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", 0x1000}, {&(0x7f0000009300)="f71c1d8231878ab900a97b655be5c037194f35d277c1030dec677bcd54adba27e455d994f6cdec516e42134ef90a54b3210c1ccb3bd7ab921b6fcc4f8b3b7d501eabe5402c7a36dfae40d7d5f3655940450a65ddce400c1f5cd47d5ae00c83f350cef449", 0x64}], 0x7, &(0x7f0000009400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, r14}}}], 0x20, 0x40104}], 0xa, 0x800) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) 20:26:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f06", 0x89, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:58 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000240)={'syztnl2\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x5, 0x9, 0x432c, 0x2, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7, 0x10, 0x2, 0x696}}) sendfile(r6, r5, &(0x7f00000000c0)=0x800007, 0x5) r7 = accept4$alg(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x200000, 0x0) [ 264.139995] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 264.152374] CPU: 1 PID: 15216 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 264.160304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.170051] Call Trace: [ 264.172672] dump_stack+0x1fc/0x2fe [ 264.176311] sysfs_warn_dup.cold+0x1c/0x2d [ 264.180556] sysfs_do_create_link_sd+0x116/0x130 [ 264.185322] sysfs_create_link+0x5f/0xc0 [ 264.189394] device_add+0x7d1/0x16d0 [ 264.193120] ? device_check_offline+0x280/0x280 [ 264.197796] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 264.203087] wiphy_register+0x1664/0x2130 [ 264.207281] ? bm_init+0x612/0x950 [ 264.210870] ? wiphy_unregister+0xea0/0xea0 [ 264.215206] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 264.220228] ? __kmalloc+0x38e/0x3c0 [ 264.223948] ? ieee80211_cs_list_valid+0x199/0x280 [ 264.228889] ieee80211_register_hw+0x13a7/0x3410 [ 264.233661] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 264.238602] ? memset+0x20/0x40 [ 264.241890] ? __hrtimer_init+0xe9/0x1d0 [ 264.245967] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 264.251080] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 264.256119] ? hwsim_mcast_del_radio+0x230/0x230 [ 264.260883] ? __kmalloc_track_caller+0x389/0x3c0 [ 264.265730] ? hwsim_new_radio_nl+0x273/0x850 [ 264.270255] ? memcpy+0x35/0x50 [ 264.273570] hwsim_new_radio_nl+0x5c3/0x850 [ 264.277899] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 264.283106] ? nla_parse+0x1b2/0x290 [ 264.286836] genl_family_rcv_msg+0x642/0xc40 [ 264.291282] ? genl_rcv+0x40/0x40 [ 264.294739] ? genl_rcv_msg+0x12f/0x160 [ 264.298726] ? __mutex_add_waiter+0x160/0x160 [ 264.303244] ? __radix_tree_lookup+0x216/0x370 [ 264.307872] genl_rcv_msg+0xbf/0x160 [ 264.311602] netlink_rcv_skb+0x160/0x440 [ 264.315669] ? genl_family_rcv_msg+0xc40/0xc40 [ 264.320258] ? netlink_ack+0xae0/0xae0 [ 264.324158] ? genl_rcv+0x15/0x40 [ 264.327655] genl_rcv+0x24/0x40 [ 264.330970] netlink_unicast+0x4d5/0x690 [ 264.335066] ? netlink_sendskb+0x110/0x110 [ 264.339313] ? _copy_from_iter_full+0x229/0x7c0 [ 264.344017] ? __phys_addr_symbol+0x2c/0x70 [ 264.348348] ? __check_object_size+0x17b/0x3d1 [ 264.352952] netlink_sendmsg+0x6bb/0xc40 [ 264.357022] ? aa_af_perm+0x230/0x230 [ 264.360833] ? nlmsg_notify+0x1a0/0x1a0 [ 264.364819] ? kernel_recvmsg+0x220/0x220 [ 264.368986] ? nlmsg_notify+0x1a0/0x1a0 [ 264.372974] sock_sendmsg+0xc3/0x120 [ 264.376727] ___sys_sendmsg+0x7bb/0x8e0 [ 264.380713] ? __lock_acquire+0x6de/0x3ff0 [ 264.384969] ? copy_msghdr_from_user+0x440/0x440 [ 264.389760] ? __fget+0x32f/0x510 [ 264.393225] ? lock_downgrade+0x720/0x720 [ 264.397391] ? check_preemption_disabled+0x41/0x280 [ 264.402426] ? check_preemption_disabled+0x41/0x280 [ 264.407487] ? __fget+0x356/0x510 [ 264.410952] ? do_dup2+0x450/0x450 [ 264.414534] ? __fdget+0x1d0/0x230 [ 264.418262] __x64_sys_sendmsg+0x132/0x220 [ 264.422508] ? __sys_sendmsg+0x1b0/0x1b0 [ 264.426587] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.431960] ? trace_hardirqs_off_caller+0x6e/0x210 [ 264.436986] ? do_syscall_64+0x21/0x620 [ 264.440970] do_syscall_64+0xf9/0x620 [ 264.444783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.449977] RIP: 0033:0x45de59 [ 264.453181] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.472099] RSP: 002b:00007f147409cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 264.479829] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 264.487377] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 264.494652] RBP: 000000000118c0b0 R08: 0000000000000000 R09: 0000000000000000 [ 264.501929] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c07c [ 264.509205] R13: 00007ffd1e5faf1f R14: 00007f147409d9c0 R15: 000000000118c07c [ 264.519898] Bluetooth: hci0: command 0x0406 tx timeout [ 264.525248] Bluetooth: hci1: command 0x0406 tx timeout [ 264.525342] Bluetooth: hci5: command 0x0406 tx timeout [ 264.536398] Bluetooth: hci2: command 0x0406 tx timeout [ 264.548929] Bluetooth: hci4: command 0x0406 tx timeout 20:26:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="0a00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:26:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 20:26:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f06", 0x89, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getrusage(0xffffffffffffffff, &(0x7f0000000000)) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:58 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) syz_mount_image$omfs(&(0x7f0000000080)='omfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000240)="8c89d90c4e9bab330685c111a7311b48138745810332fb4a91109b8980b034e2c3ae43bc7f8c002e6e6594cca98970e9dfb6654bc7abad76c486735b9a4712dc579241b865fd4256eac05871a478a3483a659b8b5a403b6181824a1e6898078ba7d8f0472545e9fe3450f7e83e384fcc72b739b49d66309ef9e8eca5b7d40703ab82f083265174e3814be080573e2d5c08aa51082ee8479b393d03fe5b57b1842a3209567110319a72136af4495bca8f0345d02ddbd109f24e3b37cc9f6bcc87ef18e04a9a217d5e49e4b3f52891730a62", 0xd1}, {&(0x7f0000000340)="603e6b155de12e7c8329e5866cf669e45d8001f081a5b2da196db1679b5f7453c56283631362cd6cbce4ec68e677bb9824d2e9578ecb91f754ad865e9f4fee414c90cde8777e5d4c2740a5b45676fd5ccaed62baf2c391cebe6f06f5f23fbab2d036b00fc9a7aeaa842ef9e1809fd241356bb67383ebc6f00bd3f438637e1396e8c10ea16757d3524bafadee3c8bae604912ca1cdec604db383e2a0202781bb75f76cd7df3f78af03c1f6da21fdc61a95196447eddd5219212175fe630f998656f59a994d08169214f331573c65e85d26452501cd6a77a9a2f9142bf210f", 0xde, 0xddaa}], 0x50011, &(0x7f0000000440)={[{'hash\x00'}, {'hash\x00'}, {}, {'sm3-generic\x00'}, {']A^}^,{'}], [{@fsuuid={'fsuuid', 0x3d, {[0x35, 0x64, 0x35, 0x38, 0x34, 0x62, 0x20, 0x35], 0x2d, [0x30, 0x64, 0x52, 0x63], 0x2d, [0x34, 0x62, 0x34, 0x66], 0x2d, [0x66, 0x36, 0x65, 0x64], 0x2d, [0x34, 0x65, 0x61, 0x33, 0x30, 0x38, 0x34, 0x33]}}}, {@dont_hash='dont_hash'}, {@fowner_gt={'fowner>', 0xee01}}, {@obj_role={'obj_role', 0x3d, 'hash\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:26:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2008}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) ioctl$UI_DEV_CREATE(r1, 0x5501) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xfd00, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0x8, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:26:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f06", 0x89, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 20:26:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="0f00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:26:58 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x20000) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000180)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) r6 = accept4$alg(r3, 0x0, 0x0, 0x40800) splice(r0, 0x0, r6, 0x0, 0x200000, 0x2) 20:26:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6e", 0x99, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x8, @time={0x70e0, 0xff}, 0x5, {0x20}, 0x21, 0x0, 0x4}) keyctl$read(0xb, r5, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 20:26:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="1400000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:26:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000180)="58a5138a5d98c857ffb301000100cf877f6273a9e2394c7abc94110db832cf96055ce4dc38c340f72e090063397ddfe2b831fd50f6d3e64769504a49456f111aa0d4ccf0e4bb4321065dda11c1fe2c71303e478b3d1fa13f3835c806b747486b9152fb0194444f4253c828775c6e624f052e9a6f5bad5773196b36d388f281", 0x7f}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x64, 0x0, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x6e}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) ioctl$TIOCEXCL(r0, 0x540c) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000700)=0x88) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000280)="89add5586552cf212df0b3b3d30f2a54599b3c20ad656990ee457b765d4660908ad58c4266efd54b9794f81be145a2286e398482ce4da258275ddf5f60fafd9b3f0ea6ffccef3b1fb9e4b56a251ca1eb1a519e613002be9a3116a546297a2e3fd652516c8ba2ea1a833a4b6565bc41ae717942e058ee686d38bb68e7dc684564db2f3d3a174b169e4ecd0fb7a4985b7a99e0cde5dba2485c2d89cfe2cd093719648758ce", 0xa4, 0x7fffffff}, {&(0x7f0000000340)="e457273b7dd9f9833587e2d11ed053f7ede2bc2a3bb6189b9938f18d2185bdb3ef7d992bd6509117378cd34a9cea1f5c99bc9ec77e3a31e1b794b360740e67eea71f43a8a4b14973afcbd66b65832ccdf759536a6852c5425adb68c2f61a21d6e6f26a110896a9b26fd53b3a936f848096ee", 0x72, 0x9}, {&(0x7f00000003c0)="308da33312398063953a20831025e013703b0f5fd51b23bc4f2707903b4dfac38bb7816e5fb13eeed935d3e00c4ccfdf887d28fc60bf05eae541e09d25f879e77207b438cc6d3248d04427b75179196d9d56e63a20a8de039bf26cf4935a4105df15a97f9b428325d8a0cd20", 0x6c, 0x5}, {&(0x7f0000000440)="5d3abc62a3ad7bd0445122ed21ffe3e718524c4440b21a52b00215637ef7dcb739d1cfe641f04a150f44dbd53a246db5b2e3eaff2be752c20e8e070f6f7f7f5bde6bcf022300983900a34176d37aaedaa777", 0x52, 0xb6e}], 0x400, &(0x7f0000000540)={[{@fat=@uid={'uid', 0x3d, 0xee00}}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@fmask={'fmask', 0x3d, 0x8001}}, {@dots='dots'}], [{@smackfshat={'smackfshat', 0x3d, 'hash\x00'}}, {@appraise_type='appraise_type=imasig'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'hash\x00'}}, {@appraise_type='appraise_type=imasig'}]}) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000600)={0x6c, 0x19, [], [@jumbo={0xc2, 0x4, 0x4}, @generic={0xff, 0xbd, "c03d5de2c937a9858762d9d1d96c388e5adab0e123f7a93537f19262e3a938729f9f01b56ddbb034ce303f3fdd1dbdd35ee377614d2fae2ab493d95a1ab3fab769eeb935ebdf5501ee802b0a2bf07662a7e45d077388defb3d80c117af7420108992d838aa08c860d8038fc8cc6ea58124abbc31f98c5e7bc77380886ca31d8db74d997b17039f378c27ef62c358ef9cca3da85d291e9ac053448fc2820049a652250dcd4d6b9510675e9d9a7807e57fe3bf2fa737aa89450518742ab6"}, @enc_lim={0x4, 0x1, 0x78}]}, 0xd0) 20:26:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8", 0x9d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 3: execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000600)='{ i\x81\x05W\xce\x87x\xcd \x00k\xc7}\x00', &(0x7f0000000140)='/proc/sysvipc/sem\x00', &(0x7f0000000180)='*\xe2\x8d\x00', &(0x7f00000001c0)='+].:\x00', &(0x7f0000000200)='(H%\x00', &(0x7f0000000240)='+/\x00', &(0x7f00000002c0)='[.\x00', &(0x7f0000000300)='+\x00', &(0x7f0000000340)='big_key\x00'], &(0x7f00000005c0)=[&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)='\x16+/&[@\x00', &(0x7f0000000500)='/proc/sysvipc/sem\x00', &(0x7f0000000540)='keyring\x00', &(0x7f0000000580)='syz']) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x80}, 0x0, 0x0, r0, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 265.048993] FAT-fs (loop5): Unrecognized mount option "smackfshat=hash" or missing value 20:26:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2300000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:26:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8", 0x9d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x110030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, 0x0, 0x0, 0x0) 20:26:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) splice(r5, 0x0, r3, 0x0, 0x300000, 0x0) [ 265.244800] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:59 executing program 2 (fault-call:3 fault-nth:0): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:26:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, 0x0, 0x0, 0x0) 20:26:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={0x1}) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) fcntl$setownex(r4, 0xf, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000240)={0x0, 0x2}) r5 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x268240, 0x0) sendfile(r1, r5, &(0x7f0000000180)=0x1ff, 0x8) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = accept4$alg(r6, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x200000, 0x0) [ 265.366723] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 265.430001] FAULT_INJECTION: forcing a failure. [ 265.430001] name failslab, interval 1, probability 0, space 0, times 0 [ 265.498235] CPU: 1 PID: 15339 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 265.506157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.515524] Call Trace: [ 265.518123] dump_stack+0x1fc/0x2fe [ 265.521936] should_fail.cold+0xa/0x14 [ 265.525841] ? setup_fault_attr+0x200/0x200 [ 265.530171] ? lock_acquire+0x170/0x3c0 [ 265.534178] __should_failslab+0x115/0x180 [ 265.538462] should_failslab+0x5/0xf [ 265.542188] kmem_cache_alloc_node+0x245/0x3b0 [ 265.546871] __alloc_skb+0x71/0x560 [ 265.550513] netlink_sendmsg+0x9ee/0xc40 [ 265.554589] ? aa_af_perm+0x230/0x230 [ 265.558404] ? nlmsg_notify+0x1a0/0x1a0 [ 265.561956] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 265.562384] ? kernel_recvmsg+0x220/0x220 [ 265.562408] ? nlmsg_notify+0x1a0/0x1a0 [ 265.579034] sock_sendmsg+0xc3/0x120 [ 265.582764] ___sys_sendmsg+0x7bb/0x8e0 [ 265.586760] ? check_preemption_disabled+0x41/0x280 [ 265.591795] ? copy_msghdr_from_user+0x440/0x440 [ 265.596591] ? __fget+0x32f/0x510 [ 265.600064] ? lock_downgrade+0x720/0x720 [ 265.604223] ? check_preemption_disabled+0x41/0x280 [ 265.609247] ? check_preemption_disabled+0x41/0x280 [ 265.609268] ? __fget+0x356/0x510 [ 265.609285] ? do_dup2+0x450/0x450 [ 265.609298] ? lock_downgrade+0x720/0x720 [ 265.609315] ? vfs_write+0x3d7/0x540 [ 265.629182] ? __fdget+0x1d0/0x230 [ 265.632739] __x64_sys_sendmsg+0x132/0x220 [ 265.637015] ? __sys_sendmsg+0x1b0/0x1b0 [ 265.641085] ? vfs_write+0x393/0x540 20:26:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2500000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:26:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:26:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r0, 0xc0245720, &(0x7f0000000300)={0x1}) vmsplice(r1, &(0x7f0000000200), 0x2d, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000410000507000000001500000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000240)={0x8, 0x81}) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000940)=@delchain={0x1148, 0x65, 0x100, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x6, 0x5}, {0x4, 0xffff}, {0x6, 0x10}}, [@TCA_CHAIN={0x8, 0xb, 0x2}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x10c4, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'veth1_virt_wifi\x00'}, @TCA_FW_POLICE={0x1098, 0x2, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x37d, 0x1f, 0x4, 0x1, 0x66, 0x7, 0x80000001, 0x5, 0xa5, 0x10001, 0x34, 0x2d7, 0x1, 0x3f, 0xa19a, 0x9, 0x200, 0x41a2, 0x200, 0x4, 0x8, 0x1, 0x1, 0x10000, 0x1, 0x800, 0x2845, 0x5, 0x7, 0x263, 0x5, 0x80000001, 0x6, 0x7, 0x1, 0xff, 0x40, 0xfffffff9, 0x1, 0x9, 0x0, 0x7fffffff, 0x1ff, 0x4, 0x5, 0x6, 0x7, 0x2, 0x65f333b0, 0x3, 0x3, 0xdc, 0x101, 0x8, 0x80, 0x81, 0x9, 0x1f, 0x5, 0xbfbd, 0x3e, 0x1, 0xd0, 0x9, 0x5, 0x9, 0x1, 0x2, 0x5, 0x8, 0x0, 0xfffffffc, 0x401, 0x14, 0x5, 0xfff, 0x2, 0x4, 0x3, 0x0, 0xafa, 0x9, 0xb, 0x1, 0x5, 0x8, 0xc2, 0x401, 0x0, 0x80000000, 0xfffffff8, 0x0, 0x7fff, 0x8000, 0x3d, 0x4, 0xb0, 0xfffffff7, 0x80, 0x1, 0x9, 0x80000001, 0x7, 0x7fff, 0x8, 0xaaf, 0x1ff, 0x3, 0x7, 0x1, 0x9, 0xffff66e4, 0x6, 0x83d, 0x9, 0xffffffff, 0x71, 0x1000, 0x2, 0xff, 0x6, 0xfffffffd, 0x7, 0x4, 0x1, 0x408000, 0xfffffffb, 0x80000001, 0x0, 0xffffffff, 0x5, 0x5d, 0x0, 0xfffffffd, 0x8, 0x1, 0x7f, 0x3, 0x20, 0x2, 0x9, 0x100, 0x81, 0xc161, 0x3, 0x2, 0x9, 0x401, 0x7, 0x4, 0x453, 0x7, 0x0, 0x5, 0x3, 0x40, 0x32dc6a47, 0xfff, 0x7, 0x1, 0x7db21bb5, 0x9, 0x6, 0x5, 0xff9, 0x1, 0x3, 0x400, 0xa0, 0x5, 0x18e8d3be, 0x10001, 0x80000000, 0x4, 0x2, 0x4, 0x2, 0x0, 0x101, 0x5, 0x1, 0x9, 0x8, 0x7, 0xfffffe00, 0x1f, 0x6, 0x7fffffff, 0x81, 0xa6, 0x0, 0x6, 0x10001, 0x8001, 0x7, 0xfffffff7, 0x3, 0x1, 0x8001, 0x4, 0x100, 0x1f, 0xffffffff, 0xad, 0x9, 0xffffffff, 0x10000, 0x9, 0x8001, 0xffff1890, 0x0, 0x3, 0x9, 0x3, 0x7, 0x26c53bca, 0x1, 0xc63d, 0x1, 0x8, 0xfdc7, 0x1, 0x0, 0xfff, 0x80000000, 0xffff, 0x3, 0x200, 0x4dcaf85, 0x0, 0x0, 0x5, 0x80000000, 0x2, 0x4, 0x3, 0x1ce, 0x4, 0x1, 0x7ff, 0x3, 0x9, 0x1, 0x800, 0x0, 0xf927, 0x80000001, 0xe4, 0x6, 0x2, 0xfffffff7, 0x4, 0x5, 0x100, 0x0, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x0, 0x101, 0x3, 0xeb0a, {0x2, 0x0, 0x40, 0x2, 0x6, 0x3ff}, {0x2, 0x1, 0x20, 0x0, 0x1ef, 0x2}, 0x20, 0x0, 0x5}}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0xfffffffb, 0x8, 0x1, 0x81, 0xffffffd5, 0x0, 0x9, 0x80000000, 0x1, 0x9, 0x400, 0x5, 0x916f, 0x3, 0x0, 0x10000, 0x7e7, 0x8001, 0xfffffffa, 0x5f7e, 0x3, 0x4, 0x9, 0x65c4, 0x9, 0xffff, 0x5, 0x1, 0x8, 0x4, 0x5, 0x7fffffff, 0x1f, 0x1, 0xffffff80, 0x4, 0x9e06, 0x5, 0x0, 0xfff, 0xfffffffd, 0x5, 0x6, 0x20, 0x3ff, 0x8001, 0x17bf, 0x5, 0x4, 0xfffffff7, 0xffffffd1, 0x8, 0x9106, 0x1, 0x2, 0xf5, 0x401, 0x7, 0x40, 0x7fb, 0x1, 0x8000, 0x5, 0x8, 0xff, 0x3, 0x6, 0x1, 0x1, 0x1414, 0x7ff, 0x5, 0x9, 0x4, 0x100, 0x0, 0x5, 0x101, 0x7, 0x7, 0x9, 0x4, 0x1f, 0x9, 0x8001, 0x6b9f810d, 0x7, 0x7, 0x6, 0xd261, 0xfffffffd, 0xffffff34, 0x4, 0x7d, 0xe33e, 0xfffff001, 0x7f, 0x1, 0x7f, 0x2, 0x1, 0x8, 0x4000, 0x5, 0x7, 0x81, 0x8, 0x5b, 0x4001, 0x401, 0x742, 0x7, 0xd905, 0x1, 0x0, 0x8a27, 0x6, 0x997, 0x2, 0x1, 0x800, 0x100, 0x80, 0x5, 0x7fff, 0x800, 0xff, 0x80, 0xc6, 0x7, 0x1, 0x2, 0xfffffffd, 0x0, 0x1000, 0x101, 0xffff8000, 0x0, 0xd5, 0x0, 0x20200, 0x400, 0x3, 0x40, 0x401, 0x8, 0x6, 0x4, 0x2, 0x7, 0xfffffff9, 0x1000, 0xffff, 0x0, 0x2, 0xbc, 0xff, 0x4, 0xc1, 0x3, 0x6, 0x8000, 0x180, 0x3, 0x100, 0x10000, 0x80000001, 0x40, 0x0, 0x101, 0x80000001, 0x68cc, 0x4, 0x0, 0x7, 0x8, 0x4, 0x5, 0x38, 0x10000, 0xfffffeff, 0x641b, 0x40, 0x1f, 0x0, 0x7, 0x8, 0x401, 0x5, 0x3f, 0x1, 0x800, 0x9, 0x1, 0x7, 0x10001, 0x1, 0xcf6, 0x3, 0x6, 0x6, 0x1, 0x3, 0x1ba67bdc, 0x4, 0x2, 0x8, 0xb5, 0x7, 0x1ff, 0x3, 0x1, 0x10001, 0x0, 0x3, 0x6dc, 0x7, 0x10001, 0xd5d, 0x8, 0x1, 0x2ce, 0x2, 0x2, 0x0, 0xff, 0x4, 0x8, 0x7, 0x1, 0x9, 0x53d, 0x1800, 0x2, 0x4, 0x9, 0x60, 0x1, 0x200, 0x7, 0x9, 0x0, 0x2, 0x0, 0x2, 0x3, 0xfff, 0x7, 0x81, 0x0, 0x1, 0x2, 0x5, 0x5, 0x3]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x46c, 0x0, 0x8, 0x9, 0x8001, {0x81, 0x1, 0x2, 0x40, 0x8000, 0x4}, {0x1, 0x2, 0x1, 0x4, 0xd5d7, 0x4e}, 0xffffffc1, 0x4aad, 0x3}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x800, 0x0, 0x8, 0x0, 0x4, 0x5, 0x7, 0x8, 0xd1d0, 0x1f, 0x4f4, 0x80000000, 0xfff, 0x7, 0x20, 0x1, 0xd67, 0x7, 0x0, 0x7, 0xffffffff, 0x1137, 0x385b, 0x8000, 0x40, 0xffff, 0x6, 0x5, 0xfffffffc, 0x4, 0x4, 0x80000000, 0x1, 0xffffffff, 0x2, 0xfffffffb, 0x80, 0x7, 0x4bd8, 0x7, 0x1ff, 0x36, 0x6, 0x8, 0x6, 0x5, 0x7, 0x0, 0xe49, 0x1d83, 0x6, 0x10001, 0x7, 0x2039, 0xff, 0x40b8, 0x2198, 0xd66f, 0x1, 0x7, 0x5, 0x2, 0x8, 0x63ff76, 0x4, 0x5, 0x80000001, 0x6, 0xfffffffc, 0xdb1df4f5, 0x4, 0x400, 0xffffff91, 0x7, 0x401, 0x1, 0x3, 0x40, 0x3, 0x6, 0x4, 0x2, 0x20, 0x1, 0x6, 0x0, 0x0, 0x8000, 0x3ff, 0x1, 0x1, 0x5, 0x8, 0x81, 0x1, 0x7, 0x99d, 0xfffffff8, 0x5, 0x2, 0xffffffff, 0x1, 0x80000000, 0x800, 0x6, 0xba1, 0x1000, 0x8da, 0x8, 0x7, 0x32d4, 0x9, 0x5, 0x1f, 0x5, 0x0, 0x400, 0x8, 0x0, 0x80000000, 0x7fff, 0x7ff, 0xffff, 0x5, 0x20, 0x5, 0x882d, 0x3, 0x7, 0xce3, 0xf5, 0xe7a, 0x2, 0x6, 0x8, 0x8, 0x4, 0x6, 0x4, 0xc68, 0x9, 0x2, 0x1ff, 0x46c, 0x8, 0x9f, 0x1, 0x5, 0xf86, 0x80000000, 0x7f, 0x6, 0x4, 0x8, 0x3, 0x5, 0x7, 0x5, 0x4, 0x1, 0xbd14, 0xff, 0x200, 0x0, 0x20, 0x7ff, 0xf1, 0x0, 0x400000, 0x9, 0x4b, 0x1, 0x3ff, 0x6, 0x8000, 0x2, 0x5e01, 0x2, 0x7f, 0xfff, 0x9, 0xfffffffb, 0x9, 0x5, 0xfffffff7, 0x0, 0x6, 0x401, 0x2, 0x1f, 0x0, 0x414a, 0x0, 0x400, 0xfffffffc, 0x101, 0xb5, 0x6, 0x10000, 0x805, 0x0, 0xfff, 0xfb5, 0x3, 0x1, 0x2, 0xe3, 0x2, 0xb6, 0x0, 0x2, 0x101, 0x5, 0x400, 0xffff, 0x7, 0x7, 0x6, 0x5, 0x1000, 0x0, 0x7fff, 0x9, 0x58, 0xfc, 0x8, 0x64b0, 0x1cf3, 0x9, 0x47ae, 0x7ff, 0x65f83f75, 0x0, 0x2, 0xff, 0x7fff, 0x100, 0x3, 0x4, 0x7, 0x9, 0x2, 0x1, 0x1000, 0x2, 0x7a, 0x1000, 0x1, 0x5, 0x400, 0x7ff, 0x4, 0x3f, 0xf96, 0x3f, 0x79]}, @TCA_POLICE_RATE={0x404, 0x2, [0x15aa, 0x10000, 0x1, 0x31, 0x101, 0x20, 0x990c, 0x3, 0x3, 0x6, 0x0, 0xff0f, 0xffffffff, 0xa5c5, 0x401, 0x770, 0x9, 0x2, 0x4dc, 0x4a2645c3, 0x2f42, 0x3, 0x42, 0xb81d, 0x6, 0x5, 0x3f, 0x81, 0x0, 0x7, 0x7f, 0x0, 0x0, 0x40, 0x1da, 0x7fff, 0x5, 0x5, 0x7, 0xd61, 0x9, 0x5, 0x6, 0x80000001, 0x7, 0x0, 0x7fffffff, 0x6ac4, 0x40, 0xffff, 0xfffff078, 0x786, 0x8, 0x7, 0xd3, 0x9, 0x7, 0x3, 0x7ff, 0x4, 0x1ff, 0x1, 0xffff, 0x7, 0x8, 0x7, 0x5009, 0x1, 0x3f, 0x20, 0x530, 0x4, 0x8663, 0x3, 0x10000, 0x7fffffff, 0xff, 0x0, 0xfffffffd, 0xfffffffb, 0xe02, 0x8d28, 0x228, 0x800, 0x6, 0x4, 0x40, 0x0, 0xfffff801, 0x80000000, 0x80, 0x3, 0x1, 0xfff, 0xffffaeee, 0x6, 0x7fff, 0x2, 0x1000, 0x653d, 0x1, 0xfff, 0x0, 0x0, 0x101, 0x80000000, 0xfff, 0x1, 0x2f2, 0x80000000, 0x9, 0x1, 0x94e, 0x9, 0x6, 0x3, 0xfffeffff, 0x5, 0x80000001, 0x4, 0x8001, 0x2, 0x9, 0x7, 0x1296ca97, 0x4, 0x400000, 0x8, 0x400, 0x3, 0xffffffff, 0x7ff, 0xfff, 0x80000001, 0x140, 0x8, 0xffff, 0x8000, 0x0, 0x80000001, 0x20, 0x8000, 0x5, 0x6, 0x6, 0xffff, 0x1, 0x89, 0x8, 0x7f, 0x401, 0x3d9, 0x1, 0x5, 0x5, 0x6, 0x0, 0x2, 0x3277, 0x5, 0x400, 0x3ff, 0x7fff, 0x4f06, 0x5, 0x40, 0x7fff, 0x10001, 0x1000, 0x6, 0x4, 0x55c, 0x17337895, 0xa77, 0x8, 0x3, 0x20, 0x7fffffff, 0x5, 0x3, 0x9, 0x1000, 0x2, 0x5, 0xffff8000, 0x9, 0x2, 0x7, 0x3, 0x2, 0x6, 0x0, 0x2, 0xfffffffb, 0x9, 0x3, 0x400, 0x5, 0x2, 0x7, 0x2, 0x7, 0x5, 0x3, 0x8000, 0x7, 0x51, 0x37, 0x4, 0xffffffff, 0x7ff, 0x2, 0x7fff, 0x3f, 0x7, 0x0, 0x8, 0x8, 0x10000, 0xffffb305, 0x7, 0x1010000, 0x7fffffff, 0x5, 0xe27, 0x3a2, 0x4, 0x1, 0x8000, 0x9, 0x0, 0x1, 0x6, 0xd0, 0x6, 0x21, 0x474, 0x4, 0x5c9c, 0x2aa96923, 0x80, 0x10001, 0x2, 0x2, 0xe6, 0x80000000, 0xfffffffb, 0x8, 0x80, 0x6, 0x5, 0x7, 0x6, 0x401, 0xfffffffe, 0x212c]}]}, @TCA_FW_INDEV={0x14, 0x3, 'geneve0\x00'}]}}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0xc, 0x2, [@TCA_BPF_CLASSID={0x8, 0x3, {0x1, 0x9}}]}}, @TCA_CHAIN={0x8, 0xb, 0x2}, @filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x24, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x5}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x1, 0x7}}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x0, 0xb}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x5}]}}]}, 0x1148}}, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000380)={{}, 0x12, 0x6, 0x8}, 0x18) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000880)=ANY=[@ANYBLOB="840000002c00070d0000000000000000000000f7", @ANYRES32, @ANYBLOB="00000000000000000c000000080001007533320058000200400006003c000100000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000014000500"/108], 0x84}}, 0x0) r8 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r8, 0x0, 0x200000, 0x0) [ 265.644819] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.650195] ? trace_hardirqs_off_caller+0x6e/0x210 [ 265.655221] ? do_syscall_64+0x21/0x620 [ 265.659209] do_syscall_64+0xf9/0x620 [ 265.663032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.668231] RIP: 0033:0x45de59 [ 265.671427] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.678570] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) r0 