ac [ 4087.618138][ T31] r4:9857c080 [ 4087.618256][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.618493][ T31] r10:00000000 r9:edf31e90 r8:85069a00 r7:9857c080 r6:8026736c r5:84075400 [ 4087.618716][ T31] r4:98671e80 [ 4087.618839][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.619074][ T31] Exception stack(0xdfe05fb0 to 0xdfe05ff8) [ 4087.619256][ T31] 5fa0: 00000000 00000000 00000000 00000000 [ 4087.624085][ T30] audit: type=1804 audit(4087.582:1293): pid=22941 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir2867948411/syzkaller.v1uPl9/1183/file0" dev="vda" ino=703 res=1 errno=0 [ 4087.649925][ T31] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.650204][ T31] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.650359][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:98671e80 [ 4087.650792][ T31] INFO: task kworker/0:32:20109 blocked for more than 430 seconds. [ 4087.651040][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.651206][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.651362][ T31] task:kworker/0:32 state:D stack:0 pid:20109 tgid:20109 ppid:2 flags:0x00000000 [ 4087.651564][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.651706][ T31] Backtrace: [ 4087.651782][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.651995][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e07b5dac r5:842aa400 [ 4087.652137][ T31] r4:842aa400 [ 4087.652214][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.652386][ T31] r5:842aa400 r4:8270dd74 [ 4087.652504][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.652647][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.652857][ T31] r10:82c16005 r9:e07b5e38 r8:00000000 r7:ffffffff r6:00000000 r5:9866e4c0 [ 4087.653032][ T31] r4:00000000 [ 4087.653090][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.653209][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.653353][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.653496][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:9866e4c0 [ 4087.653642][ T31] r4:00000000 [ 4087.653706][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.653925][ T31] r9:842aa400 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f065000 [ 4087.654042][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.654231][ T31] r5:00001000 r4:e08b9000 [ 4087.654350][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.654516][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.654684][ T31] r5:8497ff50 r4:8497fc00 [ 4087.654777][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.654959][ T31] r7:dddd1280 r6:82c16000 r5:8497ff50 r4:8dcdd700 [ 4087.655092][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.655277][ T31] r10:61c88647 r9:842aa400 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcdd72c [ 4087.655427][ T31] r4:8dcdd700 [ 4087.655495][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.655684][ T31] r10:00000000 r9:dffe5e90 r8:84a49600 r7:8dcdd700 r6:8026736c r5:842aa400 [ 4087.655865][ T31] r4:84a49100 [ 4087.655973][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.656159][ T31] Exception stack(0xe07b5fb0 to 0xe07b5ff8) [ 4087.656282][ T31] 5fa0: 00000000 00000000 00000000 00000000 [ 4087.656465][ T31] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.656653][ T31] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.656804][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:84a49100 [ 4087.656991][ T31] INFO: task kworker/0:34:20119 blocked for more than 430 seconds. [ 4087.657172][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.657242][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.657366][ T31] task:kworker/0:34 state:D stack:0 pid:20119 tgid:20119 ppid:2 flags:0x00000000 [ 4087.657602][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.657776][ T31] Backtrace: [ 4087.657867][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.658059][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:dfa39dac r5:842b0000 [ 4087.658241][ T31] r4:842b0000 [ 4087.658301][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.658491][ T31] r5:842b0000 r4:8270dd74 [ 4087.658563][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.658778][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.659004][ T31] r10:82c16005 r9:dfa39e38 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e3c0 [ 4087.659099][ T31] r4:00000000 [ 4087.659208][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.659416][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.682874][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.683073][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e3c0 [ 4087.683214][ T31] r4:00000000 [ 4087.683275][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.683475][ T31] r9:842b0000 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f031000 [ 4087.683621][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.683799][ T31] r5:00001000 r4:dfa8f000 [ 4087.683897][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.684096][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.684278][ T31] r5:8c04cb50 r4:8c04c800 [ 4087.684364][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.684566][ T31] r7:dddd1280 r6:82c16000 r5:8c04cb50 r4:8dcdd900 [ 4087.684679][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.684867][ T31] r10:61c88647 r9:842b0000 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcdd92c [ 4087.685016][ T31] r4:8dcdd900 [ 4087.685074][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.685237][ T31] r10:00000000 r9:e07b5e90 r8:84961040 r7:8dcdd900 r6:8026736c r5:842b0000 [ 4087.685397][ T31] r4:84961d00 [ 4087.685455][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.685598][ T31] Exception stack(0xdfa39fb0 to 0xdfa39ff8) [ 4087.685692][ T31] 9fa0: 00000000 00000000 00000000 00000000 [ 4087.685858][ T31] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.686001][ T31] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.686136][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:84961d00 [ 4087.686295][ T31] INFO: task kworker/0:35:20122 blocked for more than 430 seconds. [ 4087.686424][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.686525][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.686687][ T31] task:kworker/0:35 state:D stack:0 pid:20122 tgid:20122 ppid:2 flags:0x00000000 [ 4087.686858][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.686983][ T31] Backtrace: [ 4087.687059][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.687194][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:dfa95dac r5:82ef5400 [ 4087.687382][ T31] r4:82ef5400 [ 4087.687458][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.687611][ T31] r5:82ef5400 r4:8270dd74 [ 4087.687704][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.688065][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.688244][ T31] r10:82c16005 r9:dfa95e38 r8:00000000 r7:ffffffff r6:00000000 r5:9866e740 [ 4087.688391][ T31] r4:00000000 [ 4087.688464][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.688660][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.688908][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.689133][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:9866e740 [ 4087.689349][ T31] r4:00000000 [ 4087.697164][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.697474][ T31] r9:82ef5400 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f067000 [ 4087.697756][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.697890][ T31] r5:00001000 r4:e08fb000 [ 4087.697972][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.698165][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.698393][ T31] r5:8497f350 r4:8497f000 [ 4087.698460][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.698744][ T31] r7:dddd1280 r6:82c16000 r5:8497f350 r4:8dcdd500 [ 4087.698874][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.699085][ T31] r10:61c88647 r9:82ef5400 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcdd52c [ 4087.699242][ T31] r4:8dcdd500 [ 4087.699308][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.712531][ T31] r10:00000000 r9:e07b5e90 r8:84bcb140 r7:8dcdd500 r6:8026736c r5:82ef5400 [ 4087.712827][ T31] r4:84961940 [ 4087.712931][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.713271][ T31] Exception stack(0xdfa95fb0 to 0xdfa95ff8) [ 4087.713399][ T31] 5fa0: 00000000 00000000 00000000 00000000 [ 4087.713697][ T31] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.713861][ T31] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.713992][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:84961940 [ 4087.714183][ T31] INFO: task kworker/0:36:20130 