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000240)="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", 0x49, 0x0) keyctl$read(0xb, r0, &(0x7f0000001480)=""/4104, 0x1008) 20:26:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={0x1}) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) [ 265.690355] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.690370] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 265.690378] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 265.690387] RBP: 00007f109a75fca0 R08: 0000000000000000 R09: 0000000000000000 [ 265.690395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 265.690403] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={0x1}) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:27:00 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) futex(&(0x7f0000000080)=0x1, 0x8b, 0x2, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f00000001c0)=0x5, 0x2) 20:27:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:00 executing program 2 (fault-call:3 fault-nth:1): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2a00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2500000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xff, 0x100) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x2, 0x3, 0x4, 0x2, 0x2, {}, {0x5, 0x3, 0xe4, 0xee, 0x0, 0x4, "54069ecc"}, 0x1ff, 0x4, @fd=r2, 0x200, 0x0, r4}) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x1, 0x0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:00 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)='\x00', 0x1}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x2) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 266.126833] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.148622] FAULT_INJECTION: forcing a failure. [ 266.148622] name failslab, interval 1, probability 0, space 0, times 0 [ 266.173812] CPU: 1 PID: 15416 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 266.181927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.192529] Call Trace: [ 266.192551] dump_stack+0x1fc/0x2fe [ 266.192573] should_fail.cold+0xa/0x14 [ 266.192589] ? setup_fault_attr+0x200/0x200 [ 266.192602] ? lock_acquire+0x170/0x3c0 [ 266.192625] __should_failslab+0x115/0x180 [ 266.192643] should_failslab+0x5/0xf [ 266.218920] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 266.224053] __kmalloc_node_track_caller+0x38/0x70 [ 266.225989] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 266.228996] __alloc_skb+0xae/0x560 [ 266.229017] netlink_sendmsg+0x9ee/0xc40 [ 266.229046] ? aa_af_perm+0x230/0x230 [ 266.249011] ? nlmsg_notify+0x1a0/0x1a0 [ 266.253041] ? kernel_recvmsg+0x220/0x220 [ 266.257213] ? nlmsg_notify+0x1a0/0x1a0 [ 266.261200] sock_sendmsg+0xc3/0x120 [ 266.264931] ___sys_sendmsg+0x7bb/0x8e0 [ 266.268919] ? check_preemption_disabled+0x41/0x280 [ 266.268937] ? copy_msghdr_from_user+0x440/0x440 [ 266.268953] ? __fget+0x32f/0x510 [ 266.268971] ? lock_downgrade+0x720/0x720 [ 266.286331] ? check_preemption_disabled+0x41/0x280 [ 266.291362] ? check_preemption_disabled+0x41/0x280 [ 266.296397] ? __fget+0x356/0x510 [ 266.299873] ? do_dup2+0x450/0x450 [ 266.300830] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.303420] ? lock_downgrade+0x720/0x720 [ 266.303438] ? vfs_write+0x3d7/0x540 [ 266.303455] ? __fdget+0x1d0/0x230 [ 266.303474] __x64_sys_sendmsg+0x132/0x220 [ 266.303490] ? __sys_sendmsg+0x1b0/0x1b0 [ 266.332011] ? vfs_write+0x393/0x540 [ 266.335755] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.341131] ? trace_hardirqs_off_caller+0x6e/0x210 [ 266.346156] ? do_syscall_64+0x21/0x620 [ 266.350167] do_syscall_64+0xf9/0x620 [ 266.354073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.359264] RIP: 0033:0x45de59 20:27:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2b00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:00 executing program 0 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 266.362466] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.381459] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 266.389181] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 266.396462] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 266.403771] RBP: 00007f109a75fca0 R08: 0000000000000000 R09: 0000000000000000 [ 266.411054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.418345] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:00 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x109001, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x202c00, 0x64) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r6, r5, &(0x7f00000000c0)=0x800007, 0x5) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000240)={0x1, 0x4f, "1b8ff22bd0a14730b04ee498f529d15d61d510b2c941651834d59ae026b656f0b94666af0b8281eca87bec3781e25f56ce6b7bacdeb7500e8a990f998d1cdd76dfa0ce1efe6aba157eb317e27b1bc6"}) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 266.531077] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:00 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self\x00', 0x20300, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000240)={{0x0, 0x6c, 0x77, 0x1, 0x60000, 0x6, 0x200, 0x1, 0x9df, 0x2c, 0x80000000, 0x1ff, 0xfffffffffffffffe, 0x1, 0x7}, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 20:27:00 executing program 3: ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000900)={0x8, 'veth0_vlan\x00', {'ipvlan0\x00'}, 0xf055}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000000)={0x9, 0x1, 0x3, 0x1b05, 0x81, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000005080)={&(0x7f0000004e40)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000005040)={&(0x7f0000004e80)={0x188, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfff, 0x5}}}}, [@NL80211_ATTR_IE_ASSOC_RESP={0x15f, 0x80, [@perr={0x84, 0x11c, {0x3, 0x12, [@ext={{}, @device_b, 0x80, @device_b, 0x16}, @ext={{}, @broadcast, 0x4, @device_b, 0x1a}, @ext={{}, @broadcast, 0x0, @broadcast, 0x1}, @not_ext={{}, @device_b, 0xffffffff, "", 0xe}, @ext={{}, @device_a, 0x8, @broadcast, 0x3f}, @not_ext={{}, @device_a, 0xaa, "", 0x3a}, @ext={{}, @broadcast, 0x3, @device_b, 0x34}, @not_ext={{}, @broadcast, 0x5, "", 0x41}, @ext={{}, @broadcast, 0x1ff, @device_a, 0xc}, @not_ext={{}, @broadcast, 0x6, "", 0xc}, @not_ext={{}, @broadcast, 0x4, "", 0xc}, @not_ext={{}, @device_a, 0x7, "", 0x21}, @ext={{}, @broadcast, 0x1, @broadcast}, @not_ext={{}, @broadcast, 0x8, "", 0xa}, @ext={{}, @broadcast, 0x5, @broadcast, 0x3f}, @not_ext={{}, @broadcast, 0xffffffff, "", 0x36}, @not_ext={{}, @device_b, 0x8, "", 0x2}, @not_ext={{}, @device_b, 0x6, "", 0x19}]}}, @preq={0x82, 0x3b, @not_ext={{0x0, 0x1, 0x1}, 0x6, 0x40, 0xffff, @device_a, 0x6, "", 0x3, 0x1, 0x3, [{{}, @device_a, 0x380}, {{0x0, 0x0, 0x1}, @device_a, 0xfffffffc}, {{0x0, 0x0, 0x1}, @device_a, 0x4c}]}}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) r4 = accept4(r0, &(0x7f0000000100)=@xdp, &(0x7f0000000080)=0x80, 0x80000) recvmmsg(r4, &(0x7f0000004c40)=[{{&(0x7f0000000180)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000200)=""/123, 0x7b}, {&(0x7f00000002c0)=""/210, 0xd2}, {&(0x7f00000003c0)=""/125, 0x7d}, {&(0x7f0000000500)=""/117, 0x75}, {&(0x7f0000000580)=""/66, 0x42}, {&(0x7f0000000440)=""/53, 0x35}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000640)=""/79, 0x4f}], 0x8}, 0x8}, {{&(0x7f0000000740)=@caif=@dgm, 0x80, &(0x7f0000000980)=[{&(0x7f00000007c0)=""/216, 0xd8}, {&(0x7f0000000a80)=""/151, 0x97}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000b40)=""/219, 0xdb}, {&(0x7f0000000c40)=""/239, 0xef}, {&(0x7f00000024c0)=""/4096, 0x1000}], 0x6, &(0x7f0000000900)}, 0x8}, {{&(0x7f0000000d40)=@un=@abs, 0x80, &(0x7f0000001140)=[{&(0x7f0000000dc0)=""/53, 0x35}, {&(0x7f0000000e00)=""/26, 0x1a}, {&(0x7f0000000e40)=""/158, 0x9e}, {&(0x7f0000000f00)=""/23, 0x17}, {&(0x7f0000000f40)=""/186, 0xba}, {&(0x7f0000001000)=""/2, 0x2}, {&(0x7f0000001040)=""/135, 0x87}, {&(0x7f0000001100)=""/19, 0x13}], 0x8, &(0x7f00000011c0)=""/96, 0x60}, 0x9}, {{&(0x7f0000001240)=@xdp, 0x80, &(0x7f00000035c0)=[{&(0x7f00000012c0)=""/11, 0xb}, {&(0x7f0000001300)=""/131, 0x83}, {&(0x7f00000013c0)=""/144, 0x90}, {&(0x7f00000034c0)=""/109, 0x6d}, {&(0x7f0000003540)=""/78, 0x4e}], 0x5, &(0x7f0000003640)=""/49, 0x31}, 0x39f}, {{&(0x7f0000003680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000047c0)=[{&(0x7f0000003700)=""/1, 0x1}, {&(0x7f0000003740)=""/4096, 0x1000}, {&(0x7f0000004740)=""/99, 0x63}], 0x3, &(0x7f0000004800)=""/55, 0x37}, 0xfffffffe}, {{0x0, 0x0, &(0x7f0000004a00)=[{&(0x7f0000004840)=""/112, 0x70}, {&(0x7f00000048c0)=""/46, 0x2e}, {&(0x7f0000004900)=""/229, 0xe5}], 0x3, &(0x7f0000004a40)=""/76, 0x4c}}, {{0x0, 0x0, &(0x7f0000004c00)=[{&(0x7f0000004ac0)=""/130, 0x82}, {&(0x7f0000004b80)=""/74, 0x4a}], 0x2}, 0x4}], 0x7, 0x142, &(0x7f0000004e00)={0x77359400}) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) [ 266.638815] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x2, r1, 0x0, 0x0) 20:27:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:01 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000240)) 20:27:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x3, r1, 0x0, 0x0) 20:27:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2d00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f00000001c0)=0x81, 0x4) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x28, r8, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x48, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x0, 0x30}}}}, [@NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x5}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x78}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x34}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4040801) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r10, r9, &(0x7f00000000c0)=0x800007, 0x5) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r9, 0xf505, 0x0) sendfile(r4, r2, &(0x7f00000000c0)=0x800007, 0x5) sendmsg$NL80211_CMD_DISCONNECT(r2, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000080) [ 267.221888] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 267.245032] CPU: 1 PID: 15494 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 267.252956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.262318] Call Trace: [ 267.264925] dump_stack+0x1fc/0x2fe [ 267.268574] sysfs_warn_dup.cold+0x1c/0x2d [ 267.272820] sysfs_do_create_link_sd+0x116/0x130 [ 267.277612] sysfs_create_link+0x5f/0xc0 [ 267.281682] device_add+0x7d1/0x16d0 [ 267.285409] ? device_check_offline+0x280/0x280 [ 267.290088] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 267.295383] wiphy_register+0x1664/0x2130 [ 267.299571] ? bm_init+0x612/0x950 [ 267.303121] ? wiphy_unregister+0xea0/0xea0 [ 267.307460] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 267.312485] ? __kmalloc+0x38e/0x3c0 [ 267.316201] ? ieee80211_cs_list_valid+0x199/0x280 [ 267.321143] ieee80211_register_hw+0x13a7/0x3410 [ 267.325921] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 267.330861] ? memset+0x20/0x40 [ 267.334143] ? __hrtimer_init+0xe9/0x1d0 [ 267.338213] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 267.343332] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 267.348392] ? hwsim_mcast_del_radio+0x230/0x230 [ 267.353152] ? __kmalloc_track_caller+0x389/0x3c0 [ 267.358003] ? hwsim_new_radio_nl+0x273/0x850 [ 267.362502] ? memcpy+0x35/0x50 [ 267.365796] hwsim_new_radio_nl+0x5c3/0x850 [ 267.370125] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 267.375351] ? nla_parse+0x1b2/0x290 [ 267.379072] genl_family_rcv_msg+0x642/0xc40 [ 267.383514] ? genl_rcv+0x40/0x40 [ 267.386998] ? genl_rcv_msg+0x12f/0x160 [ 267.390979] ? __mutex_add_waiter+0x160/0x160 [ 267.395491] ? __radix_tree_lookup+0x216/0x370 [ 267.400089] genl_rcv_msg+0xbf/0x160 [ 267.403943] netlink_rcv_skb+0x160/0x440 [ 267.408020] ? genl_family_rcv_msg+0xc40/0xc40 [ 267.413184] ? netlink_ack+0xae0/0xae0 [ 267.417173] ? genl_rcv+0x15/0x40 [ 267.420636] genl_rcv+0x24/0x40 [ 267.423922] netlink_unicast+0x4d5/0x690 [ 267.427994] ? netlink_sendskb+0x110/0x110 [ 267.432259] ? _copy_from_iter_full+0x229/0x7c0 [ 267.436933] ? __phys_addr_symbol+0x2c/0x70 [ 267.441273] ? __check_object_size+0x17b/0x3d1 [ 267.445877] netlink_sendmsg+0x6bb/0xc40 [ 267.449959] ? aa_af_perm+0x230/0x230 [ 267.453765] ? nlmsg_notify+0x1a0/0x1a0 [ 267.457744] ? kernel_recvmsg+0x220/0x220 [ 267.461910] ? nlmsg_notify+0x1a0/0x1a0 [ 267.465898] sock_sendmsg+0xc3/0x120 [ 267.469714] ___sys_sendmsg+0x7bb/0x8e0 [ 267.473698] ? __lock_acquire+0x6de/0x3ff0 [ 267.477972] ? copy_msghdr_from_user+0x440/0x440 [ 267.482741] ? __fget+0x32f/0x510 [ 267.486232] ? lock_downgrade+0x720/0x720 [ 267.490390] ? check_preemption_disabled+0x41/0x280 [ 267.495417] ? check_preemption_disabled+0x41/0x280 [ 267.500625] ? __fget+0x356/0x510 [ 267.504118] ? do_dup2+0x450/0x450 [ 267.507673] ? __fdget+0x1d0/0x230 [ 267.511222] __x64_sys_sendmsg+0x132/0x220 [ 267.515464] ? __sys_sendmsg+0x1b0/0x1b0 [ 267.519545] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.524929] ? trace_hardirqs_off_caller+0x6e/0x210 [ 267.529963] ? do_syscall_64+0x21/0x620 [ 267.533955] do_syscall_64+0xf9/0x620 [ 267.537778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.542978] RIP: 0033:0x45de59 [ 267.546179] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.565105] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 267.573091] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 267.580366] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 267.587908] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 267.595181] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 267.602454] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x4, r1, 0x0, 0x0) [ 267.641129] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:01 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000480)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r3, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, r5, 0x400, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x9f3, 0x8}}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x2400}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8, 0x2, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x6000c840) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r7 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r7, 0x8008f513, &(0x7f0000000580)) r8 = accept4(r2, 0x0, 0x0, 0x0) r9 = accept4$alg(r8, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x200000, 0x0) r10 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x100, 0x0) ioctl$KVM_GET_IRQCHIP(r10, 0xc208ae62, &(0x7f0000000240)) 20:27:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x5, r1, 0x0, 0x0) [ 267.852142] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 267.886036] CPU: 1 PID: 15537 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 267.893959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.903355] Call Trace: [ 267.905961] dump_stack+0x1fc/0x2fe [ 267.909609] sysfs_warn_dup.cold+0x1c/0x2d [ 267.913856] sysfs_do_create_link_sd+0x116/0x130 [ 267.918629] sysfs_create_link+0x5f/0xc0 [ 267.922703] device_add+0x7d1/0x16d0 [ 267.926432] ? device_check_offline+0x280/0x280 [ 267.931117] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 267.936410] wiphy_register+0x1664/0x2130 [ 267.940575] ? bm_init+0x612/0x950 [ 267.944130] ? wiphy_unregister+0xea0/0xea0 [ 267.948472] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 267.953499] ? __kmalloc+0x38e/0x3c0 [ 267.957228] ? ieee80211_cs_list_valid+0x199/0x280 [ 267.962174] ieee80211_register_hw+0x13a7/0x3410 [ 267.966950] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 267.971891] ? memset+0x20/0x40 [ 267.975178] ? __hrtimer_init+0xe9/0x1d0 [ 267.979249] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 267.984367] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 267.989410] ? hwsim_mcast_del_radio+0x230/0x230 [ 267.994180] ? __kmalloc_track_caller+0x389/0x3c0 [ 267.999032] ? hwsim_new_radio_nl+0x273/0x850 [ 268.003538] ? memcpy+0x35/0x50 [ 268.006836] hwsim_new_radio_nl+0x5c3/0x850 [ 268.011182] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 268.016400] ? nla_parse+0x1b2/0x290 [ 268.020233] genl_family_rcv_msg+0x642/0xc40 [ 268.024658] ? genl_rcv+0x40/0x40 [ 268.028143] ? genl_rcv_msg+0x12f/0x160 [ 268.032126] ? __mutex_add_waiter+0x160/0x160 [ 268.036641] ? __radix_tree_lookup+0x216/0x370 [ 268.041261] genl_rcv_msg+0xbf/0x160 [ 268.044994] netlink_rcv_skb+0x160/0x440 [ 268.049073] ? genl_family_rcv_msg+0xc40/0xc40 [ 268.053661] ? netlink_ack+0xae0/0xae0 [ 268.057561] ? genl_rcv+0x15/0x40 [ 268.061037] genl_rcv+0x24/0x40 [ 268.064326] netlink_unicast+0x4d5/0x690 [ 268.068408] ? netlink_sendskb+0x110/0x110 [ 268.072650] ? _copy_from_iter_full+0x229/0x7c0 [ 268.077325] ? __phys_addr_symbol+0x2c/0x70 [ 268.081655] ? __check_object_size+0x17b/0x3d1 [ 268.086537] netlink_sendmsg+0x6bb/0xc40 [ 268.090614] ? aa_af_perm+0x230/0x230 [ 268.094423] ? nlmsg_notify+0x1a0/0x1a0 [ 268.098406] ? kernel_recvmsg+0x220/0x220 [ 268.102579] ? nlmsg_notify+0x1a0/0x1a0 [ 268.106654] sock_sendmsg+0xc3/0x120 [ 268.110382] ___sys_sendmsg+0x7bb/0x8e0 [ 268.114390] ? __lock_acquire+0x6de/0x3ff0 [ 268.118649] ? copy_msghdr_from_user+0x440/0x440 [ 268.123537] ? __fget+0x32f/0x510 [ 268.127034] ? lock_downgrade+0x720/0x720 [ 268.131195] ? check_preemption_disabled+0x41/0x280 [ 268.136225] ? check_preemption_disabled+0x41/0x280 [ 268.141257] ? __fget+0x356/0x510 [ 268.144742] ? do_dup2+0x450/0x450 [ 268.148298] ? __fdget+0x1d0/0x230 [ 268.151866] __x64_sys_sendmsg+0x132/0x220 [ 268.156130] ? __sys_sendmsg+0x1b0/0x1b0 [ 268.160222] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.165598] ? trace_hardirqs_off_caller+0x6e/0x210 [ 268.170666] ? do_syscall_64+0x21/0x620 [ 268.174660] do_syscall_64+0xf9/0x620 [ 268.178481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.183679] RIP: 0033:0x45de59 20:27:02 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x7, 0x4, 0x8, 0x0, 0x2, 0x6, 0x1, 0x2d, 0x40, 0xf0, 0x4, 0x5, 0x38, 0x1, 0x2276, 0x6, 0x3}, [{0x4, 0x1, 0x5, 0x40, 0xffffffffffffffff, 0x6, 0x5}, {0x2, 0x96f, 0xffffffffffffcb9d, 0x8001, 0x1, 0x40, 0x3, 0x20}], "fedf1940499adee7e4a485ad2fa0580873db50a352ac661e8b18796a7360a78233fa1f82ce2785382cb0ae992a2b631f7d2d27be2025dd1dad1432078189b3272e3e2258fed9c85ad78f1e1bc748df570981d4f24d39931c466bef770f4377095db5f6a78cc963c470f9f9fc97f04bb57e7e35f6a75a12d7fb12bf9d55c395d347362a53004f3e2edf", [[], [], []]}, 0x439) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00eth\x00'/20], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002d006d54007a08b267ae3604b5000000", @ANYRES32=r4], 0x24}}, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r4}, 0x10) 20:27:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="3000000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 268.187090] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.206004] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 268.213724] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 268.221183] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 268.228481] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 268.235754] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 268.243029] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x6, r1, 0x0, 0x0) 20:27:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x7, r1, 0x0, 0x0) [ 268.417081] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 268.431042] CPU: 0 PID: 15552 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 268.438945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.448307] Call Trace: [ 268.450929] dump_stack+0x1fc/0x2fe [ 268.454570] sysfs_warn_dup.cold+0x1c/0x2d [ 268.458812] sysfs_do_create_link_sd+0x116/0x130 [ 268.463578] sysfs_create_link+0x5f/0xc0 [ 268.467649] device_add+0x7d1/0x16d0 [ 268.471378] ? device_check_offline+0x280/0x280 [ 268.476058] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 268.481443] wiphy_register+0x1664/0x2130 [ 268.485698] ? bm_init+0x612/0x950 [ 268.489250] ? wiphy_unregister+0xea0/0xea0 [ 268.493606] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 268.498625] ? __kmalloc+0x38e/0x3c0 [ 268.502346] ? ieee80211_cs_list_valid+0x199/0x280 [ 268.507287] ieee80211_register_hw+0x13a7/0x3410 [ 268.512146] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 268.517083] ? memset+0x20/0x40 [ 268.520458] ? __hrtimer_init+0xe9/0x1d0 [ 268.524551] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 268.529663] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 268.534705] ? hwsim_mcast_del_radio+0x230/0x230 [ 268.539472] ? __kmalloc_track_caller+0x389/0x3c0 [ 268.544322] ? hwsim_new_radio_nl+0x273/0x850 [ 268.548851] ? memcpy+0x35/0x50 [ 268.552143] hwsim_new_radio_nl+0x5c3/0x850 [ 268.556478] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 268.561684] ? nla_parse+0x1b2/0x290 [ 268.565453] genl_family_rcv_msg+0x642/0xc40 [ 268.570227] ? genl_rcv+0x40/0x40 [ 268.573685] ? genl_rcv_msg+0x12f/0x160 [ 268.577667] ? __mutex_add_waiter+0x160/0x160 [ 268.582183] ? __radix_tree_lookup+0x216/0x370 [ 268.586792] genl_rcv_msg+0xbf/0x160 [ 268.590516] netlink_rcv_skb+0x160/0x440 [ 268.594589] ? genl_family_rcv_msg+0xc40/0xc40 [ 268.599179] ? netlink_ack+0xae0/0xae0 [ 268.603088] ? genl_rcv+0x15/0x40 [ 268.606588] genl_rcv+0x24/0x40 [ 268.610039] netlink_unicast+0x4d5/0x690 20:27:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xa00, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 268.614122] ? netlink_sendskb+0x110/0x110 [ 268.618419] ? _copy_from_iter_full+0x229/0x7c0 [ 268.623109] ? __phys_addr_symbol+0x2c/0x70 [ 268.627446] ? __check_object_size+0x17b/0x3d1 [ 268.632053] netlink_sendmsg+0x6bb/0xc40 [ 268.636157] ? aa_af_perm+0x230/0x230 [ 268.639989] ? nlmsg_notify+0x1a0/0x1a0 [ 268.643971] ? kernel_recvmsg+0x220/0x220 [ 268.648137] ? nlmsg_notify+0x1a0/0x1a0 [ 268.652158] sock_sendmsg+0xc3/0x120 [ 268.655891] ___sys_sendmsg+0x7bb/0x8e0 [ 268.659882] ? __lock_acquire+0x6de/0x3ff0 [ 268.664135] ? copy_msghdr_from_user+0x440/0x440 [ 268.668905] ? __fget+0x32f/0x510 [ 268.672374] ? lock_downgrade+0x720/0x720 [ 268.676548] ? check_preemption_disabled+0x41/0x280 [ 268.681574] ? check_preemption_disabled+0x41/0x280 [ 268.686599] ? __fget+0x356/0x510 [ 268.690063] ? do_dup2+0x450/0x450 [ 268.693613] ? __fdget+0x1d0/0x230 [ 268.697160] __x64_sys_sendmsg+0x132/0x220 [ 268.701394] ? __sys_sendmsg+0x1b0/0x1b0 [ 268.705473] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.710841] ? trace_hardirqs_off_caller+0x6e/0x210 [ 268.715859] ? do_syscall_64+0x21/0x620 [ 268.719838] do_syscall_64+0xf9/0x620 [ 268.723646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.728836] RIP: 0033:0x45de59 [ 268.732029] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.751089] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 268.758830] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 20:27:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x8, r1, 0x0, 0x0) [ 268.766226] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 268.773509] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 268.780983] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 268.788264] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x18}, 0x14) [ 268.916957] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 268.937465] CPU: 0 PID: 15584 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 268.945406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.955055] Call Trace: [ 268.957660] dump_stack+0x1fc/0x2fe [ 268.961304] sysfs_warn_dup.cold+0x1c/0x2d 20:27:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x9, r1, 0x0, 0x0) [ 268.965572] sysfs_do_create_link_sd+0x116/0x130 [ 268.970340] sysfs_create_link+0x5f/0xc0 [ 268.974413] device_add+0x7d1/0x16d0 [ 268.978138] ? device_check_offline+0x280/0x280 [ 268.982824] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 268.988121] wiphy_register+0x1664/0x2130 [ 268.992285] ? bm_init+0x612/0x950 [ 268.995875] ? wiphy_unregister+0xea0/0xea0 [ 269.000243] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 269.005275] ? __kmalloc+0x38e/0x3c0 [ 269.009005] ? ieee80211_cs_list_valid+0x199/0x280 [ 269.013954] ieee80211_register_hw+0x13a7/0x3410 [ 269.018760] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 269.023724] ? memset+0x20/0x40 [ 269.027026] ? __hrtimer_init+0xe9/0x1d0 [ 269.031460] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 269.036618] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 269.041658] ? hwsim_mcast_del_radio+0x230/0x230 [ 269.046427] ? __kmalloc_track_caller+0x389/0x3c0 [ 269.051312] ? hwsim_new_radio_nl+0x273/0x850 [ 269.060610] ? memcpy+0x35/0x50 20:27:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) fchownat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0xee01, 0xee01, 0x1000) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$inet6_int(r4, 0x29, 0x19, &(0x7f0000000780)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f00000001c0)='E', 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) close(r1) r6 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r6, &(0x7f0000001480)=""/4104, 0x1008) [ 269.063908] hwsim_new_radio_nl+0x5c3/0x850 [ 269.068244] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 269.073458] ? nla_parse+0x1b2/0x290 [ 269.077222] genl_family_rcv_msg+0x642/0xc40 [ 269.081675] ? genl_rcv+0x40/0x40 [ 269.085135] ? genl_rcv_msg+0x12f/0x160 [ 269.089120] ? __mutex_add_waiter+0x160/0x160 [ 269.093637] ? __radix_tree_lookup+0x216/0x370 [ 269.098243] genl_rcv_msg+0xbf/0x160 [ 269.101976] netlink_rcv_skb+0x160/0x440 [ 269.106048] ? genl_family_rcv_msg+0xc40/0xc40 [ 269.110642] ? netlink_ack+0xae0/0xae0 [ 269.114546] ? genl_rcv+0x15/0x40 [ 269.118012] genl_rcv+0x24/0x40 [ 269.121326] netlink_unicast+0x4d5/0x690 [ 269.125403] ? netlink_sendskb+0x110/0x110 [ 269.129652] ? _copy_from_iter_full+0x229/0x7c0 [ 269.134329] ? __phys_addr_symbol+0x2c/0x70 [ 269.138656] ? __check_object_size+0x17b/0x3d1 [ 269.143246] netlink_sendmsg+0x6bb/0xc40 [ 269.147312] ? aa_af_perm+0x230/0x230 [ 269.151112] ? nlmsg_notify+0x1a0/0x1a0 [ 269.155088] ? kernel_recvmsg+0x220/0x220 [ 269.159249] ? nlmsg_notify+0x1a0/0x1a0 [ 269.163242] sock_sendmsg+0xc3/0x120 [ 269.166989] ___sys_sendmsg+0x7bb/0x8e0 [ 269.170972] ? __lock_acquire+0x6de/0x3ff0 [ 269.175221] ? copy_msghdr_from_user+0x440/0x440 [ 269.179990] ? __fget+0x32f/0x510 [ 269.183456] ? lock_downgrade+0x720/0x720 [ 269.187627] ? check_preemption_disabled+0x41/0x280 [ 269.192670] ? check_preemption_disabled+0x41/0x280 [ 269.197698] ? __fget+0x356/0x510 [ 269.201186] ? do_dup2+0x450/0x450 [ 269.204744] ? __fdget+0x1d0/0x230 [ 269.208477] __x64_sys_sendmsg+0x132/0x220 [ 269.212716] ? __sys_sendmsg+0x1b0/0x1b0 [ 269.216795] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.222184] ? trace_hardirqs_off_caller+0x6e/0x210 [ 269.227208] ? do_syscall_64+0x21/0x620 [ 269.231194] do_syscall_64+0xf9/0x620 [ 269.235005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.240195] RIP: 0033:0x45de59 [ 269.243386] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.262302] RSP: 002b:00007f147409cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 269.270013] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 269.277300] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 269.284574] RBP: 000000000118c0b0 R08: 0000000000000000 R09: 0000000000000000 [ 269.291848] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c07c [ 269.299120] R13: 00007ffd1e5faf1f R14: 00007f147409d9c0 R15: 000000000118c07c 20:27:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xa, r1, 0x0, 0x0) [ 269.425910] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 269.439060] CPU: 1 PID: 15587 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 269.447001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.456370] Call Trace: [ 269.458973] dump_stack+0x1fc/0x2fe [ 269.462610] sysfs_warn_dup.cold+0x1c/0x2d [ 269.466856] sysfs_do_create_link_sd+0x116/0x130 [ 269.471619] sysfs_create_link+0x5f/0xc0 [ 269.475694] device_add+0x7d1/0x16d0 [ 269.479441] ? device_check_offline+0x280/0x280 [ 269.484126] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 269.489417] wiphy_register+0x1664/0x2130 [ 269.493581] ? bm_init+0x612/0x950 [ 269.497133] ? wiphy_unregister+0xea0/0xea0 [ 269.501474] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 269.507021] ? __kmalloc+0x38e/0x3c0 [ 269.510743] ? ieee80211_cs_list_valid+0x199/0x280 [ 269.515701] ieee80211_register_hw+0x13a7/0x3410 [ 269.520479] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 269.525682] ? memset+0x20/0x40 [ 269.528978] ? __hrtimer_init+0xe9/0x1d0 [ 269.533053] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 269.538173] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 269.543213] ? hwsim_mcast_del_radio+0x230/0x230 [ 269.548096] ? __kmalloc_track_caller+0x389/0x3c0 [ 269.552950] ? hwsim_new_radio_nl+0x273/0x850 [ 269.557464] ? memcpy+0x35/0x50 [ 269.561109] hwsim_new_radio_nl+0x5c3/0x850 [ 269.565443] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 269.570747] ? nla_parse+0x1b2/0x290 [ 269.574484] genl_family_rcv_msg+0x642/0xc40 [ 269.578910] ? genl_rcv+0x40/0x40 [ 269.582368] ? genl_rcv_msg+0x12f/0x160 [ 269.586389] ? __mutex_add_waiter+0x160/0x160 [ 269.590904] ? __radix_tree_lookup+0x216/0x370 [ 269.595610] genl_rcv_msg+0xbf/0x160 [ 269.599337] netlink_rcv_skb+0x160/0x440 [ 269.603444] ? genl_family_rcv_msg+0xc40/0xc40 [ 269.608036] ? netlink_ack+0xae0/0xae0 [ 269.611947] ? genl_rcv+0x15/0x40 [ 269.615414] genl_rcv+0x24/0x40 [ 269.618707] netlink_unicast+0x4d5/0x690 [ 269.622781] ? netlink_sendskb+0x110/0x110 [ 269.627026] ? _copy_from_iter_full+0x229/0x7c0 [ 269.631704] ? __phys_addr_symbol+0x2c/0x70 [ 269.636057] ? __check_object_size+0x17b/0x3d1 [ 269.640681] netlink_sendmsg+0x6bb/0xc40 [ 269.644762] ? aa_af_perm+0x230/0x230 [ 269.648575] ? nlmsg_notify+0x1a0/0x1a0 [ 269.652563] ? kernel_recvmsg+0x220/0x220 [ 269.656724] ? nlmsg_notify+0x1a0/0x1a0 [ 269.660733] sock_sendmsg+0xc3/0x120 [ 269.664451] ___sys_sendmsg+0x7bb/0x8e0 [ 269.668427] ? __lock_acquire+0x6de/0x3ff0 [ 269.672663] ? copy_msghdr_from_user+0x440/0x440 [ 269.677420] ? __fget+0x32f/0x510 [ 269.680882] ? lock_downgrade+0x720/0x720 [ 269.685031] ? check_preemption_disabled+0x41/0x280 [ 269.690064] ? check_preemption_disabled+0x41/0x280 [ 269.695090] ? __fget+0x356/0x510 [ 269.698555] ? do_dup2+0x450/0x450 [ 269.702100] ? __fdget+0x1d0/0x230 [ 269.705650] __x64_sys_sendmsg+0x132/0x220 [ 269.709883] ? __sys_sendmsg+0x1b0/0x1b0 [ 269.713962] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.719330] ? trace_hardirqs_off_caller+0x6e/0x210 [ 269.724354] ? do_syscall_64+0x21/0x620 [ 269.728342] do_syscall_64+0xf9/0x620 [ 269.732269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.737479] RIP: 0033:0x45de59 [ 269.740689] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.759622] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 269.767439] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 269.774725] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 269.782000] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 269.789287] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 269.796576] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 270.037203] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 270.058594] CPU: 0 PID: 15625 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 270.066643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.076003] Call Trace: [ 270.078606] dump_stack+0x1fc/0x2fe [ 270.082247] sysfs_warn_dup.cold+0x1c/0x2d [ 270.086503] sysfs_do_create_link_sd+0x116/0x130 [ 270.091301] sysfs_create_link+0x5f/0xc0 [ 270.095397] device_add+0x7d1/0x16d0 [ 270.099146] ? device_check_offline+0x280/0x280 [ 270.103845] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 270.109145] wiphy_register+0x1664/0x2130 [ 270.113328] ? bm_init+0x612/0x950 [ 270.116901] ? wiphy_unregister+0xea0/0xea0 [ 270.121261] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 270.126308] ? __kmalloc+0x38e/0x3c0 [ 270.130049] ? ieee80211_cs_list_valid+0x199/0x280 [ 270.134998] ieee80211_register_hw+0x13a7/0x3410 [ 270.139772] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 270.144713] ? memset+0x20/0x40 [ 270.148001] ? __hrtimer_init+0xe9/0x1d0 [ 270.152094] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 270.157211] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 270.162249] ? hwsim_mcast_del_radio+0x230/0x230 [ 270.167119] ? __kmalloc_track_caller+0x389/0x3c0 [ 270.171996] ? hwsim_new_radio_nl+0x273/0x850 [ 270.176511] ? memcpy+0x35/0x50 [ 270.179803] hwsim_new_radio_nl+0x5c3/0x850 [ 270.184157] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 270.189387] ? nla_parse+0x1b2/0x290 [ 270.193121] genl_family_rcv_msg+0x642/0xc40 [ 270.197550] ? genl_rcv+0x40/0x40 [ 270.201006] ? genl_rcv_msg+0x12f/0x160 [ 270.204990] ? __mutex_add_waiter+0x160/0x160 [ 270.209516] ? __radix_tree_lookup+0x216/0x370 [ 270.214125] genl_rcv_msg+0xbf/0x160 [ 270.217851] netlink_rcv_skb+0x160/0x440 [ 270.221921] ? genl_family_rcv_msg+0xc40/0xc40 [ 270.226515] ? netlink_ack+0xae0/0xae0 [ 270.230413] ? genl_rcv+0x15/0x40 [ 270.233889] genl_rcv+0x24/0x40 [ 270.237185] netlink_unicast+0x4d5/0x690 [ 270.241263] ? netlink_sendskb+0x110/0x110 [ 270.245521] ? _copy_from_iter_full+0x229/0x7c0 [ 270.250195] ? __phys_addr_symbol+0x2c/0x70 [ 270.254528] ? __check_object_size+0x17b/0x3d1 [ 270.259121] netlink_sendmsg+0x6bb/0xc40 [ 270.263199] ? aa_af_perm+0x230/0x230 [ 270.267008] ? nlmsg_notify+0x1a0/0x1a0 [ 270.270992] ? kernel_recvmsg+0x220/0x220 [ 270.275152] ? nlmsg_notify+0x1a0/0x1a0 [ 270.279136] sock_sendmsg+0xc3/0x120 [ 270.282861] ___sys_sendmsg+0x7bb/0x8e0 [ 270.286845] ? __lock_acquire+0x6de/0x3ff0 [ 270.291109] ? copy_msghdr_from_user+0x440/0x440 [ 270.295878] ? __fget+0x32f/0x510 [ 270.299342] ? lock_downgrade+0x720/0x720 [ 270.303500] ? check_preemption_disabled+0x41/0x280 [ 270.308545] ? check_preemption_disabled+0x41/0x280 [ 270.313594] ? __fget+0x356/0x510 [ 270.317067] ? do_dup2+0x450/0x450 [ 270.320629] ? __fdget+0x1d0/0x230 [ 270.324188] __x64_sys_sendmsg+0x132/0x220 [ 270.328463] ? __sys_sendmsg+0x1b0/0x1b0 [ 270.332586] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.337958] ? trace_hardirqs_off_caller+0x6e/0x210 [ 270.343416] ? do_syscall_64+0x21/0x620 [ 270.347425] do_syscall_64+0xf9/0x620 [ 270.351244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.356445] RIP: 0033:0x45de59 [ 270.359650] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.378562] RSP: 002b:00007f109a73ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:27:04 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f00000002c0)={0x3, 0xffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000240)={0x1, 0x0, {0x5, 0x63666fd2, 0x1009, 0x1, 0x3, 0x8, 0x0, 0x5}}) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x200000, 0x0) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000180)=0x4) r5 = accept4(r2, 0x0, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x200000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) 20:27:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xc, r1, 0x0, 0x0) 20:27:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='keyring\x00', r1) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000100)=""/88, 0x58) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x28, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r2, @ANYBLOB="000126bd7000fedbdf251400000008000300", @ANYRES32=r5, @ANYBLOB="0c009900c1000000520000000a000600ffffffffffff05000000000000000100ff000000050001000000000005000100810000000a000600ffffffffffff0000050029000c00000005001301010000003700ac0017420715b6e30895e7f0b6d99a8aae493a3642465c84a4481c8eb10bba271c125add4da107eafbacb228eff085f4b3251a88e800"], 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002d006d54007a08b267ae3604b5000000", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=@mpls_getroute={0x44, 0x1a, 0x400, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x14, 0x5, 0xfe, 0x2, 0xfd, 0x3, 0x800}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x8}, @RTA_VIA={0x14, 0x12, {0x1a, "7d0e97df865a9e13596ab556fc2c"}}, @RTA_MULTIPATH={0xc, 0x9, {0x9, 0x20, 0xb1, r7}}]}, 0x44}, 0x1, 0x0, 0x0, 0x200000d0}, 0x40004) [ 270.386318] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 270.393598] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 270.400874] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 270.408151] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 270.415949] R13: 00007ffcea5682af R14: 00007f109a73f9c0 R15: 000000000118bfd4 20:27:04 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200000, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_GET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) 20:27:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xd, r1, 0x0, 0x0) 20:27:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3202, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:04 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/timer\x00', 0x10000) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}, {&(0x7f0000000240)="9192992b905c9f1d54c65d67ad885ada2e3a9ffebadfab158268fadf073eb5b3925e59464d4581832ad3f0d86c83151695e0977aec4e6fe4a28e37a5d2f38528cbbdd9864b39f5631dc2afbba30220af712f42024458f9eecee02ba579e5b31a5ea3152ddd0f8813d0d2d9a99dcbbab700472b4955c203ce64f7fe7b06acb490e844874c64a098a700f7413d1adac65223", 0x91}], 0x3, 0x1) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r1, &(0x7f00000001c0)=@nfc, &(0x7f0000000300)=0x80, 0x800) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000001340)={0x40, 0x75, &(0x7f0000000340)="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", {0x6506, 0x7, 0x30314247, 0x7, 0x8, 0x3, 0xb, 0x8}}) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x5a3cb8c4, 0x0) 20:27:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xe, r1, 0x0, 0x0) [ 270.662715] nla_parse: 3 callbacks suppressed [ 270.662727] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 270.714097] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 270.749998] CPU: 1 PID: 15642 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 270.758015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.767383] Call Trace: [ 270.770019] dump_stack+0x1fc/0x2fe [ 270.773661] sysfs_warn_dup.cold+0x1c/0x2d [ 270.777912] sysfs_do_create_link_sd+0x116/0x130 [ 270.782685] sysfs_create_link+0x5f/0xc0 [ 270.786763] device_add+0x7d1/0x16d0 [ 270.790496] ? device_check_offline+0x280/0x280 [ 270.795185] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 270.800483] wiphy_register+0x1664/0x2130 [ 270.804659] ? bm_init+0x612/0x950 [ 270.808213] ? wiphy_unregister+0xea0/0xea0 [ 270.812553] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 270.817586] ? __kmalloc+0x38e/0x3c0 [ 270.821400] ? ieee80211_cs_list_valid+0x199/0x280 [ 270.826342] ieee80211_register_hw+0x13a7/0x3410 [ 270.831118] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 270.836083] ? memset+0x20/0x40 [ 270.839374] ? __hrtimer_init+0xe9/0x1d0 [ 270.843449] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 270.848603] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 270.853673] ? hwsim_mcast_del_radio+0x230/0x230 [ 270.858443] ? __kmalloc_track_caller+0x389/0x3c0 [ 270.863295] ? hwsim_new_radio_nl+0x273/0x850 [ 270.867802] ? memcpy+0x35/0x50 [ 270.871096] hwsim_new_radio_nl+0x5c3/0x850 [ 270.875515] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 270.880726] ? nla_parse+0x1b2/0x290 [ 270.884459] genl_family_rcv_msg+0x642/0xc40 [ 270.888885] ? genl_rcv+0x40/0x40 [ 270.892347] ? genl_rcv_msg+0x12f/0x160 [ 270.896334] ? __mutex_add_waiter+0x160/0x160 [ 270.900850] ? __radix_tree_lookup+0x216/0x370 [ 270.905449] genl_rcv_msg+0xbf/0x160 [ 270.909171] netlink_rcv_skb+0x160/0x440 [ 270.913274] ? genl_family_rcv_msg+0xc40/0xc40 [ 270.917872] ? netlink_ack+0xae0/0xae0 [ 270.921819] ? genl_rcv+0x15/0x40 [ 270.925292] genl_rcv+0x24/0x40 [ 270.928579] netlink_unicast+0x4d5/0x690 [ 270.932655] ? netlink_sendskb+0x110/0x110 [ 270.936902] ? _copy_from_iter_full+0x229/0x7c0 [ 270.941580] ? __phys_addr_symbol+0x2c/0x70 [ 270.946520] ? __check_object_size+0x17b/0x3d1 [ 270.951121] netlink_sendmsg+0x6bb/0xc40 [ 270.955199] ? aa_af_perm+0x230/0x230 [ 270.959016] ? nlmsg_notify+0x1a0/0x1a0 [ 270.963013] ? kernel_recvmsg+0x220/0x220 [ 270.967208] ? nlmsg_notify+0x1a0/0x1a0 [ 270.971198] sock_sendmsg+0xc3/0x120 [ 270.974961] ___sys_sendmsg+0x7bb/0x8e0 [ 270.979045] ? __lock_acquire+0x6de/0x3ff0 [ 270.983414] ? copy_msghdr_from_user+0x440/0x440 [ 270.988303] ? __fget+0x32f/0x510 [ 270.991767] ? lock_downgrade+0x720/0x720 [ 270.995925] ? check_preemption_disabled+0x41/0x280 [ 271.000986] ? check_preemption_disabled+0x41/0x280 [ 271.006022] ? __fget+0x356/0x510 [ 271.009486] ? do_dup2+0x450/0x450 [ 271.013048] ? __fdget+0x1d0/0x230 [ 271.016599] __x64_sys_sendmsg+0x132/0x220 [ 271.020840] ? __sys_sendmsg+0x1b0/0x1b0 [ 271.024923] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.030299] ? trace_hardirqs_off_caller+0x6e/0x210 [ 271.035331] ? do_syscall_64+0x21/0x620 [ 271.039320] do_syscall_64+0xf9/0x620 [ 271.043136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.048328] RIP: 0033:0x45de59 20:27:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xf, r1, 0x0, 0x0) [ 271.051528] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.070442] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 271.078266] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 271.085547] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 271.092830] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 271.100284] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 271.107568] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 271.136348] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 271.150603] CPU: 1 PID: 15669 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 271.158522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.167887] Call Trace: [ 271.170487] dump_stack+0x1fc/0x2fe [ 271.174134] sysfs_warn_dup.cold+0x1c/0x2d [ 271.178382] sysfs_do_create_link_sd+0x116/0x130 [ 271.183149] sysfs_create_link+0x5f/0xc0 [ 271.187222] device_add+0x7d1/0x16d0 [ 271.190948] ? device_check_offline+0x280/0x280 [ 271.196063] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 271.201355] wiphy_register+0x1664/0x2130 [ 271.205530] ? bm_init+0x612/0x950 [ 271.209083] ? wiphy_unregister+0xea0/0xea0 [ 271.213450] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 271.218566] ? __kmalloc+0x38e/0x3c0 [ 271.222303] ? ieee80211_cs_list_valid+0x199/0x280 [ 271.227245] ieee80211_register_hw+0x13a7/0x3410 [ 271.232018] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 271.236992] ? memset+0x20/0x40 [ 271.240812] ? __hrtimer_init+0xe9/0x1d0 [ 271.244884] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 271.250007] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 271.255048] ? hwsim_mcast_del_radio+0x230/0x230 [ 271.259811] ? __kmalloc_track_caller+0x389/0x3c0 [ 271.264656] ? hwsim_new_radio_nl+0x273/0x850 [ 271.269163] ? memcpy+0x35/0x50 [ 271.272457] hwsim_new_radio_nl+0x5c3/0x850 [ 271.276827] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 271.282036] ? nla_parse+0x1b2/0x290 [ 271.285768] genl_family_rcv_msg+0x642/0xc40 [ 271.290188] ? genl_rcv+0x40/0x40 [ 271.293669] ? genl_rcv_msg+0x12f/0x160 [ 271.297684] ? __mutex_add_waiter+0x160/0x160 [ 271.302203] ? __radix_tree_lookup+0x216/0x370 [ 271.306828] genl_rcv_msg+0xbf/0x160 [ 271.310551] netlink_rcv_skb+0x160/0x440 [ 271.314627] ? genl_family_rcv_msg+0xc40/0xc40 [ 271.319219] ? netlink_ack+0xae0/0xae0 [ 271.323118] ? genl_rcv+0x15/0x40 [ 271.326591] genl_rcv+0x24/0x40 [ 271.329879] netlink_unicast+0x4d5/0x690 [ 271.333966] ? netlink_sendskb+0x110/0x110 [ 271.338217] ? _copy_from_iter_full+0x229/0x7c0 [ 271.342895] ? __phys_addr_symbol+0x2c/0x70 [ 271.347227] ? __check_object_size+0x17b/0x3d1 [ 271.351840] netlink_sendmsg+0x6bb/0xc40 [ 271.355919] ? aa_af_perm+0x230/0x230 [ 271.359727] ? nlmsg_notify+0x1a0/0x1a0 [ 271.363710] ? kernel_recvmsg+0x220/0x220 [ 271.367875] ? nlmsg_notify+0x1a0/0x1a0 [ 271.371856] sock_sendmsg+0xc3/0x120 [ 271.375584] ___sys_sendmsg+0x7bb/0x8e0 [ 271.379564] ? __lock_acquire+0x6de/0x3ff0 [ 271.383810] ? copy_msghdr_from_user+0x440/0x440 [ 271.388575] ? __fget+0x32f/0x510 [ 271.392046] ? lock_downgrade+0x720/0x720 [ 271.396210] ? check_preemption_disabled+0x41/0x280 [ 271.401244] ? check_preemption_disabled+0x41/0x280 [ 271.406289] ? __fget+0x356/0x510 [ 271.409783] ? do_dup2+0x450/0x450 [ 271.413363] ? __fdget+0x1d0/0x230 [ 271.416913] __x64_sys_sendmsg+0x132/0x220 [ 271.421264] ? __sys_sendmsg+0x1b0/0x1b0 [ 271.425352] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.430728] ? trace_hardirqs_off_caller+0x6e/0x210 [ 271.435760] ? do_syscall_64+0x21/0x620 [ 271.439748] do_syscall_64+0xf9/0x620 [ 271.443647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.448870] RIP: 0033:0x45de59 [ 271.452067] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.471094] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 271.478813] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 20:27:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x10, r1, 0x0, 0x0) [ 271.486090] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 271.493366] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 271.500641] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 271.507936] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x11, r1, 0x0, 0x0) 20:27:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x12, r1, 0x0, 0x0) [ 271.680941] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 271.705674] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 271.733791] CPU: 0 PID: 15684 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 271.741715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.751080] Call Trace: [ 271.753678] dump_stack+0x1fc/0x2fe [ 271.757323] sysfs_warn_dup.cold+0x1c/0x2d [ 271.761570] sysfs_do_create_link_sd+0x116/0x130 [ 271.766337] sysfs_create_link+0x5f/0xc0 [ 271.770404] device_add+0x7d1/0x16d0 [ 271.774156] ? device_check_offline+0x280/0x280 [ 271.778859] ? ieee80211_set_bitrate_flags+0x132/0x580 20:27:05 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3203, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 271.784154] wiphy_register+0x1664/0x2130 [ 271.788313] ? bm_init+0x612/0x950 [ 271.791890] ? wiphy_unregister+0xea0/0xea0 [ 271.796245] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 271.801265] ? __kmalloc+0x38e/0x3c0 [ 271.804989] ? ieee80211_cs_list_valid+0x199/0x280 [ 271.809961] ieee80211_register_hw+0x13a7/0x3410 [ 271.814828] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 271.819766] ? memset+0x20/0x40 [ 271.823050] ? __hrtimer_init+0xe9/0x1d0 [ 271.827116] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 271.832384] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 271.837418] ? hwsim_mcast_del_radio+0x230/0x230 [ 271.842179] ? hwsim_new_radio_nl+0x2af/0x850 [ 271.846710] hwsim_new_radio_nl+0x5c3/0x850 [ 271.851038] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 271.856241] ? nla_parse+0x1b2/0x290 [ 271.859967] genl_family_rcv_msg+0x642/0xc40 [ 271.864408] ? genl_rcv+0x40/0x40 [ 271.867869] ? genl_rcv_msg+0x12f/0x160 [ 271.871850] ? __mutex_add_waiter+0x160/0x160 [ 271.876365] ? __radix_tree_lookup+0x216/0x370 [ 271.880963] genl_rcv_msg+0xbf/0x160 [ 271.884712] netlink_rcv_skb+0x160/0x440 [ 271.888780] ? genl_family_rcv_msg+0xc40/0xc40 [ 271.893397] ? netlink_ack+0xae0/0xae0 [ 271.897297] ? genl_rcv+0x15/0x40 [ 271.900763] genl_rcv+0x24/0x40 [ 271.904052] netlink_unicast+0x4d5/0x690 [ 271.908123] ? netlink_sendskb+0x110/0x110 [ 271.912366] ? _copy_from_iter_full+0x229/0x7c0 [ 271.917302] ? __phys_addr_symbol+0x2c/0x70 [ 271.921660] ? __check_object_size+0x17b/0x3d1 [ 271.926256] netlink_sendmsg+0x6bb/0xc40 [ 271.930332] ? aa_af_perm+0x230/0x230 [ 271.934140] ? nlmsg_notify+0x1a0/0x1a0 [ 271.938120] ? kernel_recvmsg+0x220/0x220 [ 271.942285] ? nlmsg_notify+0x1a0/0x1a0 [ 271.946289] sock_sendmsg+0xc3/0x120 [ 271.950010] ___sys_sendmsg+0x7bb/0x8e0 [ 271.953990] ? __lock_acquire+0x6de/0x3ff0 [ 271.958231] ? copy_msghdr_from_user+0x440/0x440 [ 271.962992] ? __fget+0x32f/0x510 [ 271.966482] ? lock_downgrade+0x720/0x720 [ 271.970635] ? check_preemption_disabled+0x41/0x280 [ 271.975670] ? check_preemption_disabled+0x41/0x280 [ 271.980768] ? __fget+0x356/0x510 [ 271.984232] ? do_dup2+0x450/0x450 [ 271.987962] ? __fdget+0x1d0/0x230 [ 271.991513] __x64_sys_sendmsg+0x132/0x220 [ 271.995764] ? __sys_sendmsg+0x1b0/0x1b0 [ 271.999845] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.005219] ? trace_hardirqs_off_caller+0x6e/0x210 [ 272.010245] ? do_syscall_64+0x21/0x620 [ 272.014318] do_syscall_64+0xf9/0x620 [ 272.018134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.023326] RIP: 0033:0x45de59 [ 272.026534] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.045442] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 272.053160] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 272.060436] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 272.067709] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 272.075018] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 272.082303] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 [ 272.149506] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 272.172472] CPU: 0 PID: 15717 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 272.180412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.189783] Call Trace: [ 272.192392] dump_stack+0x1fc/0x2fe [ 272.196034] sysfs_warn_dup.cold+0x1c/0x2d [ 272.200290] sysfs_do_create_link_sd+0x116/0x130 [ 272.205057] sysfs_create_link+0x5f/0xc0 [ 272.209145] device_add+0x7d1/0x16d0 [ 272.212874] ? device_check_offline+0x280/0x280 [ 272.217554] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 272.222849] wiphy_register+0x1664/0x2130 [ 272.227011] ? bm_init+0x612/0x950 [ 272.230563] ? wiphy_unregister+0xea0/0xea0 [ 272.234916] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 272.239973] ? __kmalloc+0x38e/0x3c0 [ 272.243755] ? ieee80211_cs_list_valid+0x199/0x280 [ 272.248703] ieee80211_register_hw+0x13a7/0x3410 [ 272.253512] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 272.258465] ? memset+0x20/0x40 [ 272.261768] ? __hrtimer_init+0xe9/0x1d0 [ 272.265844] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 272.270965] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 272.276004] ? hwsim_mcast_del_radio+0x230/0x230 [ 272.280766] ? __kmalloc_track_caller+0x389/0x3c0 [ 272.285614] ? hwsim_new_radio_nl+0x273/0x850 [ 272.290124] ? memcpy+0x35/0x50 [ 272.293417] hwsim_new_radio_nl+0x5c3/0x850 [ 272.297755] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 272.303919] ? nla_parse+0x1b2/0x290 [ 272.307668] genl_family_rcv_msg+0x642/0xc40 [ 272.312092] ? genl_rcv+0x40/0x40 [ 272.315549] ? genl_rcv_msg+0x12f/0x160 [ 272.319536] ? __mutex_add_waiter+0x160/0x160 [ 272.324078] ? __radix_tree_lookup+0x216/0x370 [ 272.328706] genl_rcv_msg+0xbf/0x160 [ 272.332697] netlink_rcv_skb+0x160/0x440 [ 272.336791] ? genl_family_rcv_msg+0xc40/0xc40 [ 272.341383] ? netlink_ack+0xae0/0xae0 [ 272.345305] ? genl_rcv+0x15/0x40 [ 272.348781] genl_rcv+0x24/0x40 [ 272.352069] netlink_unicast+0x4d5/0x690 [ 272.356143] ? netlink_sendskb+0x110/0x110 [ 272.360389] ? _copy_from_iter_full+0x229/0x7c0 [ 272.365063] ? __phys_addr_symbol+0x2c/0x70 [ 272.369396] ? __check_object_size+0x17b/0x3d1 [ 272.373990] netlink_sendmsg+0x6bb/0xc40 [ 272.378084] ? aa_af_perm+0x230/0x230 [ 272.381893] ? nlmsg_notify+0x1a0/0x1a0 [ 272.385871] ? kernel_recvmsg+0x220/0x220 [ 272.390051] ? nlmsg_notify+0x1a0/0x1a0 [ 272.394034] sock_sendmsg+0xc3/0x120 20:27:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="5800000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 272.397759] ___sys_sendmsg+0x7bb/0x8e0 [ 272.401749] ? __lock_acquire+0x6de/0x3ff0 [ 272.405996] ? copy_msghdr_from_user+0x440/0x440 [ 272.410762] ? __fget+0x32f/0x510 [ 272.414228] ? lock_downgrade+0x720/0x720 [ 272.418407] ? check_preemption_disabled+0x41/0x280 [ 272.423432] ? check_preemption_disabled+0x41/0x280 [ 272.428467] ? __fget+0x356/0x510 [ 272.431932] ? do_dup2+0x450/0x450 [ 272.435485] ? __fdget+0x1d0/0x230 [ 272.439046] __x64_sys_sendmsg+0x132/0x220 [ 272.443315] ? __sys_sendmsg+0x1b0/0x1b0 [ 272.447394] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.452771] ? trace_hardirqs_off_caller+0x6e/0x210 [ 272.457828] ? do_syscall_64+0x21/0x620 [ 272.461813] do_syscall_64+0xf9/0x620 [ 272.465634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.470853] RIP: 0033:0x45de59 [ 272.474050] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.492982] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:27:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x13, r1, 0x0, 0x0) 20:27:06 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) r5 = openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r6, &(0x7f0000ffe000/0x2000)=nil, 0x64aaea3afb764b93) shmat(r6, &(0x7f0000ffb000/0x2000)=nil, 0x7000) openat$cgroup_ro(r5, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 272.500729] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 272.508180] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 272.515460] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 272.522742] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 272.530042] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x14, r1, 0x0, 0x0) 20:27:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)={0x0, 0x0, "8957ecd89d19633a8dee1b7cddb65a152535c3e1cb116d21be1f0a0785dd7668b0bb0476b9ae0659737b8f1cb372b8bc4540da65bbcddeb2db1c6c2c5e3e851f611f6f23ab6874bef4d67e116527f63fed13c32f728732c7845e267fd9a22b339fe4bc00d8707251ff600ab06c1860ca56b6dcd31f66e7c93fb8a63f0eb38bcd95eb39c53cf5b44eccc01d3a0128226738f90fa4679b0ab9dd2de9398cbd82910d5ad559423c88b4e731c66ccca76e921895d31dd345627d58f53ae70d64e87287866cddadffbe323a39e1a5d2d006eebb567cb06e9f3d1e5a5ebc6a1632d85fdcb25c01e98f7661f491f4f324f2a0"}, 0xf7, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) keyctl$search(0xa, r3, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f0000000080)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', 'keyring\x00'}, 0x20, r3) [ 272.663318] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 272.691187] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 272.704176] CPU: 0 PID: 15733 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 272.712084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.721455] Call Trace: [ 272.724060] dump_stack+0x1fc/0x2fe [ 272.727702] sysfs_warn_dup.cold+0x1c/0x2d [ 272.731948] sysfs_do_create_link_sd+0x116/0x130 [ 272.736720] sysfs_create_link+0x5f/0xc0 [ 272.740798] device_add+0x7d1/0x16d0 [ 272.744566] ? device_check_offline+0x280/0x280 [ 272.749247] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 272.754544] wiphy_register+0x1664/0x2130 [ 272.758710] ? bm_init+0x612/0x950 [ 272.762262] ? wiphy_unregister+0xea0/0xea0 [ 272.766605] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 272.771633] ? __kmalloc+0x38e/0x3c0 [ 272.775359] ? ieee80211_cs_list_valid+0x199/0x280 [ 272.780395] ieee80211_register_hw+0x13a7/0x3410 [ 272.785172] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 272.790112] ? memset+0x20/0x40 [ 272.793429] ? __hrtimer_init+0xe9/0x1d0 [ 272.797519] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 272.802632] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 272.807670] ? hwsim_mcast_del_radio+0x230/0x230 [ 272.812441] ? __kmalloc_track_caller+0x389/0x3c0 [ 272.817297] ? hwsim_new_radio_nl+0x273/0x850 [ 272.821812] ? memcpy+0x35/0x50 [ 272.825136] hwsim_new_radio_nl+0x5c3/0x850 [ 272.829497] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 272.834730] ? nla_parse+0x1b2/0x290 [ 272.838460] genl_family_rcv_msg+0x642/0xc40 [ 272.842969] ? genl_rcv+0x40/0x40 [ 272.846428] ? genl_rcv_msg+0x12f/0x160 [ 272.850409] ? __mutex_add_waiter+0x160/0x160 [ 272.854931] ? __radix_tree_lookup+0x216/0x370 [ 272.859536] genl_rcv_msg+0xbf/0x160 [ 272.863260] netlink_rcv_skb+0x160/0x440 [ 272.867359] ? genl_family_rcv_msg+0xc40/0xc40 [ 272.871948] ? netlink_ack+0xae0/0xae0 [ 272.875858] ? genl_rcv+0x15/0x40 [ 272.879336] genl_rcv+0x24/0x40 [ 272.882625] netlink_unicast+0x4d5/0x690 [ 272.886699] ? netlink_sendskb+0x110/0x110 [ 272.890945] ? _copy_from_iter_full+0x229/0x7c0 [ 272.895628] ? __phys_addr_symbol+0x2c/0x70 [ 272.899969] ? __check_object_size+0x17b/0x3d1 [ 272.905358] netlink_sendmsg+0x6bb/0xc40 [ 272.909432] ? aa_af_perm+0x230/0x230 [ 272.913245] ? nlmsg_notify+0x1a0/0x1a0 [ 272.917233] ? kernel_recvmsg+0x220/0x220 [ 272.921398] ? nlmsg_notify+0x1a0/0x1a0 [ 272.925383] sock_sendmsg+0xc3/0x120 [ 272.929112] ___sys_sendmsg+0x7bb/0x8e0 [ 272.936602] ? __lock_acquire+0x6de/0x3ff0 [ 272.940858] ? copy_msghdr_from_user+0x440/0x440 [ 272.945627] ? __fget+0x32f/0x510 [ 272.949096] ? lock_downgrade+0x720/0x720 [ 272.953255] ? check_preemption_disabled+0x41/0x280 [ 272.958283] ? check_preemption_disabled+0x41/0x280 [ 272.963309] ? __fget+0x356/0x510 [ 272.966777] ? do_dup2+0x450/0x450 [ 272.970339] ? __fdget+0x1d0/0x230 [ 272.973923] __x64_sys_sendmsg+0x132/0x220 [ 272.978163] ? __sys_sendmsg+0x1b0/0x1b0 [ 272.982246] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.987627] ? trace_hardirqs_off_caller+0x6e/0x210 [ 272.992660] ? do_syscall_64+0x21/0x620 [ 272.996644] do_syscall_64+0xf9/0x620 [ 273.000458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.005658] RIP: 0033:0x45de59 [ 273.008856] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.027768] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 273.035864] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 273.043143] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 273.050420] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 273.057698] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c 20:27:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x15, r1, 0x0, 0x0) 20:27:07 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000140)="bfc63401000800000000003500", 0xd}, {&(0x7f0000000080)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38e263397ddfe2000100000000000029c3181401", 0x39afaef4bb27d9d5}], 0x10000000000000bb, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x8, 0x2) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) [ 273.064973] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 273.233734] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 273.243532] CPU: 0 PID: 15718 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 273.251437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.260823] Call Trace: [ 273.263425] dump_stack+0x1fc/0x2fe [ 273.267095] sysfs_warn_dup.cold+0x1c/0x2d [ 273.271374] sysfs_do_create_link_sd+0x116/0x130 [ 273.276139] sysfs_create_link+0x5f/0xc0 [ 273.280213] device_add+0x7d1/0x16d0 [ 273.283937] ? device_check_offline+0x280/0x280 [ 273.288622] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 273.294179] wiphy_register+0x1664/0x2130 [ 273.298340] ? bm_init+0x612/0x950 [ 273.301894] ? wiphy_unregister+0xea0/0xea0 [ 273.306232] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 273.311256] ? __kmalloc+0x38e/0x3c0 [ 273.314979] ? ieee80211_cs_list_valid+0x199/0x280 [ 273.319947] ieee80211_register_hw+0x13a7/0x3410 [ 273.324730] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 273.329672] ? memset+0x20/0x40 [ 273.332959] ? __hrtimer_init+0xe9/0x1d0 [ 273.337034] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 273.342150] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 273.347218] ? hwsim_mcast_del_radio+0x230/0x230 [ 273.351984] ? __kmalloc_track_caller+0x389/0x3c0 [ 273.356842] ? hwsim_new_radio_nl+0x273/0x850 [ 273.361348] ? memcpy+0x35/0x50 [ 273.364639] hwsim_new_radio_nl+0x5c3/0x850 [ 273.369000] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 273.374207] ? nla_parse+0x1b2/0x290 [ 273.377936] genl_family_rcv_msg+0x642/0xc40 [ 273.382363] ? genl_rcv+0x40/0x40 [ 273.385824] ? genl_rcv_msg+0x12f/0x160 [ 273.389809] ? __mutex_add_waiter+0x160/0x160 [ 273.394342] ? __radix_tree_lookup+0x216/0x370 [ 273.398944] genl_rcv_msg+0xbf/0x160 [ 273.402698] netlink_rcv_skb+0x160/0x440 [ 273.406768] ? genl_family_rcv_msg+0xc40/0xc40 [ 273.411359] ? netlink_ack+0xae0/0xae0 [ 273.415253] ? genl_rcv+0x15/0x40 [ 273.418725] genl_rcv+0x24/0x40 [ 273.422011] netlink_unicast+0x4d5/0x690 [ 273.426086] ? netlink_sendskb+0x110/0x110 [ 273.430332] ? _copy_from_iter_full+0x229/0x7c0 [ 273.435009] ? __phys_addr_symbol+0x2c/0x70 [ 273.439342] ? __check_object_size+0x17b/0x3d1 [ 273.443935] netlink_sendmsg+0x6bb/0xc40 [ 273.448014] ? aa_af_perm+0x230/0x230 [ 273.451824] ? nlmsg_notify+0x1a0/0x1a0 [ 273.455805] ? kernel_recvmsg+0x220/0x220 [ 273.459981] ? nlmsg_notify+0x1a0/0x1a0 [ 273.463997] sock_sendmsg+0xc3/0x120 [ 273.467722] ___sys_sendmsg+0x7bb/0x8e0 [ 273.471738] ? __lock_acquire+0x6de/0x3ff0 [ 273.475992] ? copy_msghdr_from_user+0x440/0x440 [ 273.480761] ? __fget+0x32f/0x510 [ 273.484225] ? lock_downgrade+0x720/0x720 [ 273.488383] ? check_preemption_disabled+0x41/0x280 [ 273.493410] ? check_preemption_disabled+0x41/0x280 [ 273.498440] ? __fget+0x356/0x510 [ 273.501905] ? do_dup2+0x450/0x450 [ 273.505459] ? __fdget+0x1d0/0x230 [ 273.509014] __x64_sys_sendmsg+0x132/0x220 [ 273.513258] ? __sys_sendmsg+0x1b0/0x1b0 [ 273.517340] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.522714] ? trace_hardirqs_off_caller+0x6e/0x210 [ 273.527742] ? do_syscall_64+0x21/0x620 [ 273.531741] do_syscall_64+0xf9/0x620 [ 273.535563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.540763] RIP: 0033:0x45de59 [ 273.543977] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.563189] RSP: 002b:00007f109a73ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 273.570910] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 273.578195] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 20:27:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x800, 0x0) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xcc, 0xb, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_ADT={0x38, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x6}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x600}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1}}]}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x7}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1f}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x58, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010102}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x2}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x42}}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20004040}, 0x80c4) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="840000006fa078f0cbf888a422cda6c594", @ANYRES16=0x0, @ANYBLOB="040029bd7000fedbdf250400000005000500050000000800020008000000050005000200000004000400140001000000000000000000000000000000000014000100fe8000000000000000000000000000aa050005000000000008000200d6f3000005000600a600000014000100fc00000000000000000000000000000162bb4ccc4caed579166cb38db0d32b5e84610e585f39c27be878b13ab65116b5cbcf6f77c79bae87ad54c5ac9a99fea70ff87595e2"], 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x1) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x16, r1, 0x0, 0x0) [ 273.585473] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 273.592760] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 273.600999] R13: 00007ffcea5682af R14: 00007f109a73f9c0 R15: 000000000118bfd4 20:27:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="6900000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:07 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3204, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 273.706537] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x17, r1, 0x0, 0x0) 20:27:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='}\x00', 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) [ 273.758639] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 273.807944] CPU: 0 PID: 15774 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 273.815882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.825248] Call Trace: [ 273.827852] dump_stack+0x1fc/0x2fe [ 273.831590] sysfs_warn_dup.cold+0x1c/0x2d [ 273.835840] sysfs_do_create_link_sd+0x116/0x130 [ 273.840609] sysfs_create_link+0x5f/0xc0 [ 273.844681] device_add+0x7d1/0x16d0 [ 273.848408] ? device_check_offline+0x280/0x280 [ 273.853088] ? ieee80211_set_bitrate_flags+0x132/0x580 20:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x1d, r1, 0x0, 0x0) [ 273.858382] wiphy_register+0x1664/0x2130 [ 273.862548] ? bm_init+0x612/0x950 [ 273.866109] ? wiphy_unregister+0xea0/0xea0 [ 273.870453] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 273.875478] ? __kmalloc+0x38e/0x3c0 [ 273.879201] ? ieee80211_cs_list_valid+0x199/0x280 [ 273.884149] ieee80211_register_hw+0x13a7/0x3410 [ 273.888928] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 273.893869] ? memset+0x20/0x40 [ 273.897159] ? __hrtimer_init+0xe9/0x1d0 [ 273.901232] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 273.906350] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 273.911438] ? hwsim_mcast_del_radio+0x230/0x230 [ 273.916205] ? __kmalloc_track_caller+0x389/0x3c0 [ 273.921057] ? hwsim_new_radio_nl+0x273/0x850 [ 273.925568] ? memcpy+0x35/0x50 [ 273.928864] hwsim_new_radio_nl+0x5c3/0x850 [ 273.933201] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 273.938421] ? nla_parse+0x1b2/0x290 [ 273.942178] genl_family_rcv_msg+0x642/0xc40 [ 273.946615] ? genl_rcv+0x40/0x40 [ 273.950080] ? genl_rcv_msg+0x12f/0x160 [ 273.954153] ? __mutex_add_waiter+0x160/0x160 [ 273.958677] ? __radix_tree_lookup+0x216/0x370 [ 273.963369] genl_rcv_msg+0xbf/0x160 [ 273.967709] netlink_rcv_skb+0x160/0x440 [ 273.971782] ? genl_family_rcv_msg+0xc40/0xc40 [ 273.976407] ? netlink_ack+0xae0/0xae0 [ 273.980314] ? genl_rcv+0x15/0x40 [ 273.983782] genl_rcv+0x24/0x40 [ 273.987071] netlink_unicast+0x4d5/0x690 [ 273.991151] ? netlink_sendskb+0x110/0x110 [ 273.995397] ? _copy_from_iter_full+0x229/0x7c0 [ 274.000089] ? __phys_addr_symbol+0x2c/0x70 [ 274.005551] ? __check_object_size+0x17b/0x3d1 [ 274.010152] netlink_sendmsg+0x6bb/0xc40 [ 274.014228] ? aa_af_perm+0x230/0x230 [ 274.018066] ? nlmsg_notify+0x1a0/0x1a0 [ 274.022137] ? kernel_recvmsg+0x220/0x220 [ 274.026299] ? nlmsg_notify+0x1a0/0x1a0 [ 274.030284] sock_sendmsg+0xc3/0x120 [ 274.034012] ___sys_sendmsg+0x7bb/0x8e0 [ 274.037995] ? __lock_acquire+0x6de/0x3ff0 [ 274.042240] ? copy_msghdr_from_user+0x440/0x440 [ 274.047005] ? __fget+0x32f/0x510 [ 274.050471] ? lock_downgrade+0x720/0x720 20:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x2) [ 274.054627] ? check_preemption_disabled+0x41/0x280 [ 274.059662] ? check_preemption_disabled+0x41/0x280 [ 274.064700] ? __fget+0x356/0x510 [ 274.068176] ? do_dup2+0x450/0x450 [ 274.071739] ? __fdget+0x1d0/0x230 [ 274.075294] __x64_sys_sendmsg+0x132/0x220 [ 274.079538] ? __sys_sendmsg+0x1b0/0x1b0 [ 274.083658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.089069] ? trace_hardirqs_off_caller+0x6e/0x210 [ 274.094097] ? do_syscall_64+0x21/0x620 [ 274.098095] do_syscall_64+0xf9/0x620 [ 274.101912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.107115] RIP: 0033:0x45de59 [ 274.110317] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.129228] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 274.136951] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 274.144241] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 274.151525] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 274.158803] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 274.166089] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:08 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140)='/dev/input/mice\x00', 0x400002) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x288040, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002c00c3d556e29c03db70002800000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990001000000520000000600360041000000"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x5, 0x7fff}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x0, 0x101, 0x8000, 0x1, 0x3ea, 0xff, 0x7, 0xc9, r4}, 0x20) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 20:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x5) [ 274.288559] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 274.297460] CPU: 0 PID: 15781 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 274.305360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.314724] Call Trace: [ 274.317329] dump_stack+0x1fc/0x2fe [ 274.321008] sysfs_warn_dup.cold+0x1c/0x2d [ 274.325262] sysfs_do_create_link_sd+0x116/0x130 [ 274.330034] sysfs_create_link+0x5f/0xc0 [ 274.334107] device_add+0x7d1/0x16d0 [ 274.337836] ? device_check_offline+0x280/0x280 [ 274.342517] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 274.347819] wiphy_register+0x1664/0x2130 [ 274.352018] ? bm_init+0x612/0x950 [ 274.355573] ? wiphy_unregister+0xea0/0xea0 [ 274.359922] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 274.364969] ? __kmalloc+0x38e/0x3c0 [ 274.368701] ? ieee80211_cs_list_valid+0x199/0x280 [ 274.374302] ieee80211_register_hw+0x13a7/0x3410 [ 274.379079] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 274.384025] ? memset+0x20/0x40 [ 274.387311] ? __hrtimer_init+0xe9/0x1d0 [ 274.391383] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 274.396554] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 274.401591] ? hwsim_mcast_del_radio+0x230/0x230 [ 274.406362] ? __kmalloc_track_caller+0x389/0x3c0 [ 274.411217] ? hwsim_new_radio_nl+0x273/0x850 [ 274.415725] ? memcpy+0x35/0x50 [ 274.419017] hwsim_new_radio_nl+0x5c3/0x850 [ 274.423351] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 274.428575] ? nla_parse+0x1b2/0x290 [ 274.432317] genl_family_rcv_msg+0x642/0xc40 [ 274.436742] ? genl_rcv+0x40/0x40 [ 274.440241] ? genl_rcv_msg+0x12f/0x160 [ 274.444228] ? __mutex_add_waiter+0x160/0x160 [ 274.448785] ? __radix_tree_lookup+0x216/0x370 [ 274.453476] genl_rcv_msg+0xbf/0x160 [ 274.457212] netlink_rcv_skb+0x160/0x440 [ 274.461316] ? genl_family_rcv_msg+0xc40/0xc40 [ 274.465935] ? netlink_ack+0xae0/0xae0 [ 274.469841] ? genl_rcv+0x15/0x40 [ 274.473316] genl_rcv+0x24/0x40 [ 274.476608] netlink_unicast+0x4d5/0x690 [ 274.480686] ? netlink_sendskb+0x110/0x110 [ 274.484939] ? _copy_from_iter_full+0x229/0x7c0 [ 274.489619] ? __phys_addr_symbol+0x2c/0x70 [ 274.493952] ? __check_object_size+0x17b/0x3d1 [ 274.498575] netlink_sendmsg+0x6bb/0xc40 [ 274.502653] ? aa_af_perm+0x230/0x230 [ 274.506478] ? nlmsg_notify+0x1a0/0x1a0 [ 274.510483] ? kernel_recvmsg+0x220/0x220 [ 274.514649] ? nlmsg_notify+0x1a0/0x1a0 [ 274.518661] sock_sendmsg+0xc3/0x120 [ 274.522412] ___sys_sendmsg+0x7bb/0x8e0 [ 274.526402] ? __lock_acquire+0x6de/0x3ff0 [ 274.530648] ? copy_msghdr_from_user+0x440/0x440 [ 274.535438] ? __fget+0x32f/0x510 [ 274.538907] ? lock_downgrade+0x720/0x720 [ 274.543065] ? check_preemption_disabled+0x41/0x280 [ 274.548185] ? check_preemption_disabled+0x41/0x280 [ 274.553219] ? __fget+0x356/0x510 [ 274.556675] ? do_dup2+0x450/0x450 [ 274.560236] ? __fdget+0x1d0/0x230 [ 274.564044] __x64_sys_sendmsg+0x132/0x220 [ 