blocked for more than 430 seconds. [ 4087.714394][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.714533][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.714703][ T31] task:kworker/0:36 state:D stack:0 pid:20130 tgid:20130 ppid:2 flags:0x00000000 [ 4087.714895][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.715022][ T31] Backtrace: [ 4087.715121][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.715266][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:dffaddac r5:842d6000 [ 4087.715419][ T31] r4:842d6000 [ 4087.715598][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.715851][ T31] r5:842d6000 r4:8270dd74 [ 4087.716005][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.716318][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.716558][ T31] r10:82c16005 r9:dffade38 r8:00000000 r7:ffffffff r6:00000000 r5:85052640 [ 4087.716792][ T31] r4:00000000 [ 4087.716894][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.717160][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.717333][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.717527][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052640 [ 4087.717775][ T31] r4:00000000 [ 4087.717836][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.718108][ T31] r9:842d6000 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f059000 [ 4087.718321][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.718511][ T31] r5:00001000 r4:e0709000 [ 4087.718578][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.718772][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.719016][ T31] r5:844caf50 r4:844cac00 [ 4087.719136][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.719418][ T31] r7:dddd1280 r6:82c16000 r5:844caf50 r4:8dcdde80 [ 4087.726035][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.726299][ T31] r10:61c88647 r9:842d6000 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcddeac [ 4087.726451][ T31] r4:8dcdde80 [ 4087.726517][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.726653][ T31] r10:00000000 r9:e07b5e90 r8:84a4f6c0 r7:8dcdde80 r6:8026736c r5:842d6000 [ 4087.726816][ T31] r4:84a4f800 [ 4087.726881][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.727001][ T31] Exception stack(0xdffadfb0 to 0xdffadff8) [ 4087.727147][ T31] dfa0: 00000000 00000000 00000000 00000000 [ 4087.727308][ T31] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.727475][ T31] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.727601][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:84a4f800 [ 4087.727786][ T31] INFO: task kworker/0:37:20141 blocked for more than 430 seconds. [ 4087.727976][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.728072][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.728260][ T31] task:kworker/0:37 state:D stack:0 pid:20141 tgid:20141 ppid:2 flags:0x00000000 [ 4087.728447][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.728549][ T31] Backtrace: [ 4087.728660][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.728832][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:dfdeddac r5:8471b000 [ 4087.729020][ T31] r4:8471b000 [ 4087.729090][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.729245][ T31] r5:8471b000 r4:8270dd74 [ 4087.729359][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.738077][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.738462][ T31] r10:82c16005 r9:dfdede38 r8:00000000 r7:ffffffff r6:00000000 r5:9866ef40 [ 4087.738885][ T31] r4:00000000 [ 4087.739029][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.739390][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.742857][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.743093][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:9866ef40 [ 4087.743234][ T31] r4:00000000 [ 4087.743305][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.743461][ T31] r9:8471b000 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f033000 [ 4087.743552][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.743690][ T31] r5:00001000 r4:dfad1000 [ 4087.743823][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.744003][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.744225][ T31] r5:8497d750 r4:8497d400 [ 4087.744306][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.744573][ T31] r7:dddd1280 r6:82c16000 r5:8497d750 