274.568283] ? __sys_sendmsg+0x1b0/0x1b0 [ 274.572357] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.577811] ? trace_hardirqs_off_caller+0x6e/0x210 [ 274.582827] ? do_syscall_64+0x21/0x620 [ 274.586803] do_syscall_64+0xf9/0x620 [ 274.590628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.595833] RIP: 0033:0x45de59 [ 274.599023] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.617955] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 274.625697] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 274.632973] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 20:27:08 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00'}, 0x10) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r7, r6, &(0x7f00000000c0)=0x800007, 0x5) splice(r7, 0x0, r3, 0x0, 0x200002, 0x0) [ 274.640253] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 274.647562] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 274.654841] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00') add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) 20:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0xf) [ 275.030659] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.4'. [ 275.047510] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 275.056302] CPU: 1 PID: 15820 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 275.064208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.073609] Call Trace: [ 275.076216] dump_stack+0x1fc/0x2fe [ 275.079862] sysfs_warn_dup.cold+0x1c/0x2d [ 275.084112] sysfs_do_create_link_sd+0x116/0x130 [ 275.088884] sysfs_create_link+0x5f/0xc0 [ 275.093127] device_add+0x7d1/0x16d0 [ 275.096857] ? device_check_offline+0x280/0x280 [ 275.101563] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 275.106859] wiphy_register+0x1664/0x2130 [ 275.111023] ? bm_init+0x612/0x950 [ 275.114584] ? wiphy_unregister+0xea0/0xea0 [ 275.118925] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 275.123945] ? __kmalloc+0x38e/0x3c0 [ 275.127666] ? ieee80211_cs_list_valid+0x199/0x280 [ 275.133566] ieee80211_register_hw+0x13a7/0x3410 [ 275.138362] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 275.143301] ? memset+0x20/0x40 [ 275.146585] ? __hrtimer_init+0xe9/0x1d0 [ 275.150655] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 275.155770] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 275.160811] ? hwsim_mcast_del_radio+0x230/0x230 [ 275.165576] ? __kmalloc_track_caller+0x389/0x3c0 [ 275.170428] ? hwsim_new_radio_nl+0x273/0x850 [ 275.174939] ? memcpy+0x35/0x50 [ 275.178232] hwsim_new_radio_nl+0x5c3/0x850 [ 275.182576] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 275.187783] ? nla_parse+0x1b2/0x290 [ 275.191533] genl_family_rcv_msg+0x642/0xc40 [ 275.195950] ? genl_rcv+0x40/0x40 [ 275.199405] ? genl_rcv_msg+0x12f/0x160 [ 275.203401] ? __mutex_add_waiter+0x160/0x160 [ 275.207926] ? __radix_tree_lookup+0x216/0x370 [ 275.212532] genl_rcv_msg+0xbf/0x160 [ 275.216260] netlink_rcv_skb+0x160/0x440 [ 275.220352] ? genl_family_rcv_msg+0xc40/0xc40 [ 275.224971] ? netlink_ack+0xae0/0xae0 [ 275.228868] ? genl_rcv+0x15/0x40 [ 275.232959] genl_rcv+0x24/0x40 [ 275.236244] netlink_unicast+0x4d5/0x690 [ 275.240320] ? netlink_sendskb+0x110/0x110 [ 275.244570] ? _copy_from_iter_full+0x229/0x7c0 [ 275.249246] ? __phys_addr_symbol+0x2c/0x70 [ 275.254536] ? __check_object_size+0x17b/0x3d1 [ 275.259142] netlink_sendmsg+0x6bb/0xc40 [ 275.263306] ? aa_af_perm+0x230/0x230 [ 275.267115] ? nlmsg_notify+0x1a0/0x1a0 [ 275.271098] ? kernel_recvmsg+0x220/0x220 [ 275.275256] ? nlmsg_notify+0x1a0/0x1a0 [ 275.279262] sock_sendmsg+0xc3/0x120 [ 275.282983] ___sys_sendmsg+0x7bb/0x8e0 [ 275.286965] ? __lock_acquire+0x6de/0x3ff0 [ 275.291206] ? copy_msghdr_from_user+0x440/0x440 [ 275.295970] ? __fget+0x32f/0x510 [ 275.299445] ? lock_downgrade+0x720/0x720 [ 275.303607] ? check_preemption_disabled+0x41/0x280 [ 275.308636] ? check_preemption_disabled+0x41/0x280 [ 275.313666] ? __fget+0x356/0x510 [ 275.317124] ? do_dup2+0x450/0x450 [ 275.320675] ? __fdget+0x1d0/0x230 [ 275.324230] __x64_sys_sendmsg+0x132/0x220 [ 275.328474] ? __sys_sendmsg+0x1b0/0x1b0 [ 275.333422] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.338815] ? trace_hardirqs_off_caller+0x6e/0x210 [ 275.343842] ? do_syscall_64+0x21/0x620 [ 275.347823] do_syscall_64+0xf9/0x620 [ 275.351660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.356853] RIP: 0033:0x45de59 [ 275.360053] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.378966] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 275.386689] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 275.393968] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 275.401247] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 275.408532] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 275.415809] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:27:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2302000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 275.986816] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 276.015755] CPU: 0 PID: 15819 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 276.023668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.033029] Call Trace: [ 276.035630] dump_stack+0x1fc/0x2fe [ 276.039269] sysfs_warn_dup.cold+0x1c/0x2d [ 276.043697] sysfs_do_create_link_sd+0x116/0x130 [ 276.048468] sysfs_create_link+0x5f/0xc0 [ 276.052544] device_add+0x7d1/0x16d0 [ 276.056306] ? device_check_offline+0x280/0x280 [ 276.060984] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 276.066275] wiphy_register+0x1664/0x2130 [ 276.070460] ? bm_init+0x612/0x950 [ 276.074029] ? wiphy_unregister+0xea0/0xea0 [ 276.078380] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 276.083402] ? __kmalloc+0x38e/0x3c0 [ 276.087121] ? ieee80211_cs_list_valid+0x199/0x280 [ 276.092061] ieee80211_register_hw+0x13a7/0x3410 [ 276.096837] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 276.101779] ? memset+0x20/0x40 [ 276.105096] ? __hrtimer_init+0xe9/0x1d0 [ 276.109171] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 276.114290] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 276.119327] ? hwsim_mcast_del_radio+0x230/0x230 [ 276.124095] ? __kmalloc_track_caller+0x389/0x3c0 [ 276.128948] ? hwsim_new_radio_nl+0x273/0x850 [ 276.133452] ? memcpy+0x35/0x50 [ 276.136737] hwsim_new_radio_nl+0x5c3/0x850 [ 276.141081] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 276.146397] ? nla_parse+0x1b2/0x290 [ 276.150146] genl_family_rcv_msg+0x642/0xc40 [ 276.154569] ? genl_rcv+0x40/0x40 [ 276.158030] ? genl_rcv_msg+0x12f/0x160 [ 276.162020] ? __mutex_add_waiter+0x160/0x160 [ 276.166602] ? __radix_tree_lookup+0x216/0x370 [ 276.171205] genl_rcv_msg+0xbf/0x160 [ 276.174942] netlink_rcv_skb+0x160/0x440 [ 276.179038] ? genl_family_rcv_msg+0xc40/0xc40 [ 276.183651] ? netlink_ack+0xae0/0xae0 [ 276.187578] ? genl_rcv+0x15/0x40 [ 276.191043] genl_rcv+0x24/0x40 [ 276.194331] netlink_unicast+0x4d5/0x690 [ 276.198403] ? netlink_sendskb+0x110/0x110 [ 276.202658] ? _copy_from_iter_full+0x229/0x7c0 [ 276.207333] ? __phys_addr_symbol+0x2c/0x70 [ 276.212379] ? __check_object_size+0x17b/0x3d1 [ 276.216974] netlink_sendmsg+0x6bb/0xc40 [ 276.221070] ? aa_af_perm+0x230/0x230 [ 276.224879] ? nlmsg_notify+0x1a0/0x1a0 [ 276.228867] ? kernel_recvmsg+0x220/0x220 [ 276.233056] ? nlmsg_notify+0x1a0/0x1a0 [ 276.237053] sock_sendmsg+0xc3/0x120 [ 276.240784] ___sys_sendmsg+0x7bb/0x8e0 [ 276.244790] ? __lock_acquire+0x6de/0x3ff0 [ 276.249035] ? copy_msghdr_from_user+0x440/0x440 [ 276.253801] ? __fget+0x32f/0x510 [ 276.257270] ? lock_downgrade+0x720/0x720 [ 276.261428] ? check_preemption_disabled+0x41/0x280 [ 276.266464] ? check_preemption_disabled+0x41/0x280 [ 276.271496] ? __fget+0x356/0x510 [ 276.274957] ? do_dup2+0x450/0x450 [ 276.278510] ? __fdget+0x1d0/0x230 [ 276.282065] __x64_sys_sendmsg+0x132/0x220 [ 276.286308] ? __sys_sendmsg+0x1b0/0x1b0 [ 276.290397] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.295778] ? trace_hardirqs_off_caller+0x6e/0x210 [ 276.300836] ? do_syscall_64+0x21/0x620 [ 276.304823] do_syscall_64+0xf9/0x620 [ 276.308645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.313884] RIP: 0033:0x45de59 [ 276.317089] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.335997] RSP: 002b:00007f109a73ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 276.343740] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 276.351045] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 276.358319] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 276.365602] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 276.372877] R13: 00007ffcea5682af R14: 00007f109a73f9c0 R15: 000000000118bfd4 20:27:10 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3205, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:10 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000080)={0x81, 0x0, {0x0}, {0xffffffffffffffff}, 0x401, 0x5}) fcntl$lock(r2, 0x6, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x100000000, r3}) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 20:27:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x500) 20:27:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x40b0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_RADAR_DETECT(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9, 0x70}}}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1c6}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040800}, 0x880) [ 276.405264] netlink: 499 bytes leftover after parsing attributes in process `syz-executor.4'. [ 276.444233] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 276.490875] CPU: 1 PID: 15857 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 276.498837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.508199] Call Trace: [ 276.510833] dump_stack+0x1fc/0x2fe [ 276.514479] sysfs_warn_dup.cold+0x1c/0x2d [ 276.518726] sysfs_do_create_link_sd+0x116/0x130 [ 276.523496] sysfs_create_link+0x5f/0xc0 [ 276.527570] device_add+0x7d1/0x16d0 [ 276.531297] ? device_check_offline+0x280/0x280 [ 276.535977] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 276.541280] wiphy_register+0x1664/0x2130 [ 276.545446] ? bm_init+0x612/0x950 [ 276.549000] ? wiphy_unregister+0xea0/0xea0 [ 276.553345] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 276.558492] ? __kmalloc+0x38e/0x3c0 [ 276.562218] ? ieee80211_cs_list_valid+0x199/0x280 [ 276.567162] ieee80211_register_hw+0x13a7/0x3410 [ 276.571936] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 276.576874] ? memset+0x20/0x40 [ 276.580181] ? __hrtimer_init+0xe9/0x1d0 [ 276.584250] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 276.589387] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 276.594447] ? hwsim_mcast_del_radio+0x230/0x230 [ 276.599318] ? __kmalloc_track_caller+0x389/0x3c0 [ 276.604170] ? hwsim_new_radio_nl+0x273/0x850 [ 276.608672] ? memcpy+0x35/0x50 [ 276.611963] hwsim_new_radio_nl+0x5c3/0x850 [ 276.616297] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 276.621522] ? nla_parse+0x1b2/0x290 [ 276.625246] genl_family_rcv_msg+0x642/0xc40 [ 276.629665] ? genl_rcv+0x40/0x40 [ 276.633123] ? genl_rcv_msg+0x12f/0x160 [ 276.637105] ? __mutex_add_waiter+0x160/0x160 [ 276.641642] ? __radix_tree_lookup+0x216/0x370 [ 276.646239] genl_rcv_msg+0xbf/0x160 [ 276.649967] netlink_rcv_skb+0x160/0x440 [ 276.654045] ? genl_family_rcv_msg+0xc40/0xc40 [ 276.658638] ? netlink_ack+0xae0/0xae0 [ 276.662557] ? genl_rcv+0x15/0x40 [ 276.666028] genl_rcv+0x24/0x40 [ 276.669319] netlink_unicast+0x4d5/0x690 [ 276.673393] ? netlink_sendskb+0x110/0x110 [ 276.677638] ? _copy_from_iter_full+0x229/0x7c0 [ 276.682348] ? __phys_addr_symbol+0x2c/0x70 [ 276.686678] ? __check_object_size+0x17b/0x3d1 [ 276.691269] netlink_sendmsg+0x6bb/0xc40 [ 276.695349] ? aa_af_perm+0x230/0x230 [ 276.699158] ? nlmsg_notify+0x1a0/0x1a0 [ 276.703135] ? kernel_recvmsg+0x220/0x220 [ 276.707298] ? nlmsg_notify+0x1a0/0x1a0 [ 276.711280] sock_sendmsg+0xc3/0x120 [ 276.715003] ___sys_sendmsg+0x7bb/0x8e0 [ 276.718984] ? __lock_acquire+0x6de/0x3ff0 [ 276.723227] ? copy_msghdr_from_user+0x440/0x440 [ 276.728164] ? __fget+0x32f/0x510 [ 276.731630] ? lock_downgrade+0x720/0x720 [ 276.735788] ? check_preemption_disabled+0x41/0x280 [ 276.740823] ? check_preemption_disabled+0x41/0x280 [ 276.745856] ? __fget+0x356/0x510 [ 276.749323] ? do_dup2+0x450/0x450 [ 276.752874] ? __fdget+0x1d0/0x230 [ 276.756434] __x64_sys_sendmsg+0x132/0x220 [ 276.760682] ? __sys_sendmsg+0x1b0/0x1b0 [ 276.764778] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.770198] ? trace_hardirqs_off_caller+0x6e/0x210 [ 276.775233] ? do_syscall_64+0x21/0x620 [ 276.779220] do_syscall_64+0xf9/0x620 [ 276.783038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.788353] RIP: 0033:0x45de59 [ 276.791555] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.810476] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 276.818204] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 276.825487] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 276.832764] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 276.840039] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 276.847318] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:27:11 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r4, &(0x7f00000017c0), 0x1ab, 0x0, 0x0) read$fb(0xffffffffffffffff, 0x0, 0x0) dup2(r2, r3) bind$inet(r2, &(0x7f0000000500)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000380)={&(0x7f0000000040), 0x10, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRESOCT], 0x80}, 0x1, 0x0, 0x0, 0x801}, 0x40801) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)=ANY=[@ANYBLOB="00ca00e44135b26ac8014a00", @ANYRES16=0x0, @ANYBLOB="00042cbd7000000000000b0000000800390000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008000) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x7, 0xffffffffffffff23, 0x5, 0x6]}) fchdir(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000240)={r5, 0x0, 0x30, 0x80, 0x7}, &(0x7f0000000280)=0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @mss={0x2, 0x7ff}, @window={0x3, 0xfff7, 0x1}, @timestamp], 0x4) 20:27:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0xf00) 20:27:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0xfeffff) 20:27:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x1000000) 20:27:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x2000000) 20:27:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x5000000) 20:27:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="3502000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 277.527942] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 277.565263] CPU: 0 PID: 15872 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 277.573190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.582562] Call Trace: [ 277.585165] dump_stack+0x1fc/0x2fe [ 277.588895] sysfs_warn_dup.cold+0x1c/0x2d [ 277.593140] sysfs_do_create_link_sd+0x116/0x130 [ 277.597909] sysfs_create_link+0x5f/0xc0 [ 277.601988] device_add+0x7d1/0x16d0 [ 277.605717] ? device_check_offline+0x280/0x280 [ 277.610394] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 277.615693] wiphy_register+0x1664/0x2130 [ 277.619856] ? bm_init+0x612/0x950 [ 277.623413] ? wiphy_unregister+0xea0/0xea0 [ 277.627773] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 277.632798] ? __kmalloc+0x38e/0x3c0 [ 277.636522] ? ieee80211_cs_list_valid+0x199/0x280 [ 277.641465] ieee80211_register_hw+0x13a7/0x3410 [ 277.646265] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 277.651210] ? memset+0x20/0x40 [ 277.654498] ? __hrtimer_init+0xe9/0x1d0 [ 277.658572] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 277.663694] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 277.668735] ? hwsim_mcast_del_radio+0x230/0x230 [ 277.673529] ? __kmalloc_track_caller+0x389/0x3c0 [ 277.678411] ? hwsim_new_radio_nl+0x273/0x850 [ 277.682915] ? memcpy+0x35/0x50 [ 277.686315] hwsim_new_radio_nl+0x5c3/0x850 [ 277.690657] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 277.695861] ? nla_parse+0x1b2/0x290 [ 277.699585] genl_family_rcv_msg+0x642/0xc40 [ 277.704004] ? genl_rcv+0x40/0x40 [ 277.707465] ? genl_rcv_msg+0x12f/0x160 [ 277.711483] ? __mutex_add_waiter+0x160/0x160 [ 277.716016] ? __radix_tree_lookup+0x216/0x370 [ 277.720608] genl_rcv_msg+0xbf/0x160 [ 277.724328] netlink_rcv_skb+0x160/0x440 [ 277.728396] ? genl_family_rcv_msg+0xc40/0xc40 [ 277.732981] ? netlink_ack+0xae0/0xae0 [ 277.736872] ? genl_rcv+0x15/0x40 [ 277.740334] genl_rcv+0x24/0x40 [ 277.743616] netlink_unicast+0x4d5/0x690 [ 277.747679] ? netlink_sendskb+0x110/0x110 [ 277.751933] ? _copy_from_iter_full+0x229/0x7c0 [ 277.756603] ? __phys_addr_symbol+0x2c/0x70 [ 277.760929] ? __check_object_size+0x17b/0x3d1 [ 277.765535] netlink_sendmsg+0x6bb/0xc40 [ 277.769624] ? aa_af_perm+0x230/0x230 [ 277.773514] ? nlmsg_notify+0x1a0/0x1a0 [ 277.777501] ? kernel_recvmsg+0x220/0x220 [ 277.783489] ? nlmsg_notify+0x1a0/0x1a0 [ 277.787471] sock_sendmsg+0xc3/0x120 [ 277.791213] ___sys_sendmsg+0x7bb/0x8e0 [ 277.795192] ? __lock_acquire+0x6de/0x3ff0 [ 277.799462] ? copy_msghdr_from_user+0x440/0x440 [ 277.804229] ? __fget+0x32f/0x510 [ 277.807695] ? lock_downgrade+0x720/0x720 [ 277.811847] ? check_preemption_disabled+0x41/0x280 [ 277.816875] ? check_preemption_disabled+0x41/0x280 [ 277.821907] ? __fget+0x356/0x510 [ 277.825378] ? do_dup2+0x450/0x450 [ 277.828955] ? __fdget+0x1d0/0x230 [ 277.832513] __x64_sys_sendmsg+0x132/0x220 [ 277.836789] ? __sys_sendmsg+0x1b0/0x1b0 [ 277.840876] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.846269] ? trace_hardirqs_off_caller+0x6e/0x210 [ 277.851307] ? do_syscall_64+0x21/0x620 [ 277.855296] do_syscall_64+0xf9/0x620 [ 277.859108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.864323] RIP: 0033:0x45de59 [ 277.867532] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.886436] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 277.894152] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 277.901434] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 277.908740] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 277.916010] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 277.923713] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0xf000000) [ 278.065147] netlink: 517 bytes leftover after parsing attributes in process `syz-executor.4'. [ 278.104957] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 278.129884] CPU: 1 PID: 15917 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 278.137956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.147343] Call Trace: [ 278.149948] dump_stack+0x1fc/0x2fe [ 278.153614] sysfs_warn_dup.cold+0x1c/0x2d [ 278.157862] sysfs_do_create_link_sd+0x116/0x130 [ 278.162653] sysfs_create_link+0x5f/0xc0 [ 278.166729] device_add+0x7d1/0x16d0 [ 278.170467] ? device_check_offline+0x280/0x280 [ 278.175151] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 278.180457] wiphy_register+0x1664/0x2130 [ 278.184660] ? bm_init+0x612/0x950 [ 278.188213] ? wiphy_unregister+0xea0/0xea0 [ 278.192551] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 278.197576] ? __kmalloc+0x38e/0x3c0 [ 278.201326] ? ieee80211_cs_list_valid+0x199/0x280 [ 278.206276] ieee80211_register_hw+0x13a7/0x3410 [ 278.211051] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 278.215995] ? memset+0x20/0x40 [ 278.219283] ? __hrtimer_init+0xe9/0x1d0 [ 278.223360] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 278.228483] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 278.233527] ? hwsim_mcast_del_radio+0x230/0x230 [ 278.238291] ? __kmalloc_track_caller+0x389/0x3c0 [ 278.243144] ? hwsim_new_radio_nl+0x273/0x850 [ 278.247653] ? memcpy+0x35/0x50 [ 278.251038] hwsim_new_radio_nl+0x5c3/0x850 [ 278.255370] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 278.260576] ? nla_parse+0x1b2/0x290 [ 278.264306] genl_family_rcv_msg+0x642/0xc40 [ 278.268737] ? genl_rcv+0x40/0x40 [ 278.272194] ? genl_rcv_msg+0x12f/0x160 [ 278.276216] ? __mutex_add_waiter+0x160/0x160 [ 278.280730] ? __radix_tree_lookup+0x216/0x370 [ 278.285328] genl_rcv_msg+0xbf/0x160 [ 278.289054] netlink_rcv_skb+0x160/0x440 [ 278.293217] ? genl_family_rcv_msg+0xc40/0xc40 [ 278.297809] ? netlink_ack+0xae0/0xae0 [ 278.301748] ? genl_rcv+0x15/0x40 [ 278.305232] genl_rcv+0x24/0x40 [ 278.308522] netlink_unicast+0x4d5/0x690 [ 278.312594] ? netlink_sendskb+0x110/0x110 [ 278.316844] ? _copy_from_iter_full+0x229/0x7c0 [ 278.321520] ? __phys_addr_symbol+0x2c/0x70 [ 278.325854] ? __check_object_size+0x17b/0x3d1 [ 278.330462] netlink_sendmsg+0x6bb/0xc40 [ 278.334539] ? aa_af_perm+0x230/0x230 [ 278.338350] ? nlmsg_notify+0x1a0/0x1a0 [ 278.342330] ? kernel_recvmsg+0x220/0x220 [ 278.346497] ? nlmsg_notify+0x1a0/0x1a0 [ 278.350491] sock_sendmsg+0xc3/0x120 [ 278.354214] ___sys_sendmsg+0x7bb/0x8e0 [ 278.358203] ? __lock_acquire+0x6de/0x3ff0 [ 278.362451] ? copy_msghdr_from_user+0x440/0x440 [ 278.367244] ? __fget+0x32f/0x510 [ 278.370710] ? lock_downgrade+0x720/0x720 [ 278.374869] ? check_preemption_disabled+0x41/0x280 [ 278.379918] ? check_preemption_disabled+0x41/0x280 [ 278.384961] ? __fget+0x356/0x510 [ 278.388438] ? do_dup2+0x450/0x450 [ 278.392006] ? __fdget+0x1d0/0x230 [ 278.395561] __x64_sys_sendmsg+0x132/0x220 [ 278.399802] ? __sys_sendmsg+0x1b0/0x1b0 [ 278.403922] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.409294] ? trace_hardirqs_off_caller+0x6e/0x210 [ 278.414321] ? do_syscall_64+0x21/0x620 [ 278.418298] do_syscall_64+0xf9/0x620 [ 278.422109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.427306] RIP: 0033:0x45de59 [ 278.430499] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.449405] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.457207] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 278.464479] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 278.471753] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:27:12 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3206, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:12 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e24, @private=0xa010101}, @in={0x2, 0x4e23, @rand_addr=0x64010102}], 0x20) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0xfffffe00) [ 278.479023] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 278.486293] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 278.513222] netlink: 517 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:12 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/224) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) [ 278.544421] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 278.572877] CPU: 0 PID: 15942 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 278.580802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.590186] Call Trace: [ 278.592783] dump_stack+0x1fc/0x2fe [ 278.596447] sysfs_warn_dup.cold+0x1c/0x2d [ 278.600691] sysfs_do_create_link_sd+0x116/0x130 [ 278.605459] sysfs_create_link+0x5f/0xc0 [ 278.609535] device_add+0x7d1/0x16d0 [ 278.613260] ? device_check_offline+0x280/0x280 [ 278.617977] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 278.623287] wiphy_register+0x1664/0x2130 [ 278.627454] ? bm_init+0x612/0x950 [ 278.631015] ? wiphy_unregister+0xea0/0xea0 [ 278.635357] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 278.640408] ? __kmalloc+0x38e/0x3c0 [ 278.644162] ? ieee80211_cs_list_valid+0x199/0x280 [ 278.649110] ieee80211_register_hw+0x13a7/0x3410 [ 278.653886] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 278.658830] ? memset+0x20/0x40 [ 278.662117] ? __hrtimer_init+0xe9/0x1d0 [ 278.666184] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 278.671294] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 278.676333] ? hwsim_mcast_del_radio+0x230/0x230 [ 278.681097] ? __kmalloc_track_caller+0x389/0x3c0 [ 