r4:8dcddf80 [ 4087.744697][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.744902][ T31] r10:61c88647 r9:8471b000 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcddfac [ 4087.745137][ T31] r4:8dcddf80 [ 4087.745261][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.745521][ T31] r10:00000000 r9:dffade90 r8:8dbfc800 r7:8dcddf80 r6:8026736c r5:8471b000 [ 4087.745682][ T31] r4:8dbfc480 [ 4087.745783][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.745956][ T31] Exception stack(0xdfdedfb0 to 0xdfdedff8) [ 4087.746080][ T31] dfa0: 00000000 00000000 00000000 00000000 [ 4087.746311][ T31] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.746501][ T31] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.746826][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:8dbfc480 [ 4087.747025][ T31] INFO: task kworker/0:38:20146 blocked for more than 430 seconds. [ 4087.747223][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.747388][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.747606][ T31] task:kworker/0:38 state:D stack:0 pid:20146 tgid:20146 ppid:2 flags:0x00000000 [ 4087.748006][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.748152][ T31] Backtrace: [ 4087.748220][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.748413][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:dfd99dac r5:8471e000 [ 4087.748602][ T31] r4:8471e000 [ 4087.748716][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.748975][ T31] r5:8471e000 r4:8270dd74 [ 4087.749060][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.749248][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.764400][ T31] r10:82c16005 r9:dfd99e38 r8:00000000 r7:ffffffff r6:00000000 r5:8dcc8f00 [ 4087.764656][ T31] r4:00000000 [ 4087.764774][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.764941][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.765075][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.765211][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8dcc8f00 [ 4087.765355][ T31] r4:00000000 [ 4087.765423][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.765609][ T31] r9:8471e000 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f063000 [ 4087.765761][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.765937][ T31] r5:00001000 r4:e0877000 [ 4087.765994][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.766225][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.766434][ T31] r5:844ca750 r4:844ca400 [ 4087.766519][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.766728][ T31] r7:dddd1280 r6:82c16000 r5:844ca750 r4:8dcddc80 [ 4087.766858][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.767064][ T31] r10:61c88647 r9:8471e000 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcddcac [ 4087.767291][ T31] r4:8dcddc80 [ 4087.767410][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.767602][ T31] r10:00000000 r9:dffade90 r8:8dccf2c0 r7:8dcddc80 r6:8026736c r5:8471e000 [ 4087.767796][ T31] r4:8dccf5c0 [ 4087.767923][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.768151][ T31] Exception stack(0xdfd99fb0 to 0xdfd99ff8) [ 4087.768312][ T31] 9fa0: 00000000 00000000 00000000 00000000 [ 4087.768531][ T31] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.768781][ T31] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.768966][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:8dccf5c0 [ 4087.769304][ T31] INFO: task kworker/0:39:20169 blocked for more than 430 seconds. [ 4087.781933][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.782187][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.782374][ T31] task:kworker/0:39 state:D stack:0 pid:20169 tgid:20169 ppid:2 flags:0x00000000 [ 4087.782575][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.782699][ T31] Backtrace: [ 4087.782837][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.783228][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:dfb65dac r5:836a9800 [ 4087.783421][ T31] r4:836a9800 [ 4087.783494][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.783660][ T31] r5:836a9800 r4:8270dd74 [ 4087.783746][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.783991][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.784194][ T31] r10:82c16005 r9:dfb65e38 r8:00000000 r7:ffffffff r6:00000000 r5:8dcc8dc0 [ 4087.784373][ T31] r4:00000000 [ 4087.784437][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.784617][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.784822][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.785023][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8dcc8dc0 [ 4087.785222][ T31] r4:00000000 [ 4087.785331][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.785530][ T31] r9:836a9800 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f061000 [ 4087.785740][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.785972][ T31] r5:00001000 r4:e0827000 [ 4087.786061][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.786230][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.786440][ T31] r5:844cbb50 r4:844cb800 [ 4087.786522][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.786703][ T31] r7:dddd1280 r6:82c16000 r5:844cbb50 r4:8dcdd580 [ 4087.786819][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.786995][ T31] r10:61c88647 r9:836a9800 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcdd5ac [ 4087.787143][ T31] r4:8dcdd580 [ 4087.787198][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.787385][ T31] r10:00000000 r9:dffade90 r8:84bcc900 r7:8dcdd580 r6:8026736c r5:836a9800 [ 4087.787558][ T31] r4:892c64c0 [ 4087.787647][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.787846][ T31] Exception stack(0xdfb65fb0 to 0xdfb65ff8) [ 4087.788006][ T31] 5fa0: 00000000 00000000 00000000 00000000 [ 4087.788148][ T31] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.788399][ T31] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.788536][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:892c64c0 [ 4087.788711][ T31] INFO: task kworker/0:40:20174 blocked for more than 430 seconds. [ 4087.788836][ T31] Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.788942][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4087.789091][ T31] task:kworker/0:40 state:D stack:0 pid:20174 tgid:20174 ppid:2 flags:0x00000000 [ 4087.789310][ T31] Workqueue: events bpf_prog_free_deferred [ 4087.809982][ T31] Backtrace: [ 4087.810251][ T31] [<818579c4>] (__schedule) from [<818585fc>] (schedule+0x2c/0xb8) [ 4087.810507][ T31] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e06bddac r5:82e7e000 [ 4087.810643][ T31] r4:82e7e000 [ 4087.810698][ T31] [<818585d0>] (schedule) from [<81858bc8>] (schedule_preempt_disabled+0x18/0x24) [ 4087.810953][ T31] r5:82e7e000 r4:8270dd74 [ 4087.811075][ T31] [<81858bb0>] (schedule_preempt_disabled) from [<8185b4b0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4087.811357][ T31] [<8185b1c8>] (__mutex_lock.constprop.0) from [<8185bd7c>] (__mutex_lock_slowpath+0x14/0x18) [ 4087.811609][ T31] r10:82c16005 r9:e06bde38 r8:00000000 r7:ffffffff r6:00000000 r5:8dcc81c0 [ 4087.811768][ T31] r4:00000000 [ 4087.811893][ T31] [<8185bd68>] (__mutex_lock_slowpath) from [<8185bdbc>] (mutex_lock+0x3c/0x40) [ 4087.812134][ T31] [<8185bd80>] (mutex_lock) from [<8048df34>] (_vm_unmap_aliases+0x60/0x2e4) [ 4087.812344][ T31] [<8048ded4>] (_vm_unmap_aliases) from [<80491ad4>] (vfree+0x170/0x1e0) [ 4087.812641][ T31] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8dcc81c0 [ 4087.813033][ T31] r4:00000000 [ 4087.813199][ T31] [<80491964>] (vfree) from [<802ea464>] (module_memfree+0x30/0x50) [ 4087.813514][ T31] r9:82e7e000 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f05f000 [ 4087.813771][ T31] [<802ea434>] (module_memfree) from [<80388aec>] (bpf_jit_free_exec+0x10/0x14) [ 4087.814061][ T31] r5:00001000 r4:e07eb000 [ 4087.814136][ T31] [<80388adc>] (bpf_jit_free_exec) from [<80388cac>] (bpf_jit_free+0x68/0xe4) [ 4087.814420][ T31] [<80388c44>] (bpf_jit_free) from [<80389d8c>] (bpf_prog_free_deferred+0x14c/0x164) [ 4087.814689][ T31] r5:84b0fb50 r4:84b0f800 [ 4087.814857][ T31] [<80389c40>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 4087.815101][ T31] r7:dddd1280 r6:82c16000 r5:84b0fb50 r4:8dcdd300 [ 4087.815320][ T31] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 4087.815671][ T31] r10:61c88647 r9:82e7e000 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8dcdd32c [ 4087.816141][ T31] r4:8dcdd300 [ 4087.816217][ T31] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 4087.816477][ T31] r10:00000000 r9:dffade90 r8:84bead40 r7:8dcdd300 r6:8026736c r5:82e7e000 [ 4087.816781][ T31] r4:84beac00 [ 4087.816920][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.817199][ T31] Exception stack(0xe06bdfb0 to 0xe06bdff8) [ 4087.817378][ T31] dfa0: 00000000 00000000 00000000 00000000 [ 4087.817877][ T31] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.818106][ T31] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.818295][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:84beac00 [ 4087.818591][ T31] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 4087.830640][ T31] NMI backtrace for cpu 1 [ 4087.830936][ T31] CPU: 1 PID: 31 Comm: khungtaskd Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.831169][ T31] Hardware name: ARM-Versatile Express [ 4087.831306][ T31] Backtrace: [ 4087.831445][ T31] [<8183656c>] (dump_backtrace) from [<81836668>] (show_stack+0x18/0x1c) [ 4087.831712][ T31] r7:00000000 r6:00000113 r5:60000193 r4:81fbd330 [ 4087.831892][ T31] [<81836650>] (show_stack) from [<81853b5c>] (dump_stack_lvl+0x48/0x54) [ 4087.832176][ T31] [<81853b14>] (dump_stack_lvl) from [<81853b80>] (dump_stack+0x18/0x1c) [ 4087.832390][ T31] r5:00000001 r4:00000001 [ 4087.832601][ T31] [<81853b68>] (dump_stack) from [<81823998>] (nmi_cpu_backtrace+0x160/0x17c) [ 4087.832908][ T31] [<81823838>] (nmi_cpu_backtrace) from [<81823ae4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 4087.833249][ T31] r7:00000001 r6:8260c494 r5:8261a7d8 r4:ffffffff [ 4087.833416][ T31] [<818239b4>] (nmi_trigger_cpumask_backtrace) from [<80210574>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 4087.833705][ T31] r9:827d8cdf r8:82894eb8 r7:8260c5ec r6:00007d42 r5:8261adc8 r4:8744ff2c [ 4087.833932][ T31] [<8021055c>] (arch_trigger_cpumask_backtrace) from [<80347e54>] (watchdog+0x48c/0x59c) [ 4087.834176][ T31] [<803479c8>] (watchdog) from [<8026e888>] (kthread+0x104/0x134) [ 4087.834379][ T31] r10:00000000 r9:df819e58 r8:82f23700 r7:00000000 r6:803479c8 r5:82e90c00 [ 4087.834671][ T31] r4:82ec7780 [ 4087.834758][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.834965][ T31] Exception stack(0xdf8ddfb0 to 0xdf8ddff8) [ 4087.835114][ T31] dfa0: 00000000 00000000 00000000 00000000 [ 4087.835290][ T31] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.835496][ T31] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.835647][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:82ec7780 [ 4087.835965][ T31] Sending NMI from CPU 1 to CPUs 0: [ 4087.836620][ C0] NMI backtrace for cpu 0 [ 4087.837056][ C0] CPU: 0 PID: 2800 Comm: klogd Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.837161][ C0] Hardware name: ARM-Versatile Express [ 4087.837466][ C0] PC is at tomoyo_socket_sendmsg_permission+0x0/0x108 [ 4087.838123][ C0] LR is at tomoyo_socket_sendmsg+0x10/0x14 [ 4087.838183][ C0] pc : [<806f272c>] lr : [<806f3200>] psr: a0000013 [ 4087.838214][ C0] sp : ec555e40 ip : ec555e50 fp : ec555e4c [ 4087.838242][ C0] r10: 00000121 r9 : 842d3c00 r8 : 00000003 [ 4087.838280][ C0] r7 : 8306f180 r6 : ec555e98 r5 : 0000005a r4 : 821910e0 [ 4087.838317][ C0] r3 : 806f31f0 r2 : 0000005a r1 : ec555e98 r0 : 8306f180 [ 4087.838425][ C0] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 4087.838485][ C0] Control: 30c5387d Table: 84409c80 DAC: fffffffd [ 4087.838550][ C0] Backtrace: [ 4087.839365][ C0] [<806f31f0>] (tomoyo_socket_sendmsg) from [<806bc38c>] (security_socket_sendmsg+0x40/0x5c) [ 4087.839642][ C0] [<806bc34c>] (security_socket_sendmsg) from [<8134c030>] (__sock_sendmsg+0x1c/0x78) [ 4087.839811][ C0] r7:8306f180 r6:8306f180 r5:ec555e98 r4:00000000 [ 4087.839844][ C0] [<8134c014>] (__sock_sendmsg) from [<8134e368>] (__sys_sendto+0x108/0x14c) [ 4087.839928][ C0] r7:8306f180 r6:00000000 r5:00004000 r4:00000000 [ 4087.839944][ C0] [<8134e260>] (__sys_sendto) from [<8134e3f0>] (sys_send+0x20/0x28) [ 4087.840019][ C0] r8:80200288 r7:00000121 r6:76f535a0 r5:76f535a0 r4:0119dd70 [ 4087.840036][ C0] [<8134e3d0>] (sys_send) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4087.840141][ C0] Exception stack(0xec555fa8 to 0xec555ff0) [ 4087.840279][ C0] 5fa0: 0119dd70 76f535a0 00000003 0119e4e8 0000005a 00004000 [ 4087.840350][ C0] 5fc0: 0119dd70 76f535a0 76f535a0 00000121 00000000 00000013 76e20e60 0119e4eb [ 4087.840380][ C0] 5fe0: 00000000 7ef67bc8 76da8460 76dad918 [ 4087.881633][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 4087.881932][ T31] CPU: 1 PID: 31 Comm: khungtaskd Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.882076][ T31] Hardware name: ARM-Versatile Express [ 4087.882164][ T31] Backtrace: [ 4087.882243][ T31] [<8183656c>] (dump_backtrace) from [<81836668>] (show_stack+0x18/0x1c) [ 4087.882431][ T31] r7:00000000 r6:82622dc4 r5:60000193 r4:81fbd330 [ 4087.882550][ T31] [<81836650>] (show_stack) from [<81853b5c>] (dump_stack_lvl+0x48/0x54) [ 4087.882699][ T31] [<81853b14>] (dump_stack_lvl) from [<81853b80>] (dump_stack+0x18/0x1c) [ 4087.882878][ T31] r5:00000000 r4:8284fd18 [ 4087.882967][ T31] [<81853b68>] (dump_stack) from [<81837110>] (panic+0x120/0x378) [ 4087.883128][ T31] [<81836ff0>] (panic) from [<80347ce0>] (watchdog+0x318/0x59c) [ 4087.883276][ T31] r3:00000000 r2:00000000 r1:00000001 r0:81fbddec [ 4087.883408][ T31] r7:8260c5ec [ 4087.883481][ T31] [<803479c8>] (watchdog) from [<8026e888>] (kthread+0x104/0x134) [ 4087.883646][ T31] r10:00000000 r9:df819e58 r8:82f23700 r7:00000000 r6:803479c8 r5:82e90c00 [ 4087.883809][ T31] r4:82ec7780 [ 4087.883878][ T31] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 4087.884059][ T31] Exception stack(0xdf8ddfb0 to 0xdf8ddff8) [ 4087.884180][ T31] dfa0: 00000000 00000000 00000000 00000000 [ 4087.884348][ T31] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4087.884512][ T31] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4087.884659][ T31] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:82ec7780 [ 4087.885192][ C0] CPU0: stopping [ 4087.885283][ C0] CPU: 0 PID: 12963 Comm: syz-executor.1 Not tainted 6.8.0-rc2-syzkaller #0 [ 4087.885352][ C0] Hardware name: ARM-Versatile Express [ 4087.885371][ C0] Backtrace: frame pointer underflow [ 4087.885432][ C0] [<8183656c>] (dump_backtrace) from [<81836668>] (show_stack+0x18/0x1c) [ 4087.885543][ C0] r7:00000014 r6:81b0f9f0 r5:600001d3 r4:81fbd330 [ 4087.885562][ C0] [<81836650>] (show_stack) from [<81853b5c>] (dump_stack_lvl+0x48/0x54) [ 4087.885608][ C0] [<81853b14>] (dump_stack_lvl) from [<81853b80>] (dump_stack+0x18/0x1c) [ 4087.885653][ C0] r5:00000000 r4:00000004 [ 4087.885667][ C0] [<81853b68>] (dump_stack) from [<8020fb78>] (do_handle_IPI+0x2ac/0x2d8) [ 4087.885714][ C0] [<8020f8cc>] (do_handle_IPI) from [<8020fbc4>] (ipi_handler+0x20/0x28) [ 4087.885776][ C0] r9:7eb7532f r8:df801f78 r7:00000014 r6:81b0f9f0 r5:82c0cc80 r4:82c96d00 [ 4087.885796][ C0] [<8020fba4>] (ipi_handler) from [<802c5004>] (handle_percpu_devid_irq+0x9c/0x2cc) [ 4087.885846][ C0] [<802c4f68>] (handle_percpu_devid_irq) from [<802be790>] (generic_handle_domain_irq+0x30/0x40) [ 4087.885909][ C0] r10:003d0f00 r9:7eb7532f r8:00000000 r7:df80a00c r6:824b0bc0 r5:df80a000 [ 4087.885954][ C0] r4:8260cd28 r3:00010000 [ 4087.885968][ C0] [<802be760>] (generic_handle_domain_irq) from [<802011c4>] (gic_handle_irq+0x68/0x7c) [ 4087.886012][ C0] [<8020115c>] (gic_handle_irq) from [<81854420>] (generic_handle_arch_irq+0x60/0x80) [ 4087.886068][ C0] r7:eaeb1fb0 r6:8213c804 r5:82178388 r4:824b2224 [ 4087.886088][ C0] [<818543c0>] (generic_handle_arch_irq) from [<81806640>] (call_with_stack+0x1c/0x20) [ 4087.886153][ C0] r9:7eb7532f r8:824a8044 r7:82e6d400 r6:ffffffff r5:20000010 r4:00016900 [ 4087.886174][ C0] [<81806624>] (call_with_stack) from [<80200eb4>] (__irq_usr+0x74/0x80) [ 4087.886219][ C0] Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) [ 4087.886253][ C0] 1fa0: ffffffff 00000004 000001b0 00000000 [ 4087.886294][ C0] 1fc0: 00000000 00000000 00000000 00000000 7eb7532e 7eb7532f 003d0f00 76b110fc [ 4087.886330][ C0] 1fe0: 20002250 20002250 00016900 00016900 20000010 ffffffff [ 4087.890350][ T31] Rebooting in 86400 seconds.. VM DIAGNOSIS: 22:14:10 Registers: info registers vcpu 0 CPU#0 R00=00000081 R01=0119e4e8 R02=00000081 R03=00004000 R04=0119dd70 R05=76f535a0 R06=76f535a0 R07=00000121 R08=00000000 R09=00000013 R10=76e20e60 R11=0119e4eb R12=00000000 R13=ec555ff8 R14=76dad918 R15=76dad918 PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=76efa21a s17=00000000 d08=0000000076efa21a s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84072400 R01=84533000 R02=00000000 R03=0000aa30 R04=83505400 R05=84533000 R06=ffffffff R07=dfd79d3c R08=80200b9c R09=8270dd58 R10=00000000 R11=dfd79d84 R12=dfd79d88 R13=dfd79d58 R14=80210b30 R15=8021b36c PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000