278.685947] ? hwsim_new_radio_nl+0x273/0x850 [ 278.690452] ? memcpy+0x35/0x50 [ 278.693743] hwsim_new_radio_nl+0x5c3/0x850 [ 278.698073] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 278.703275] ? nla_parse+0x1b2/0x290 [ 278.707030] genl_family_rcv_msg+0x642/0xc40 [ 278.711462] ? genl_rcv+0x40/0x40 [ 278.714921] ? genl_rcv_msg+0x12f/0x160 [ 278.718901] ? __mutex_add_waiter+0x160/0x160 [ 278.723420] ? __radix_tree_lookup+0x216/0x370 [ 278.728017] genl_rcv_msg+0xbf/0x160 [ 278.731747] netlink_rcv_skb+0x160/0x440 [ 278.735815] ? genl_family_rcv_msg+0xc40/0xc40 [ 278.740401] ? netlink_ack+0xae0/0xae0 [ 278.744298] ? genl_rcv+0x15/0x40 [ 278.747790] genl_rcv+0x24/0x40 [ 278.751193] netlink_unicast+0x4d5/0x690 [ 278.755361] ? netlink_sendskb+0x110/0x110 [ 278.759605] ? _copy_from_iter_full+0x229/0x7c0 [ 278.764284] ? __phys_addr_symbol+0x2c/0x70 [ 278.768615] ? __check_object_size+0x17b/0x3d1 [ 278.773245] netlink_sendmsg+0x6bb/0xc40 [ 278.777353] ? aa_af_perm+0x230/0x230 [ 278.781185] ? nlmsg_notify+0x1a0/0x1a0 [ 278.785195] ? kernel_recvmsg+0x220/0x220 [ 278.789361] ? nlmsg_notify+0x1a0/0x1a0 [ 278.793347] sock_sendmsg+0xc3/0x120 [ 278.797075] ___sys_sendmsg+0x7bb/0x8e0 [ 278.801070] ? __lock_acquire+0x6de/0x3ff0 [ 278.805345] ? copy_msghdr_from_user+0x440/0x440 [ 278.810110] ? __fget+0x32f/0x510 [ 278.813579] ? lock_downgrade+0x720/0x720 [ 278.817736] ? check_preemption_disabled+0x41/0x280 [ 278.822762] ? check_preemption_disabled+0x41/0x280 [ 278.827879] ? __fget+0x356/0x510 [ 278.831392] ? do_dup2+0x450/0x450 [ 278.834978] ? __fdget+0x1d0/0x230 [ 278.838532] __x64_sys_sendmsg+0x132/0x220 [ 278.842776] ? __sys_sendmsg+0x1b0/0x1b0 [ 278.846863] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.852261] ? trace_hardirqs_off_caller+0x6e/0x210 [ 278.857299] ? do_syscall_64+0x21/0x620 [ 278.861281] do_syscall_64+0xf9/0x620 [ 278.865101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.870296] RIP: 0033:0x45de59 [ 278.873493] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:27:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0xe8, 0x0, 0x0, 0xde, 0x0, 0x4, 0x4082c, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x40200, 0x8, 0x401, 0x9, 0x97db511, 0x0, 0x3f}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="05426dc249cd1ae2f6570d0c2f9c9fe53bb315e6a2b871b572a549d95aa1a51afe5c7af9af1942ff1233cb864614222d14c10d2ea4bc482e796e5fbf6b46f960aed4473bbf17b9000e1ae762961c4bb4afe47944781c27691f60e6f232d5c6d60712fc1bf50a478a410c6d305a34c01997e815e4af8b6d3db23c4c9c07fd660c9d4f1972789734a6072cee75c4425aaeff7e827c9e1b1195a67c47e4fc4a9204b047cf07843de318620a87eb0b4068e506dcfbbb978f537c756a4c37125b6ecfa85b64eab5590535ffce0a0ec6a868", 0xcf, 0xfffffffffffffff8) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4090, 0xffa) [ 278.892493] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.900218] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 278.907499] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 278.914794] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 278.922075] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 278.929354] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:27:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0xfeffff00000000) [ 278.964738] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 278.978031] CPU: 0 PID: 15949 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 278.985963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.995343] Call Trace: [ 278.997949] dump_stack+0x1fc/0x2fe [ 279.001619] sysfs_warn_dup.cold+0x1c/0x2d [ 279.005867] sysfs_do_create_link_sd+0x116/0x130 [ 279.010638] sysfs_create_link+0x5f/0xc0 [ 279.014710] device_add+0x7d1/0x16d0 [ 279.018440] ? device_check_offline+0x280/0x280 [ 279.023119] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 279.028415] wiphy_register+0x1664/0x2130 [ 279.032575] ? bm_init+0x612/0x950 [ 279.036128] ? wiphy_unregister+0xea0/0xea0 [ 279.040470] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 279.045495] ? __kmalloc+0x38e/0x3c0 [ 279.049215] ? ieee80211_cs_list_valid+0x199/0x280 [ 279.054245] ieee80211_register_hw+0x13a7/0x3410 [ 279.059023] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 279.063975] ? memset+0x20/0x40 [ 279.067269] ? __hrtimer_init+0xe9/0x1d0 [ 279.071340] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 279.076459] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 279.081509] ? hwsim_mcast_del_radio+0x230/0x230 [ 279.086293] ? __kmalloc_track_caller+0x389/0x3c0 [ 279.091143] ? hwsim_new_radio_nl+0x273/0x850 [ 279.095647] ? memcpy+0x35/0x50 [ 279.098938] hwsim_new_radio_nl+0x5c3/0x850 [ 279.103270] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 279.108480] ? nla_parse+0x1b2/0x290 [ 279.112215] genl_family_rcv_msg+0x642/0xc40 [ 279.116641] ? genl_rcv+0x40/0x40 [ 279.120101] ? genl_rcv_msg+0x12f/0x160 [ 279.124081] ? __mutex_add_waiter+0x160/0x160 [ 279.128606] ? __radix_tree_lookup+0x216/0x370 [ 279.133235] genl_rcv_msg+0xbf/0x160 [ 279.136967] netlink_rcv_skb+0x160/0x440 [ 279.141037] ? genl_family_rcv_msg+0xc40/0xc40 [ 279.145629] ? netlink_ack+0xae0/0xae0 [ 279.149530] ? genl_rcv+0x15/0x40 [ 279.152998] genl_rcv+0x24/0x40 [ 279.156287] netlink_unicast+0x4d5/0x690 [ 279.160361] ? netlink_sendskb+0x110/0x110 [ 279.164698] ? _copy_from_iter_full+0x229/0x7c0 [ 279.169378] ? __phys_addr_symbol+0x2c/0x70 [ 279.173715] ? __check_object_size+0x17b/0x3d1 [ 279.178307] netlink_sendmsg+0x6bb/0xc40 [ 279.182382] ? aa_af_perm+0x230/0x230 [ 279.186189] ? nlmsg_notify+0x1a0/0x1a0 [ 279.190170] ? kernel_recvmsg+0x220/0x220 [ 279.194330] ? nlmsg_notify+0x1a0/0x1a0 [ 279.198314] sock_sendmsg+0xc3/0x120 [ 279.202044] ___sys_sendmsg+0x7bb/0x8e0 [ 279.206055] ? __lock_acquire+0x6de/0x3ff0 [ 279.210337] ? copy_msghdr_from_user+0x440/0x440 [ 279.215112] ? __fget+0x32f/0x510 [ 279.218578] ? lock_downgrade+0x720/0x720 [ 279.222735] ? check_preemption_disabled+0x41/0x280 [ 279.227785] ? check_preemption_disabled+0x41/0x280 [ 279.232812] ? __fget+0x356/0x510 [ 279.236269] ? do_dup2+0x450/0x450 [ 279.239820] ? __fdget+0x1d0/0x230 [ 279.243369] __x64_sys_sendmsg+0x132/0x220 [ 279.247609] ? __sys_sendmsg+0x1b0/0x1b0 [ 279.251685] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.257086] ? trace_hardirqs_off_caller+0x6e/0x210 [ 279.263673] ? do_syscall_64+0x21/0x620 [ 279.267658] do_syscall_64+0xf9/0x620 [ 279.271473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.276672] RIP: 0033:0x45de59 [ 279.279868] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.298801] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 279.306557] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 279.313920] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 279.321221] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 279.328670] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 279.335970] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000000f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:13 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3207, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) socket$packet(0x11, 0x3, 0x300) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x100000000000000) [ 279.501342] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 279.548344] CPU: 0 PID: 15983 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 279.556443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.566246] Call Trace: [ 279.568851] dump_stack+0x1fc/0x2fe [ 279.572503] sysfs_warn_dup.cold+0x1c/0x2d [ 279.576770] sysfs_do_create_link_sd+0x116/0x130 [ 279.581541] sysfs_create_link+0x5f/0xc0 [ 279.585621] device_add+0x7d1/0x16d0 [ 279.589351] ? _raw_spin_unlock_irq+0x5a/0x80 [ 279.593858] ? device_check_offline+0x280/0x280 [ 279.598538] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 279.603855] wiphy_register+0x1664/0x2130 [ 279.608019] ? bm_init+0x612/0x950 [ 279.611577] ? wiphy_unregister+0xea0/0xea0 [ 279.615960] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 279.620995] ? __kmalloc+0x38e/0x3c0 [ 279.624737] ? ieee80211_cs_list_valid+0x199/0x280 [ 279.629687] ieee80211_register_hw+0x13a7/0x3410 [ 279.634474] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 279.639456] ? memset+0x20/0x40 [ 279.642750] ? __hrtimer_init+0xe9/0x1d0 [ 279.646826] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 279.651952] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 279.657023] ? hwsim_mcast_del_radio+0x230/0x230 [ 279.661788] ? __kmalloc_track_caller+0x389/0x3c0 [ 279.666646] ? hwsim_new_radio_nl+0x273/0x850 [ 279.671162] ? memcpy+0x35/0x50 [ 279.674451] hwsim_new_radio_nl+0x5c3/0x850 [ 279.678790] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 279.683999] ? nla_parse+0x1b2/0x290 [ 279.687725] genl_family_rcv_msg+0x642/0xc40 [ 279.692146] ? genl_rcv+0x40/0x40 20:27:13 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100e2710589eb4169050000000000000089265a03883fa62727862931ee47dcadd0ffecc219c20b0a483a61bf4f8c954321e242326cc1cad46b592f1f12e56ac732564ad276ca2e3e063040c9d83c23fc9def0fef2b6cb75a8cb38c61ea76cc2292778b20b3027a64c10911f676c0cc07be6a04000000000000001b935531f9d20f6f8cd4b764ffb007bb7ba43870ee2604bfa39947f5768a403e5c6e13e4bb095a2cc45e748add23ff7824e81ec7fa3aa6086d43ae6c86966a169f34b03553332d7bb87cfbffc2a3b0e45aa55f55343643dd3c44820ebbeadbb6e32309187521e074adb053", @ANYRES32=0x0], &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r5, 0x6, 0x2}, 0x8) r6 = accept4$alg(r3, 0x0, 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r8, r7, &(0x7f00000000c0)=0x800007, 0x5) ioctl$TCSETXF(r7, 0x5434, &(0x7f0000000080)={0xffff, 0xba75, [0x1, 0x8, 0x1f, 0x6, 0x71fa], 0x8}) splice(r0, 0x0, r6, 0x0, 0x200000, 0x0) [ 279.695600] ? genl_rcv_msg+0x12f/0x160 [ 279.699585] ? __mutex_add_waiter+0x160/0x160 [ 279.704100] ? __radix_tree_lookup+0x216/0x370 [ 279.708696] genl_rcv_msg+0xbf/0x160 [ 279.712423] netlink_rcv_skb+0x160/0x440 [ 279.716497] ? genl_family_rcv_msg+0xc40/0xc40 [ 279.721085] ? netlink_ack+0xae0/0xae0 [ 279.724979] ? genl_rcv+0x15/0x40 [ 279.728444] genl_rcv+0x24/0x40 [ 279.731752] netlink_unicast+0x4d5/0x690 [ 279.735827] ? netlink_sendskb+0x110/0x110 [ 279.740072] ? _copy_from_iter_full+0x229/0x7c0 [ 279.744751] ? __phys_addr_symbol+0x2c/0x70 [ 279.749085] ? __check_object_size+0x17b/0x3d1 [ 279.753679] netlink_sendmsg+0x6bb/0xc40 [ 279.757758] ? aa_af_perm+0x230/0x230 [ 279.761571] ? nlmsg_notify+0x1a0/0x1a0 [ 279.765556] ? kernel_recvmsg+0x220/0x220 [ 279.769727] ? nlmsg_notify+0x1a0/0x1a0 [ 279.773730] sock_sendmsg+0xc3/0x120 [ 279.777451] ___sys_sendmsg+0x7bb/0x8e0 [ 279.781430] ? __lock_acquire+0x6de/0x3ff0 [ 279.785678] ? copy_msghdr_from_user+0x440/0x440 [ 279.790441] ? __fget+0x32f/0x510 [ 279.793931] ? lock_downgrade+0x720/0x720 [ 279.798084] ? check_preemption_disabled+0x41/0x280 [ 279.803115] ? check_preemption_disabled+0x41/0x280 [ 279.808144] ? __fget+0x356/0x510 [ 279.811784] ? do_dup2+0x450/0x450 [ 279.815367] ? __fdget+0x1d0/0x230 [ 279.818950] __x64_sys_sendmsg+0x132/0x220 [ 279.823197] ? __sys_sendmsg+0x1b0/0x1b0 [ 279.827284] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.832657] ? trace_hardirqs_off_caller+0x6e/0x210 [ 279.837686] ? do_syscall_64+0x21/0x620 [ 279.841794] do_syscall_64+0xf9/0x620 [ 279.845614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.850827] RIP: 0033:0x45de59 [ 279.854042] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.872957] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 279.880809] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 279.888086] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 20:27:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e02000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x200000000000000) [ 279.895362] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 279.902644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 279.909923] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 279.970551] netlink: 510 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:14 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3208, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 280.032100] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 280.092436] CPU: 1 PID: 16002 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 280.100380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.109742] Call Trace: [ 280.112334] dump_stack+0x1fc/0x2fe [ 280.115973] sysfs_warn_dup.cold+0x1c/0x2d [ 280.120242] sysfs_do_create_link_sd+0x116/0x130 [ 280.125006] sysfs_create_link+0x5f/0xc0 [ 280.129073] device_add+0x7d1/0x16d0 [ 280.132794] ? device_check_offline+0x280/0x280 [ 280.137502] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 280.142794] wiphy_register+0x1664/0x2130 [ 280.146954] ? bm_init+0x612/0x950 [ 280.150505] ? wiphy_unregister+0xea0/0xea0 [ 280.154836] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 280.159854] ? __kmalloc+0x38e/0x3c0 [ 280.163579] ? ieee80211_cs_list_valid+0x199/0x280 [ 280.168518] ieee80211_register_hw+0x13a7/0x3410 [ 280.173290] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 280.178252] ? memset+0x20/0x40 [ 280.181546] ? __hrtimer_init+0xe9/0x1d0 [ 280.185616] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 280.190734] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 280.195785] ? hwsim_mcast_del_radio+0x230/0x230 [ 280.201352] ? __kmalloc_track_caller+0x389/0x3c0 [ 280.206200] ? hwsim_new_radio_nl+0x273/0x850 [ 280.210705] ? memcpy+0x35/0x50 [ 280.213991] hwsim_new_radio_nl+0x5c3/0x850 [ 280.218327] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 280.223533] ? nla_parse+0x1b2/0x290 [ 280.227258] genl_family_rcv_msg+0x642/0xc40 [ 280.231704] ? genl_rcv+0x40/0x40 [ 280.235184] ? genl_rcv_msg+0x12f/0x160 [ 280.239166] ? __mutex_add_waiter+0x160/0x160 [ 280.244024] ? __radix_tree_lookup+0x216/0x370 [ 280.249576] genl_rcv_msg+0xbf/0x160 [ 280.253297] netlink_rcv_skb+0x160/0x440 [ 280.257363] ? genl_family_rcv_msg+0xc40/0xc40 [ 280.261975] ? netlink_ack+0xae0/0xae0 [ 280.265868] ? genl_rcv+0x15/0x40 [ 280.269331] genl_rcv+0x24/0x40 [ 280.272618] netlink_unicast+0x4d5/0x690 [ 280.276691] ? netlink_sendskb+0x110/0x110 [ 280.280938] ? _copy_from_iter_full+0x229/0x7c0 [ 280.285608] ? __phys_addr_symbol+0x2c/0x70 [ 280.289932] ? __check_object_size+0x17b/0x3d1 [ 280.294522] netlink_sendmsg+0x6bb/0xc40 [ 280.298592] ? aa_af_perm+0x230/0x230 [ 280.302393] ? nlmsg_notify+0x1a0/0x1a0 [ 280.306372] ? kernel_recvmsg+0x220/0x220 [ 280.310540] ? nlmsg_notify+0x1a0/0x1a0 [ 280.314523] sock_sendmsg+0xc3/0x120 [ 280.318275] ___sys_sendmsg+0x7bb/0x8e0 [ 280.322260] ? __lock_acquire+0x6de/0x3ff0 [ 280.326502] ? copy_msghdr_from_user+0x440/0x440 [ 280.331265] ? __fget+0x32f/0x510 [ 280.334732] ? lock_downgrade+0x720/0x720 [ 280.338887] ? check_preemption_disabled+0x41/0x280 [ 280.343949] ? check_preemption_disabled+0x41/0x280 [ 280.348981] ? __fget+0x356/0x510 [ 280.352445] ? do_dup2+0x450/0x450 [ 280.356026] ? __fdget+0x1d0/0x230 [ 280.359579] __x64_sys_sendmsg+0x132/0x220 [ 280.364461] ? __sys_sendmsg+0x1b0/0x1b0 [ 280.368547] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.373921] ? trace_hardirqs_off_caller+0x6e/0x210 [ 280.379121] ? do_syscall_64+0x21/0x620 [ 280.383103] do_syscall_64+0xf9/0x620 [ 280.386917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.392151] RIP: 0033:0x45de59 [ 280.395353] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.414263] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.421985] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 280.429265] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 280.436627] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:27:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x500000000000000) 20:27:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x40}, 0x40) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) ioctl$vim2m_VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000500)={0xc6, 0x1, 0x4, 0x8, 0x8, {r5, r6/1000+60000}, {0x4, 0xc, 0x4, 0x3f, 0x0, 0x80, "e2a6aa12"}, 0x400, 0x1, @userptr=0x3, 0x20, 0x0, r2}) splice(r4, &(0x7f00000003c0), r7, &(0x7f0000000440)=0x101, 0x100, 0x8) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0101ff9a", @ANYRES32=0x0], &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000300)={r9, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000000)={r9, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1, 0x7fffffff, 0x8, 0x5}, &(0x7f0000000100)=0x98) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0xfe81) [ 280.444004] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 280.451460] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0xf00000000000000) [ 280.571050] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 280.590626] CPU: 1 PID: 16011 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 280.598541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.607902] Call Trace: [ 280.610506] dump_stack+0x1fc/0x2fe [ 280.614159] sysfs_warn_dup.cold+0x1c/0x2d [ 280.618414] sysfs_do_create_link_sd+0x116/0x130 [ 280.623191] sysfs_create_link+0x5f/0xc0 [ 280.627267] device_add+0x7d1/0x16d0 [ 280.631003] ? device_check_offline+0x280/0x280 [ 280.635685] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 280.640989] wiphy_register+0x1664/0x2130 [ 280.645164] ? bm_init+0x612/0x950 [ 280.648718] ? wiphy_unregister+0xea0/0xea0 [ 280.653059] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 280.658080] ? __kmalloc+0x38e/0x3c0 [ 280.661807] ? ieee80211_cs_list_valid+0x199/0x280 [ 280.666751] ieee80211_register_hw+0x13a7/0x3410 [ 280.671525] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 280.676466] ? memset+0x20/0x40 [ 280.679753] ? __hrtimer_init+0xe9/0x1d0 [ 280.683823] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 280.688939] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 280.693979] ? hwsim_mcast_del_radio+0x230/0x230 [ 280.698771] ? __kmalloc_track_caller+0x389/0x3c0 [ 280.703640] ? hwsim_new_radio_nl+0x273/0x850 [ 280.708148] ? memcpy+0x35/0x50 [ 280.711447] hwsim_new_radio_nl+0x5c3/0x850 [ 280.715778] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 280.720982] ? nla_parse+0x1b2/0x290 [ 280.724709] genl_family_rcv_msg+0x642/0xc40 [ 280.729148] ? genl_rcv+0x40/0x40 [ 280.732609] ? genl_rcv_msg+0x12f/0x160 [ 280.736591] ? __mutex_add_waiter+0x160/0x160 [ 280.741106] ? __radix_tree_lookup+0x216/0x370 [ 280.745711] genl_rcv_msg+0xbf/0x160 [ 280.749451] netlink_rcv_skb+0x160/0x440 [ 280.753525] ? genl_family_rcv_msg+0xc40/0xc40 [ 280.758127] ? netlink_ack+0xae0/0xae0 [ 280.762028] ? genl_rcv+0x15/0x40 [ 280.765518] genl_rcv+0x24/0x40 [ 280.768805] netlink_unicast+0x4d5/0x690 [ 280.772877] ? netlink_sendskb+0x110/0x110 [ 280.777128] ? _copy_from_iter_full+0x229/0x7c0 [ 280.781799] ? __phys_addr_symbol+0x2c/0x70 [ 280.786133] ? __check_object_size+0x17b/0x3d1 [ 280.790727] netlink_sendmsg+0x6bb/0xc40 [ 280.794799] ? aa_af_perm+0x230/0x230 [ 280.798612] ? nlmsg_notify+0x1a0/0x1a0 [ 280.802614] ? kernel_recvmsg+0x220/0x220 [ 280.806784] ? nlmsg_notify+0x1a0/0x1a0 [ 280.810775] sock_sendmsg+0xc3/0x120 [ 280.814505] ___sys_sendmsg+0x7bb/0x8e0 [ 280.818487] ? __lock_acquire+0x6de/0x3ff0 [ 280.822732] ? copy_msghdr_from_user+0x440/0x440 [ 280.827495] ? __fget+0x32f/0x510 [ 280.830968] ? lock_downgrade+0x720/0x720 [ 280.835127] ? check_preemption_disabled+0x41/0x280 [ 280.840185] ? check_preemption_disabled+0x41/0x280 [ 280.845215] ? __fget+0x356/0x510 [ 280.848678] ? do_dup2+0x450/0x450 [ 280.852256] ? __fdget+0x1d0/0x230 [ 280.855810] __x64_sys_sendmsg+0x132/0x220 [ 280.860077] ? __sys_sendmsg+0x1b0/0x1b0 [ 280.864158] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.869556] ? trace_hardirqs_off_caller+0x6e/0x210 [ 280.874588] ? do_syscall_64+0x21/0x620 [ 280.878582] do_syscall_64+0xf9/0x620 [ 280.882396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.887586] RIP: 0033:0x45de59 [ 280.890779] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.909689] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:27:15 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 280.917413] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 280.924692] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 280.931990] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 280.939268] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 280.946568] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e03000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xf796}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) fdatasync(0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000100)=ANY=[@ANYBLOB="fcec3a0aa6756c53f237196b137189"]) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) r3 = getpid() ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) sched_setscheduler(r3, 0x5, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x800007, 0x5) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={'wlan1\x00', 0x8000, 0x2}) sendmmsg(r2, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r4) keyctl$read(0xb, r5, 0x0, 0x0) 20:27:15 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e04000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:15 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) splice(r0, 0x0, r5, 0x0, 0x2, 0x3) 20:27:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e05000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:15 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r6, r5, &(0x7f00000000c0)=0x800007, 0x5) ioctl$DRM_IOCTL_UNLOCK(r5, 0x4008642b, &(0x7f0000000080)={0x0, 0x1}) 20:27:15 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3209, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:15 executing program 3: ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xc1022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9c0000006400010028f3f9ffffffffffff000000", @ANYRES32=0x0, @ANYBLOB="00000300e0ff0f0006000f0009000100727376700000000014000200080003000a01010008000300e000000108000b000001000006000500b5ff00000b000100666c6f77657200001c000200050049004900000008006000ff070000050033000000000008000b000100000008000b000300000006000500c31800000600050003040000"], 0x9c}, 0x1, 0x0, 0x0, 0xb686d6dc3a4b376d}, 0x44041) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x2, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) keyctl$read(0xb, r0, &(0x7f0000001480)=""/4104, 0x1008) 20:27:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e06000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:15 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x43, 0x0) ioctl$NBD_DO_IT(r3, 0xab03) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 281.822103] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 281.846590] CPU: 0 PID: 16081 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 281.854507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.863896] Call Trace: [ 281.866500] dump_stack+0x1fc/0x2fe [ 281.870142] sysfs_warn_dup.cold+0x1c/0x2d [ 281.874384] sysfs_do_create_link_sd+0x116/0x130 [ 281.879170] sysfs_create_link+0x5f/0xc0 [ 281.883270] device_add+0x7d1/0x16d0 [ 281.887020] ? device_check_offline+0x280/0x280 [ 281.891699] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 281.896997] wiphy_register+0x1664/0x2130 [ 281.901172] ? bm_init+0x612/0x950 [ 281.905072] ? wiphy_unregister+0xea0/0xea0 [ 281.909434] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 281.914503] ? __kmalloc+0x38e/0x3c0 [ 281.918227] ? ieee80211_cs_list_valid+0x199/0x280 [ 281.923167] ieee80211_register_hw+0x13a7/0x3410 [ 281.927945] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 281.932885] ? memset+0x20/0x40 [ 281.936174] ? __hrtimer_init+0xe9/0x1d0 [ 281.940273] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 281.945401] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 281.950465] ? hwsim_mcast_del_radio+0x230/0x230 [ 281.955232] ? __kmalloc_track_caller+0x389/0x3c0 [ 281.960084] ? hwsim_new_radio_nl+0x273/0x850 [ 281.964588] ? memcpy+0x35/0x50 [ 281.967881] hwsim_new_radio_nl+0x5c3/0x850 [ 281.972215] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 281.977461] ? nla_parse+0x1b2/0x290 [ 281.981220] genl_family_rcv_msg+0x642/0xc40 [ 281.985664] ? genl_rcv+0x40/0x40 [ 281.989121] ? genl_rcv_msg+0x12f/0x160 [ 281.993133] ? __mutex_add_waiter+0x160/0x160 [ 281.997648] ? __radix_tree_lookup+0x216/0x370 [ 282.002338] genl_rcv_msg+0xbf/0x160 [ 282.006067] netlink_rcv_skb+0x160/0x440 [ 282.010223] ? genl_family_rcv_msg+0xc40/0xc40 [ 282.014812] ? netlink_ack+0xae0/0xae0 [ 282.018721] ? genl_rcv+0x15/0x40 20:27:16 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) vmsplice(r3, &(0x7f0000000200)=[{&(0x7f0000000080)="bf00bf85b51d59e96eff0f000000", 0xe}, {&(0x7f0000000140)="58a5338a5d98c85718f76ccb36b4cf877f0db8851804b1ed9e2d32cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec", 0x33}], 0x2, 0x9) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 282.022190] genl_rcv+0x24/0x40 [ 282.025482] netlink_unicast+0x4d5/0x690 [ 282.029559] ? netlink_sendskb+0x110/0x110 [ 282.033807] ? _copy_from_iter_full+0x229/0x7c0 [ 282.038487] ? __phys_addr_symbol+0x2c/0x70 [ 282.042816] ? __check_object_size+0x17b/0x3d1 [ 282.047410] netlink_sendmsg+0x6bb/0xc40 [ 282.051496] ? aa_af_perm+0x230/0x230 [ 282.055307] ? nlmsg_notify+0x1a0/0x1a0 [ 282.059293] ? kernel_recvmsg+0x220/0x220 [ 282.063494] ? nlmsg_notify+0x1a0/0x1a0 [ 282.067490] sock_sendmsg+0xc3/0x120 [ 282.071212] ___sys_sendmsg+0x7bb/0x8e0 [ 282.075196] ? __lock_acquire+0x6de/0x3ff0 [ 282.079460] ? copy_msghdr_from_user+0x440/0x440 [ 282.084224] ? __fget+0x32f/0x510 [ 282.087696] ? lock_downgrade+0x720/0x720 [ 282.091853] ? check_preemption_disabled+0x41/0x280 [ 282.096881] ? check_preemption_disabled+0x41/0x280 [ 282.101910] ? __fget+0x356/0x510 [ 282.105377] ? do_dup2+0x450/0x450 [ 282.108932] ? __fdget+0x1d0/0x230 [ 282.112484] __x64_sys_sendmsg+0x132/0x220 [ 282.116731] ? __sys_sendmsg+0x1b0/0x1b0 [ 282.121271] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.126644] ? trace_hardirqs_off_caller+0x6e/0x210 [ 282.131671] ? do_syscall_64+0x21/0x620 [ 282.135651] do_syscall_64+0xf9/0x620 [ 282.140506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.145691] RIP: 0033:0x45de59 [ 282.148906] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:27:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e07000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r0, 0x1) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000100)=""/255) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 282.167804] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 282.175517] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 282.182784] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 282.190138] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 282.197406] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 282.204688] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e08000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101080, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000500)={0xe7, ""/231}) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf34fcdc2165ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x7c, r4) keyctl$search(0xa, r3, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$assume_authority(0x10, r3) 20:27:16 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x320a, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='user\x00', 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="5b0f219be35308d2bd3ccfd4635d88d5634c25a5d0cb1f5376239f589601e486151b2b5dba43917e9e9ba92940b0586a40456a0daf315b49f0a043b8c7c23002f61f13e501c0903aa0c047add3760dae9156456631760ed487f1ddfb58a269861b3165420c8804c4513fecb3287b2ead21f66ed524e16e9b8539041303d3e0cd62aee75ca100", 0x86, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000001ac0)=""/4110, 0xffffffffffffffe2) 20:27:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e09000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 282.442785] Unknown ioctl 21381 [ 282.472220] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 282.478865] Unknown ioctl 21381 [ 282.509182] CPU: 1 PID: 16120 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 282.517103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.526466] Call Trace: [ 282.529069] dump_stack+0x1fc/0x2fe [ 282.532727] sysfs_warn_dup.cold+0x1c/0x2d [ 282.536977] sysfs_do_create_link_sd+0x116/0x130 [ 282.541751] sysfs_create_link+0x5f/0xc0 [ 282.545851] device_add+0x7d1/0x16d0 [ 282.549578] ? device_check_offline+0x280/0x280 [ 282.554266] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 282.559569] wiphy_register+0x1664/0x2130 [ 282.563737] ? bm_init+0x612/0x950 [ 282.567319] ? wiphy_unregister+0xea0/0xea0 [ 282.571682] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 282.576707] ? __kmalloc+0x38e/0x3c0 [ 282.580429] ? ieee80211_cs_list_valid+0x199/0x280 [ 282.585373] ieee80211_register_hw+0x13a7/0x3410 [ 282.590153] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 282.595096] ? memset+0x20/0x40 [ 282.598412] ? __hrtimer_init+0xe9/0x1d0 [ 282.602487] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 282.607605] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 282.612663] ? hwsim_mcast_del_radio+0x230/0x230 [ 282.617433] ? __kmalloc_track_caller+0x389/0x3c0 [ 282.622285] ? hwsim_new_radio_nl+0x273/0x850 [ 282.626816] ? memcpy+0x35/0x50 [ 282.630111] hwsim_new_radio_nl+0x5c3/0x850 [ 282.634450] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 282.639666] ? nla_parse+0x1b2/0x290 [ 282.643399] genl_family_rcv_msg+0x642/0xc40 [ 282.647941] ? genl_rcv+0x40/0x40 [ 282.651422] ? genl_rcv_msg+0x12f/0x160 [ 282.655413] ? __mutex_add_waiter+0x160/0x160 [ 282.660101] ? __radix_tree_lookup+0x216/0x370 [ 282.664704] genl_rcv_msg+0xbf/0x160 [ 282.668429] netlink_rcv_skb+0x160/0x440 [ 282.672505] ? genl_family_rcv_msg+0xc40/0xc40 [ 282.677094] ? netlink_ack+0xae0/0xae0 [ 282.681027] ? genl_rcv+0x15/0x40 [ 282.684500] genl_rcv+0x24/0x40 [ 282.687790] netlink_unicast+0x4d5/0x690 [ 282.691863] ? netlink_sendskb+0x110/0x110 [ 282.696115] ? _copy_from_iter_full+0x229/0x7c0 [ 282.700794] ? __phys_addr_symbol+0x2c/0x70 [ 282.705130] ? __check_object_size+0x17b/0x3d1 [ 282.709728] netlink_sendmsg+0x6bb/0xc40 [ 282.713809] ? aa_af_perm+0x230/0x230 [ 282.717617] ? nlmsg_notify+0x1a0/0x1a0 [ 282.721598] ? kernel_recvmsg+0x220/0x220 [ 282.725781] ? nlmsg_notify+0x1a0/0x1a0 [ 282.729765] sock_sendmsg+0xc3/0x120 [ 282.733523] ___sys_sendmsg+0x7bb/0x8e0 [ 282.737508] ? __lock_acquire+0x6de/0x3ff0 [ 282.741841] ? copy_msghdr_from_user+0x440/0x440 [ 282.746621] ? __fget+0x32f/0x510 [ 282.750088] ? lock_downgrade+0x720/0x720 [ 282.754260] ? check_preemption_disabled+0x41/0x280 [ 282.759317] ? check_preemption_disabled+0x41/0x280 [ 282.764346] ? __fget+0x356/0x510 [ 282.767822] ? do_dup2+0x450/0x450 [ 282.771403] ? __fdget+0x1d0/0x230 [ 282.774956] __x64_sys_sendmsg+0x132/0x220 [ 282.779204] ? __sys_sendmsg+0x1b0/0x1b0 [ 282.783313] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.788691] ? trace_hardirqs_off_caller+0x6e/0x210 [ 282.793719] ? do_syscall_64+0x21/0x620 [ 282.798241] do_syscall_64+0xf9/0x620 [ 282.802063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.807259] RIP: 0033:0x45de59 20:27:16 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000240)="09f9641f1e9587b95db77b9f971c6b7116378947ed14b91d6f0532ad8690e80276304f489db06adfcf4291b75ae0b28188b8963d02667b3a024eebb60da96a69fef64be9387225130cf8c1faf63d7c7fa1e342d408df951e86f615d8df90dfbd5fd6e4cfebe7822c13e3fcdb5bcce1aaa6e2e819c4d6ec307cbb143dd96e4aa5fc7a55fe150ab6da8cb13a9aeebab108299958965711ad90de13c59d5ef44942dda50370bed9c7f806d39d316f7cd34d3f55086bf496ebbf1d5ea81ec4fcbfb2658e81b430374dc0120956fcd3c1b4167e55dcd7bdd31d9a5d71a577e4a673191365bf739b1ce66d260916090cb54bd690d246d861e6639a93", 0xf9, r1) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r4) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$link(0x8, r3, r0) 20:27:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000002c0)=0x20000) ptrace$peekuser(0x3, 0x0, 0x800) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="650158c1e500c0cf8dcb52ad3016962dd542498800b2eec0c7304aedb1ba73da54a927b6cc1a733c0a7871723321dba699dae891bc87e545d213245f23a4dbee92510d76fb6c0981ef1a9889405c1e90bacad9b25d5f81516e6d2afc8d6f7b8735f8e68a25912f75bbb4a67ab38937f7a35944f24d3c8c2b002cbca7396f1090a9aef4a42d8f74c34555a828a2396a12a4c02fdb2e7a44a4a6382c2f7c438ab004c0be35221d156d84fba35c153526df68000000000000", @ANYRES16=0x0, @ANYBLOB="040025bd7000fedbdf251600000014000580080001006574680008000100756470000c0005800700010069620000500002800800020001000000040004000c00038008000100040000000800010031210000080002001f00000008000200030000000c00038008000200ff07000004000400040004000800020001040000600001801c00028008000200040000000800030001000000080003002000000038000400200001000a004e2300000caffc020000000000000000000000000000060000001400020002004e20ac141415000000000000000008000300001e0000"], 0xe4}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) [ 282.810478] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.829480] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 282.837200] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 282.844656] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 282.851935] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 282.859222] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 282.866591] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 282.916094] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 282.933778] CPU: 1 PID: 16120 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 282.941704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.951072] Call Trace: [ 282.953679] dump_stack+0x1fc/0x2fe [ 282.957327] sysfs_warn_dup.cold+0x1c/0x2d [ 282.961573] sysfs_do_create_link_sd+0x116/0x130 20:27:17 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) r4 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r6, r5, &(0x7f00000000c0)=0x800007, 0x5) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r8, r7, &(0x7f00000000c0)=0x800007, 0x5) r9 = syz_mount_image$efs(&(0x7f0000000100)='efs\x00', &(0x7f0000000180)='.\x00', 0x9, 0x6, &(0x7f00000007c0)=[{&(0x7f00000002c0)="2bd860a3c5262a0094a63595f6a304700096b0c47f22be65c5b5bfc6628625e6451d3068a74bbdb22089eeed067e18e5a32b9de175ce07d73591b8a55911323a69870106eae98d9e099e68699dfedf044ca25847068594156318d2a370b7d153d8ff13a9fb475ab63ae11dd511f675dc0b56dc14bc7a94083857ef3b8a773e682cc874cf3a91318fa95bac12d4b33e28ea389f20242ee85b11187ad435afc2d143594e90ed058d0f0dec32cf54", 0xad, 0x100}, {&(0x7f0000000380)="234115360dd944b06317675130ae23b528b7ff2b6d9b6c8699f0358c37ea120b04f7e5b63d952e9b3f59c1e202cd8c320ed9f742449eddc27c8aa723e1bc7a34acf38c54eb61aa36fc4c32faae86e637a7c404760cd4f66047e06a39aa476c37ea1cf1991fc8492d0f04849ab2cf3c39a3fb48d17a675c77758398830d14c763ceb67fe663c300b8adb44b720cb7ce101e39f567275fa1f41d85395a2e5b66c22c15612f6ffc44409bcdcc5fefcb5fda5f1517a7f9d4e2280c01f41db8c8fbe4b99fa08ec69cf979", 0xc8, 0x8}, {&(0x7f0000000480)="f74219474eb00c2c3a414b25346e689f4f8c66605438d89e61da97b2eac5c88cd2b6e59ac28b3e1c2fbc338dba840dd9f192d6ebe2a43650dea056f9dc4d9ff23f5d6b7f55393ad9818b282229a57ea801f39104cfd96621fd9eea34da761530e594273c052ef0e47ce2420942bf68b33fee75ed758b1ed405ee849670b4340c88102f5c544fc29ce0fdd76bd998", 0x8e, 0x7}, {&(0x7f0000000540)="2b03ab87384615d3cdc6a3b63050cb2a1a0e3565a4c55c77258e5bdd30a1187846734cdcd512d3944d6a7bd6ea4b7d04d80bb2950161ae49fc2b748795d15a53810ddda9a2495e9afef48290c2c1bc97c4669f49b09b637d236eee1e3f25cbd76e5c5a070f521e24856013b896da288f7ccd1a125e971487d48b3795cf78aa00f4091d5e74aad3273b59522ced9505c9bed5d67e65273a0b31cb4d", 0x9b, 0x100}, {&(0x7f0000000600)="839532a0647f5533a8cdb808b7b62cc5bbabacd5f10a19874795c26f91c4b118eab8f097f8e00fd9909cecb0e2ad1960258922d3fa9a431840a63fb6da63a0a74e269b58d3ac6e404ffb622045dfc01f98705fd66f77fd2fca2665692e947200f765299c87bb437782e27b4f37978a44776ed34dbddfd2a8ae150608bf49aa74bf65a75f44b2c16ab627e35d162335c9667c36b551c79f28ca77a069658242afe2335c5dcfe3621b4c9a476727786d25890d8208e16b2c6cadb45adc600e93af4d3435164d5fa8921a88f7463ecad4d08aa7d52b394cc4e16f15c08b527d86c7c6aa09203ea29b55cec4e0d25f95", 0xee, 0x7}, {&(0x7f0000000700)="a11b7e424fc475c50216724c32862ad691a5ad37fec1f741472402f077b2ea6960640ed3495c7fa4b02f20aea59ec23e7f025ca08fe4737bbefef3640fec5fff982f9c40f1f02488810ff3f8d873e79b876cf9fddb68cbf5f6935cdadbe12066ac9e00173add075695be6175914dad7562b65a9b4a7c9fa40815fe281a8fcf1b30bd36", 0x83, 0x80000000}], 0x2, &(0x7f00000001c0)={[{}, {}], [{@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x34, 0x61, 0x66, 0x32, 0x65, 0x0, 0x35], 0x2d, [0x32, 0x30, 0x64, 0x35], 0x2d, [0x34, 0x35, 0x33, 0x39], 0x2d, [0x65, 0x35, 0x63, 0x34], 0x2d, [0x34, 0x61, 0x38, 0x66, 0x38, 0x32, 0x36]}}}]}) splice(r8, 0x0, r9, 0x0, 0x3, 0x0) 20:27:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) fanotify_init(0x0, 0x400) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0a000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 282.966346] sysfs_create_link+0x5f/0xc0 [ 282.970440] device_add+0x7d1/0x16d0 [ 282.974192] ? device_check_offline+0x280/0x280 [ 282.978879] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 282.984184] wiphy_register+0x1664/0x2130 [ 282.988353] ? bm_init+0x612/0x950 [ 282.991911] ? wiphy_unregister+0xea0/0xea0 [ 282.996278] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 283.001495] ? __kmalloc+0x38e/0x3c0 [ 283.005224] ? ieee80211_cs_list_valid+0x199/0x280 [ 283.010171] ieee80211_register_hw+0x13a7/0x3410 [ 283.014951] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 283.019904] ? memset+0x20/0x40 [ 283.023211] ? __hrtimer_init+0xe9/0x1d0 [ 283.027299] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 283.032432] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 283.037481] ? hwsim_mcast_del_radio+0x230/0x230 [ 283.042250] ? __kmalloc_track_caller+0x389/0x3c0 [ 283.047124] ? hwsim_new_radio_nl+0x273/0x850 [ 283.051627] ? memcpy+0x35/0x50 [ 283.054935] hwsim_new_radio_nl+0x5c3/0x850 [ 283.059275] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 283.065263] ? nla_parse+0x1b2/0x290 [ 283.068984] genl_family_rcv_msg+0x642/0xc40 [ 283.073420] ? genl_rcv+0x40/0x40 [ 283.076877] ? genl_rcv_msg+0x12f/0x160 [ 283.080856] ? __mutex_add_waiter+0x160/0x160 [ 283.085365] ? __radix_tree_lookup+0x216/0x370 [ 283.090223] genl_rcv_msg+0xbf/0x160 [ 283.093951] netlink_rcv_skb+0x160/0x440 [ 283.098038] ? genl_family_rcv_msg+0xc40/0xc40 [ 283.102625] ? netlink_ack+0xae0/0xae0 [ 283.106516] ? genl_rcv+0x15/0x40 [ 283.109996] genl_rcv+0x24/0x40 [ 283.113293] netlink_unicast+0x4d5/0x690 [ 283.117360] ? netlink_sendskb+0x110/0x110 [ 283.121598] ? _copy_from_iter_full+0x229/0x7c0 [ 283.126279] ? __phys_addr_symbol+0x2c/0x70 [ 283.130600] ? __check_object_size+0x17b/0x3d1 [ 283.135204] netlink_sendmsg+0x6bb/0xc40 [ 283.139269] ? aa_af_perm+0x230/0x230 [ 283.143071] ? nlmsg_notify+0x1a0/0x1a0 [ 283.147044] ? kernel_recvmsg+0x220/0x220 [ 283.151201] ? nlmsg_notify+0x1a0/0x1a0 [ 283.155178] sock_sendmsg+0xc3/0x120 [ 283.158899] ___sys_sendmsg+0x7bb/0x8e0 [ 283.162887] ? __lock_acquire+0x6de/0x3ff0 [ 283.167121] ? copy_msghdr_from_user+0x440/0x440 [ 283.171881] ? __fget+0x32f/0x510 [ 283.175336] ? lock_downgrade+0x720/0x720 [ 283.179484] ? check_preemption_disabled+0x41/0x280 [ 283.184502] ? check_preemption_disabled+0x41/0x280 [ 283.189524] ? __fget+0x356/0x510 [ 283.192982] ? do_dup2+0x450/0x450 [ 283.196524] ? __fdget+0x1d0/0x230 [ 283.200069] __x64_sys_sendmsg+0x132/0x220 [ 283.204302] ? __sys_sendmsg+0x1b0/0x1b0 [ 283.208466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.214702] ? trace_hardirqs_off_caller+0x6e/0x210 [ 283.220066] ? do_syscall_64+0x21/0x620 [ 283.224048] do_syscall_64+0xf9/0x620 [ 283.227871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.233059] RIP: 0033:0x45de59 [ 283.236249] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.255167] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 283.262879] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 283.270151] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 283.277431] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 283.284703] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 283.291987] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0b000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x12081) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000080)={0x48, 0x42, &(0x7f0000000100)="ecdb87ef7b0b3551fcfcd70111e2f6e1eeb7b0341bc15ee6d47983a562b26191cc30b1e8313973bbc1c7b9594eeb307f3a08308dbf6ef5e50fc29e8240fd0c3854e5aee54d1edd06120e4f69cf864b854d08a2dc5151af218cad8979102b30e8347679a30931e6572b5bd018a864d8446046ce01ac148edc9a1b8e80a00b9f14e884cfba464757ca5ab224099f4d79f1a3d9956d62dbc30203d9dfb24f40553830031603d008d6f6f61632c62f0c88f00de37d3309edcfba", {0x1, 0x0, 0x31303553, 0x8, 0x8, 0x4, 0xa, 0xfff}}) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0e000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:17 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x320b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000080)) 20:27:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e10000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 283.698712] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 283.738753] CPU: 0 PID: 16198 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 283.746702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.756079] Call Trace: [ 283.758719] dump_stack+0x1fc/0x2fe [ 283.762368] sysfs_warn_dup.cold+0x1c/0x2d [ 283.766619] sysfs_do_create_link_sd+0x116/0x130 [ 283.771390] sysfs_create_link+0x5f/0xc0 [ 283.775737] device_add+0x7d1/0x16d0 [ 283.779472] ? device_check_offline+0x280/0x280 [ 283.784151] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 283.789478] wiphy_register+0x1664/0x2130 [ 283.793647] ? bm_init+0x612/0x950 [ 283.797202] ? wiphy_unregister+0xea0/0xea0 [ 283.801546] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 283.806681] ? __kmalloc+0x38e/0x3c0 [ 283.810441] ? ieee80211_cs_list_valid+0x199/0x280 [ 283.815427] ieee80211_register_hw+0x13a7/0x3410 [ 283.820219] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 283.825160] ? memset+0x20/0x40 [ 283.828444] ? __hrtimer_init+0xe9/0x1d0 [ 283.832515] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 283.837640] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 283.842684] ? hwsim_mcast_del_radio+0x230/0x230 [ 283.847455] ? __kmalloc_track_caller+0x389/0x3c0 [ 283.852317] ? hwsim_new_radio_nl+0x273/0x850 [ 283.856820] ? memcpy+0x35/0x50 [ 283.860114] hwsim_new_radio_nl+0x5c3/0x850 [ 283.864454] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 283.869691] ? nla_parse+0x1b2/0x290 [ 283.873453] genl_family_rcv_msg+0x642/0xc40 [ 283.877887] ? genl_rcv+0x40/0x40 [ 283.881345] ? genl_rcv_msg+0x12f/0x160 [ 283.885331] ? __mutex_add_waiter+0x160/0x160 [ 283.889847] ? __radix_tree_lookup+0x216/0x370 [ 283.894550] genl_rcv_msg+0xbf/0x160 [ 283.898283] netlink_rcv_skb+0x160/0x440 [ 283.902361] ? genl_family_rcv_msg+0xc40/0xc40 [ 283.906958] ? netlink_ack+0xae0/0xae0 [ 283.910878] ? genl_rcv+0x15/0x40 [ 283.914349] genl_rcv+0x24/0x40 [ 283.917646] netlink_unicast+0x4d5/0x690 [ 283.921722] ? netlink_sendskb+0x110/0x110 [ 283.925970] ? _copy_from_iter_full+0x229/0x7c0 [ 283.930668] ? __phys_addr_symbol+0x2c/0x70 [ 283.935001] ? __check_object_size+0x17b/0x3d1 [ 283.939603] netlink_sendmsg+0x6bb/0xc40 [ 283.943702] ? aa_af_perm+0x230/0x230 [ 283.947514] ? nlmsg_notify+0x1a0/0x1a0 [ 283.951504] ? kernel_recvmsg+0x220/0x220 [ 283.955669] ? nlmsg_notify+0x1a0/0x1a0 [ 283.959646] sock_sendmsg+0xc3/0x120 [ 283.963361] ___sys_sendmsg+0x7bb/0x8e0 [ 283.967338] ? __lock_acquire+0x6de/0x3ff0 [ 283.971589] ? copy_msghdr_from_user+0x440/0x440 [ 283.976375] ? __fget+0x32f/0x510 [ 283.979859] ? lock_downgrade+0x720/0x720 [ 283.984032] ? check_preemption_disabled+0x41/0x280 [ 283.989065] ? check_preemption_disabled+0x41/0x280 [ 283.994104] ? __fget+0x356/0x510 [ 283.997574] ? do_dup2+0x450/0x450 [ 284.001126] ? __fdget+0x1d0/0x230 [ 284.004688] __x64_sys_sendmsg+0x132/0x220 [ 284.008927] ? __sys_sendmsg+0x1b0/0x1b0 [ 284.013029] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.018773] ? trace_hardirqs_off_caller+0x6e/0x210 [ 284.023796] ? do_syscall_64+0x21/0x620 [ 284.027779] do_syscall_64+0xf9/0x620 [ 284.031587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.036777] RIP: 0033:0x45de59 [ 284.039998] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.058903] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 284.066616] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 284.073888] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 284.081160] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 284.088438] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c 20:27:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x140e, 0x200, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x5}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r5, 0x20, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x4080) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x81}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg2\x00'}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xe4c9}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x7c}}, 0x24000090) 20:27:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x80080) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)={0x18, r5, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xc8, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x94, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xed}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8d5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1b29}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4}, 0x15) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r7, r6, &(0x7f00000000c0)=0x800007, 0x5) ioctl$TCXONC(r6, 0x540a, 0x2) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r8 = accept4(r2, 0x0, 0x0, 0x0) r9 = accept4$alg(r8, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x200000, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="880000000208010400000000000000000000000005000300210000001c000480080001400000000308000140000000f5efff0140000000e006000240000900000900010073797a30000000000900010073797a310000000005000300000000001c00048008000240ffe8fff808000140000008fd08000240000000020900010073797a30000000002f8c379957e53d15f252ff529a122763a374c8309308f210ed7b329539a1c4ac15d735296c4e18098acf7d8364d6c46b315989ce44b326324619c1592d0b41191bb5a0675b0680abb18c4eb75e5bf287e761fcd95edd5120bf406497693ba1b22c63aa764e509bdafd"], 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x4009105) 20:27:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e48000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 284.095722] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 284.215346] Unknown ioctl 35155 20:27:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e4c000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:18 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x320e, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 284.313623] Unknown ioctl 35155 [ 284.380439] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 284.411594] CPU: 0 PID: 16229 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 284.419517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.428878] Call Trace: [ 284.431488] dump_stack+0x1fc/0x2fe [ 284.435131] sysfs_warn_dup.cold+0x1c/0x2d [ 284.439379] sysfs_do_create_link_sd+0x116/0x130 [ 284.445125] sysfs_create_link+0x5f/0xc0 [ 284.449200] device_add+0x7d1/0x16d0 [ 284.452922] ? device_check_offline+0x280/0x280 [ 284.457630] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 284.462942] wiphy_register+0x1664/0x2130 [ 284.467129] ? bm_init+0x612/0x950 [ 284.470681] ? wiphy_unregister+0xea0/0xea0 [ 284.475014] ? rcu_read_lock_sched_held+0x16c/0x1d0 20:27:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r2, 0x46, 0xa3}, &(0x7f0000000040)={'enc=', 'raw', ' hash=', {'rmd160\x00'}}, &(0x7f0000000100)="2b7b99ee6b3d8c01868be421990562775f5fd6fc2d493e4c176de2f7c3a29d9e015f9bd8bd5cdd54b44047736dd97882f291856ab5ee200be0f7a8b9abe6c390282adad303e9", &(0x7f0000000180)=""/163) [ 284.480037] ? __kmalloc+0x38e/0x3c0 [ 284.483766] ? ieee80211_cs_list_valid+0x199/0x280 [ 284.488738] ieee80211_register_hw+0x13a7/0x3410 [ 284.493510] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 284.498456] ? memset+0x20/0x40 [ 284.501836] ? __hrtimer_init+0xe9/0x1d0 [ 284.505907] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 284.511022] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 284.516077] ? hwsim_mcast_del_radio+0x230/0x230 [ 284.520849] ? __kmalloc_track_caller+0x389/0x3c0 [ 284.525694] ? hwsim_new_radio_nl+0x273/0x850 20:27:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x111400, 0x0) write$P9_RFSYNC(r3, &(0x7f0000000180)={0x7, 0x33, 0x1}, 0x7) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 20:27:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e60000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 284.530202] ? memcpy+0x35/0x50 [ 284.533496] hwsim_new_radio_nl+0x5c3/0x850 [ 284.537867] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 284.543104] ? nla_parse+0x1b2/0x290 [ 284.546832] genl_family_rcv_msg+0x642/0xc40 [ 284.551255] ? genl_rcv+0x40/0x40 [ 284.554728] ? genl_rcv_msg+0x12f/0x160 [ 284.558721] ? __mutex_add_waiter+0x160/0x160 [ 284.563238] ? __radix_tree_lookup+0x216/0x370 [ 284.567839] genl_rcv_msg+0xbf/0x160 [ 284.571563] netlink_rcv_skb+0x160/0x440 [ 284.575638] ? genl_family_rcv_msg+0xc40/0xc40 [ 284.580229] ? netlink_ack+0xae0/0xae0 [ 284.584129] ? genl_rcv+0x15/0x40 [ 284.587606] genl_rcv+0x24/0x40 [ 284.590981] netlink_unicast+0x4d5/0x690 [ 284.595051] ? netlink_sendskb+0x110/0x110 [ 284.599298] ? _copy_from_iter_full+0x229/0x7c0 [ 284.605276] ? __phys_addr_symbol+0x2c/0x70 [ 284.609606] ? __check_object_size+0x17b/0x3d1 [ 284.614199] netlink_sendmsg+0x6bb/0xc40 [ 284.618390] ? aa_af_perm+0x230/0x230 [ 284.622230] ? nlmsg_notify+0x1a0/0x1a0 [ 284.626215] ? kernel_recvmsg+0x220/0x220 [ 284.630379] ? nlmsg_notify+0x1a0/0x1a0 [ 284.634361] sock_sendmsg+0xc3/0x120 [ 284.639042] ___sys_sendmsg+0x7bb/0x8e0 [ 284.643033] ? __lock_acquire+0x6de/0x3ff0 [ 284.647301] ? copy_msghdr_from_user+0x440/0x440 [ 284.652081] ? __fget+0x32f/0x510 [ 284.655637] ? lock_downgrade+0x720/0x720 [ 284.659794] ? check_preemption_disabled+0x41/0x280 [ 284.664917] ? check_preemption_disabled+0x41/0x280 [ 284.669948] ? __fget+0x356/0x510 [ 284.673411] ? do_dup2+0x450/0x450 [ 284.676969] ? __fdget+0x1d0/0x230 [ 284.680527] __x64_sys_sendmsg+0x132/0x220 [ 284.684772] ? __sys_sendmsg+0x1b0/0x1b0 [ 284.688854] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.694249] ? trace_hardirqs_off_caller+0x6e/0x210 [ 284.699302] ? do_syscall_64+0x21/0x620 [ 284.703290] do_syscall_64+0xf9/0x620 [ 284.707103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.712298] RIP: 0033:0x45de59 [ 284.715500] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.734410] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 284.742130] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 284.749411] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 284.756688] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 284.763992] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 284.771273] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[0x5, 0x0, 0xff, 0xffffff1f]}) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e68000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:19 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) [ 284.898128] Bluetooth: hci3: command 0x0406 tx timeout 20:27:19 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3210, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e6c000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 285.026238] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 285.063673] CPU: 1 PID: 16265 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 285.071596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.080957] Call Trace: [ 285.083561] dump_stack+0x1fc/0x2fe [ 285.087200] sysfs_warn_dup.cold+0x1c/0x2d [ 285.091450] sysfs_do_create_link_sd+0x116/0x130 [ 285.096219] sysfs_create_link+0x5f/0xc0 [ 285.100290] device_add+0x7d1/0x16d0 [ 285.104014] ? device_check_offline+0x280/0x280 [ 285.108718] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 285.114020] wiphy_register+0x1664/0x2130 [ 285.118207] ? bm_init+0x612/0x950 [ 285.121760] ? wiphy_unregister+0xea0/0xea0 [ 285.126109] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 285.131137] ? __kmalloc+0x38e/0x3c0 [ 285.134858] ? ieee80211_cs_list_valid+0x199/0x280 [ 285.139812] ieee80211_register_hw+0x13a7/0x3410 [ 285.144598] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 285.149547] ? memset+0x20/0x40 [ 285.152832] ? __hrtimer_init+0xe9/0x1d0 [ 285.157040] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 285.162185] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 285.167227] ? hwsim_mcast_del_radio+0x230/0x230 [ 285.171996] ? __kmalloc_track_caller+0x389/0x3c0 [ 285.176839] ? hwsim_new_radio_nl+0x273/0x850 [ 285.181347] ? memcpy+0x35/0x50 [ 285.184640] hwsim_new_radio_nl+0x5c3/0x850 [ 285.188975] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 285.194183] ? nla_parse+0x1b2/0x290 [ 285.197916] genl_family_rcv_msg+0x642/0xc40 [ 285.202345] ? genl_rcv+0x40/0x40 [ 285.205805] ? genl_rcv_msg+0x12f/0x160 [ 285.209796] ? __mutex_add_waiter+0x160/0x160 [ 285.214308] ? __radix_tree_lookup+0x216/0x370 [ 285.218907] genl_rcv_msg+0xbf/0x160 [ 285.222636] netlink_rcv_skb+0x160/0x440 [ 285.226737] ? genl_family_rcv_msg+0xc40/0xc40 [ 285.231327] ? netlink_ack+0xae0/0xae0 [ 285.235237] ? genl_rcv+0x15/0x40 [ 285.238714] genl_rcv+0x24/0x40 [ 285.242026] netlink_unicast+0x4d5/0x690 [ 285.246100] ? netlink_sendskb+0x110/0x110 [ 285.250369] ? _copy_from_iter_full+0x229/0x7c0 [ 285.255041] ? __phys_addr_symbol+0x2c/0x70 [ 285.259372] ? __check_object_size+0x17b/0x3d1 [ 285.263986] netlink_sendmsg+0x6bb/0xc40 [ 285.268057] ? aa_af_perm+0x230/0x230 [ 285.271862] ? nlmsg_notify+0x1a0/0x1a0 [ 285.276277] ? kernel_recvmsg+0x220/0x220 [ 285.280445] ? nlmsg_notify+0x1a0/0x1a0 [ 285.284430] sock_sendmsg+0xc3/0x120 [ 285.288161] ___sys_sendmsg+0x7bb/0x8e0 [ 285.292147] ? __lock_acquire+0x6de/0x3ff0 [ 285.296397] ? copy_msghdr_from_user+0x440/0x440 [ 285.301164] ? __fget+0x32f/0x510 [ 285.304630] ? lock_downgrade+0x720/0x720 [ 285.308788] ? check_preemption_disabled+0x41/0x280 [ 285.313819] ? check_preemption_disabled+0x41/0x280 [ 285.318848] ? __fget+0x356/0x510 [ 285.322494] ? do_dup2+0x450/0x450 [ 285.326046] ? __fdget+0x1d0/0x230 [ 285.329597] __x64_sys_sendmsg+0x132/0x220 [ 285.333831] ? __sys_sendmsg+0x1b0/0x1b0 [ 285.337910] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.343283] ? trace_hardirqs_off_caller+0x6e/0x210 [ 285.348311] ? do_syscall_64+0x21/0x620 [ 285.352297] do_syscall_64+0xf9/0x620 [ 285.356116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.362179] RIP: 0033:0x45de59 [ 285.365375] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.384293] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 285.392017] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 285.399296] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 285.406596] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 285.413872] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c 20:27:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0', "a54bb081662c32896bb477577def702feabe3d068d74e7fcbb5be2b1a5237ba97b47798b269af54ba6951a161758206c995ee5ed54415a4edead75cbac22ad759dc60c841715b053f3a551c4a67799dd8648bf765c9848dc2b9f4a70fe806ee8dba7f4a7d96da90daae4752585d5062771809a35ac114656c80226f70998a42ecd2105ffea1cf669ee6472eb2bbfc401fce8745a20f9d9e93fed90589f43a5eb0b6bb9ad44eb35c01f24097fb019fcf49ecb8af59d2477966dc6dd0511a23e79b4a13ada0b2c4a12107136b7887bc1024e0a899f14b5bef81230692b723ab2d8cb5928f86d56be51bd42982b87435129d32100f73146541b5f"}, 0xfd) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x3f, 0x200880) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:27:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDRT(r2, 0x541b, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={0x0, @in={0x2, 0x4e20, @empty}, @xdp={0x2c, 0xe, r3, 0x2d}, @ax25={0x3, @bcast, 0x2}, 0x104, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='veth1_to_batadv\x00', 0x100000000, 0xfffffffffffffffc}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="00082bbd7000fedbdf251500000030000180080003000100000010000300050000001400020074756e6c30000000000000000000000008000300000000003800018008000300020000000800030000000000140002090000000000000000000000000000000008000100ee87860c78435e5221937ee38b0a32a509fea9e4bec09cfce51e7edc05d177345fad099a890a0ac07e5978251c3ffae56b8524aa350e2ec749e20562c4cca61d0307dbc898aff5cf5e07c15b7f0c1dd1cfb7e450ee", @ANYRES32=r3, @ANYBLOB="080003000100000018000180140008000000000000006c65723100000000000014000180080003000100000008000300020000000c00018008000300400f4f770c00018008000100772ea2dac541d92f0f5c2453be41bb218d8a9a519d37a5e061cbd3b166e0d6273ff2234c33592dcf8d0e3c6593c17a3d82538b81dfa9a015108cb891710603a707e494696c608c762416b71c02a220e4a68eb6b5ca75d6dbf980ee99f032d72ea5190a241a7dab09601cb13e5594dae136f2b4f0d319deffdefeaf4ac9b1eaa8c69edf9bf52a843c07d0489e99e50b9c94e82febc3bd830c48fca316b24d546f74f5d838537538222e4205026588184f689b968bd75a3315", @ANYRES32=0x0, @ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDRT(r4, 0x541b, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x4e20, @empty}, @xdp={0x2c, 0xe, r5, 0x30}, @isdn={0x22, 0x3, 0x7, 0x4, 0x5}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='veth1_to_bond\x00', 0x3, 0xb, 0xf000}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000a80)=ANY=[@ANYBLOB="90000000", @ANYRES16=r1, @ANYBLOB="000125bd7000fedbdf25110000003000018008000100", @ANYRES32=0x0, @ANYBLOB="140002006272696467655f736c6176655f310000080001006e2c221f5d84bb54109a2a4582fa4761db20d55e7eb03aa16074ed50e096d9a73f2636a3df99ffc5b10909a6a835f30d4ce35170b18ff6d064c058cdf7a618b69e005c95f5182dd145196f4418c7", @ANYRES32=r5, @ANYBLOB="08000300050000004c0001801400020076657468315f746f5f687372000000001400020069703665727370616e30000000000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000"], 0x90}, 0x1, 0x0, 0x0, 0x4000}, 0xc8080) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="200029bd7000fddbdf2516000000180001801400020076657468315f000000000005000300"/54], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x200100c1) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="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"], 0x79c}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="84000000", @ANYRES16=r1, @ANYBLOB="000125bd7000fddbdf251600000070000180140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f6261746176001400020076657468315f746f5f62726964676500140002007767320000000000000023080000000014000200766500"/80], 0x84}, 0x1, 0x0, 0x0, 0x2400c005}, 0x4800) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="200a25a201000000df2509f9ff0007000300000008000f0003000000080003000010000008000d0c80000000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x54, r1, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x3}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0xfffff800}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x3}, @ETHTOOL_A_RINGS_RX={0x8}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r6, 0x0, 0x0) [ 285.421150] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e74000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e7a000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) 20:27:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2ef0000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="28711125d9952ae8ea94dd3b90354a38b0255797966e40f0359a19a331a8b37bb82584febfd241a908ff409760ff5d93a358f112ce7d4d8d8e6b0f59e7fafa867ef51226a09f3cebd4c725", 0x4b, r2) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e54010022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:20 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3248, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:20 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:20 executing program 3: r0 = getpid() ptrace$cont(0x9, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) 20:27:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00030022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="d5acb946471cebf3716cf96320b0a021d3ca37a076a50f0f15dbe8fec3c7657f77170385336948174e29", 0x2a, 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, "3b3ebc4389e997c26c6bd2e092f316aad253cee2245f9b9cc12242336bed1b8de07345f2881163ec8db69125a5e179990b0251ae42c75c51e1bc511dbde406fdb0989c3785d4aa6d98e63a5248371aff633bec2a259b89cdefa6dfdb7cd2edb7ca534fdf8e6774064fa0443b7af77212c8bdc8902d8b82eb44f3eb69effd463f0a123f86"}, 0x8c, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x100, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x9, 0xc800) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000002c0)={0x0, 0x0, r2}) r3 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0xc370, 0x101200) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000380)={r4}) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r5) keyctl$read(0xb, r6, 0x0, 0x0) [ 285.983562] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 286.048629] CPU: 0 PID: 16318 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 286.056548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.065910] Call Trace: [ 286.068516] dump_stack+0x1fc/0x2fe [ 286.072165] sysfs_warn_dup.cold+0x1c/0x2d [ 286.076415] sysfs_do_create_link_sd+0x116/0x130 [ 286.081190] sysfs_create_link+0x5f/0xc0 [ 286.085276] device_add+0x7d1/0x16d0 [ 286.089010] ? device_check_offline+0x280/0x280 [ 286.093700] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 286.099004] wiphy_register+0x1664/0x2130 [ 286.103173] ? bm_init+0x612/0x950 [ 286.106730] ? wiphy_unregister+0xea0/0xea0 [ 286.111079] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 286.116111] ? __kmalloc+0x38e/0x3c0 [ 286.119921] ? ieee80211_cs_list_valid+0x199/0x280 [ 286.124879] ieee80211_register_hw+0x13a7/0x3410 [ 286.129666] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 286.134646] ? memset+0x20/0x40 [ 286.137938] ? __hrtimer_init+0xe9/0x1d0 [ 286.142040] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 286.147247] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 286.152297] ? hwsim_mcast_del_radio+0x230/0x230 [ 286.157061] ? __kmalloc_track_caller+0x389/0x3c0 [ 286.161933] ? hwsim_new_radio_nl+0x273/0x850 [ 286.166440] ? memcpy+0x35/0x50 [ 286.169758] hwsim_new_radio_nl+0x5c3/0x850 [ 286.174096] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 286.179305] ? nla_parse+0x1b2/0x290 [ 286.183036] genl_family_rcv_msg+0x642/0xc40 [ 286.187457] ? genl_rcv+0x40/0x40 [ 286.190922] ? genl_rcv_msg+0x12f/0x160 [ 286.194912] ? __mutex_add_waiter+0x160/0x160 [ 286.199442] ? __radix_tree_lookup+0x216/0x370 [ 286.204042] genl_rcv_msg+0xbf/0x160 [ 286.207769] netlink_rcv_skb+0x160/0x440 [ 286.211932] ? genl_family_rcv_msg+0xc40/0xc40 [ 286.216525] ? netlink_ack+0xae0/0xae0 [ 286.220422] ? genl_rcv+0x15/0x40 [ 286.223887] genl_rcv+0x24/0x40 [ 286.227171] netlink_unicast+0x4d5/0x690 [ 286.231241] ? netlink_sendskb+0x110/0x110 [ 286.235514] ? _copy_from_iter_full+0x229/0x7c0 [ 286.240189] ? __phys_addr_symbol+0x2c/0x70 [ 286.244542] ? __check_object_size+0x17b/0x3d1 [ 286.249139] netlink_sendmsg+0x6bb/0xc40 [ 286.253221] ? aa_af_perm+0x230/0x230 [ 286.257031] ? nlmsg_notify+0x1a0/0x1a0 [ 286.261016] ? kernel_recvmsg+0x220/0x220 [ 286.265178] ? nlmsg_notify+0x1a0/0x1a0 [ 286.269164] sock_sendmsg+0xc3/0x120 [ 286.272888] ___sys_sendmsg+0x7bb/0x8e0 [ 286.276914] ? __lock_acquire+0x6de/0x3ff0 [ 286.281168] ? copy_msghdr_from_user+0x440/0x440 [ 286.285946] ? __fget+0x32f/0x510 [ 286.289421] ? lock_downgrade+0x720/0x720 [ 286.293580] ? check_preemption_disabled+0x41/0x280 20:27:20 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000080)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x8000) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r5, 0x40184152, &(0x7f0000001240)={0x0, &(0x7f0000001200)=[&(0x7f00000001c0)="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", &(0x7f00000011c0)="f0d2f0fc8c3aaf0c47c0919fc1e4a0abba7f8e7c37ba84128f43c0a69fa9afce9ac80fbbc1ad3555e1c279453f8dcc0086ed3b"]}) [ 286.298609] ? check_preemption_disabled+0x41/0x280 [ 286.303637] ? __fget+0x356/0x510 [ 286.307099] ? do_dup2+0x450/0x450 [ 286.310654] ? __fdget+0x1d0/0x230 [ 286.314206] __x64_sys_sendmsg+0x132/0x220 [ 286.318445] ? __sys_sendmsg+0x1b0/0x1b0 [ 286.322528] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.327901] ? trace_hardirqs_off_caller+0x6e/0x210 [ 286.333023] ? do_syscall_64+0x21/0x620 [ 286.337011] do_syscall_64+0xf9/0x620 [ 286.340834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.346027] RIP: 0033:0x45de59 [ 286.349227] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.368155] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 286.375886] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 286.383254] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 286.390534] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:27:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00050022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:20 executing program 0: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 286.397812] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 286.405101] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00060022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4081}, 0x4000080) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000000)) keyctl$read(0xb, r3, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xc00, 0x0) connect$unix(r4, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 20:27:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x100000000, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) sendfile(r5, r3, &(0x7f0000000140)=0x1000000000800007, 0x2) write$FUSE_DIRENT(r2, &(0x7f0000000000)={0x70, 0x0, 0x0, [{0x3, 0x46b, 0x8, 0x8, 'big_key\x00'}, {0x0, 0x40, 0x2, 0xffffff01, '\xf8+'}, {0x2, 0xffffffffffffff81, 0x8, 0x1ff, 'big_key\x00'}]}, 0x70) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x500000, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000300)={r8, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000100)={r8, 0x5, 0x5, 0x7ea5, 0x9d6e9eb, 0x1}, 0x14) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:21 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x324c, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00070022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:21 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x82200, 0x8e) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffff8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x4}, 0x0, 0xb, r0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/consoles\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000080)={0x0, 0xd5, 0x1}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2801d982ae909d0c0000", @ANYRES16=r9, @ANYBLOB="010000000000000000004400000008000300", @ANYRES32=r8, @ANYBLOB="0c0023800600030000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008880}, 0x20000000) keyctl$read(0xb, r2, 0x0, 0x0) [ 287.041701] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 287.076260] CPU: 0 PID: 16379 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 287.084182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.093551] Call Trace: [ 287.096155] dump_stack+0x1fc/0x2fe [ 287.099819] sysfs_warn_dup.cold+0x1c/0x2d [ 287.099837] sysfs_do_create_link_sd+0x116/0x130 [ 287.099853] sysfs_create_link+0x5f/0xc0 20:27:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00090022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.099875] device_add+0x7d1/0x16d0 [ 287.099894] ? device_check_offline+0x280/0x280 [ 287.099910] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 287.099932] wiphy_register+0x1664/0x2130 [ 287.099953] ? bm_init+0x612/0x950 [ 287.099970] ? wiphy_unregister+0xea0/0xea0 [ 287.099992] ? rcu_read_lock_sched_held+0x16c/0x1d0 20:27:21 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3260, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.100006] ? __kmalloc+0x38e/0x3c0 [ 287.100021] ? ieee80211_cs_list_valid+0x199/0x280 [ 287.100041] ieee80211_register_hw+0x13a7/0x3410 20:27:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.100066] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 287.100087] ? memset+0x20/0x40 [ 287.100102] ? __hrtimer_init+0xe9/0x1d0 [ 287.100117] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 287.100136] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 287.100163] ? hwsim_mcast_del_radio+0x230/0x230 20:27:21 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3268, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000b0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.100176] ? __kmalloc_track_caller+0x389/0x3c0 [ 287.100189] ? hwsim_new_radio_nl+0x273/0x850 [ 287.100203] ? memcpy+0x35/0x50 [ 287.100221] hwsim_new_radio_nl+0x5c3/0x850 [ 287.100237] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 287.100260] ? nla_parse+0x1b2/0x290 [ 287.100281] genl_family_rcv_msg+0x642/0xc40 [ 287.100301] ? genl_rcv+0x40/0x40 20:27:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000e0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:21 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x326c, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.100314] ? genl_rcv_msg+0x12f/0x160 [ 287.100330] ? __mutex_add_waiter+0x160/0x160 [ 287.100357] ? __radix_tree_lookup+0x216/0x370 [ 287.100379] genl_rcv_msg+0xbf/0x160 [ 287.100397] netlink_rcv_skb+0x160/0x440 20:27:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = socket$isdn_base(0x22, 0x3, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x40, 0x200040) accept$netrom(r2, &(0x7f0000000100)={{0x3, @netrom}, [@null, @bcast, @remote, @rose, @bcast, @bcast, @bcast]}, &(0x7f0000000080)=0x48) r3 = accept(r1, 0x0, &(0x7f0000000000)) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsu\x00', 0x8000, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x28, r8, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_PMK(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x8001, 0x24}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e21, @private=0xa010101}, 0x10) r9 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r9, &(0x7f0000001480)=""/4104, 0x1008) [ 287.100412] ? genl_family_rcv_msg+0xc40/0xc40 [ 287.100428] ? netlink_ack+0xae0/0xae0 [ 287.100446] ? genl_rcv+0x15/0x40 [ 287.100468] genl_rcv+0x24/0x40 [ 287.100482] netlink_unicast+0x4d5/0x690 [ 287.100500] ? netlink_sendskb+0x110/0x110 [ 287.100518] ? _copy_from_iter_full+0x229/0x7c0 [ 287.100531] ? __phys_addr_symbol+0x2c/0x70 [ 287.100547] ? __check_object_size+0x17b/0x3d1 [ 287.100565] netlink_sendmsg+0x6bb/0xc40 [ 287.100582] ? aa_af_perm+0x230/0x230 [ 287.100596] ? nlmsg_notify+0x1a0/0x1a0 [ 287.100611] ? kernel_recvmsg+0x220/0x220 [ 287.100633] ? nlmsg_notify+0x1a0/0x1a0 [ 287.100648] sock_sendmsg+0xc3/0x120 [ 287.100665] ___sys_sendmsg+0x7bb/0x8e0 [ 287.100682] ? __lock_acquire+0x6de/0x3ff0 [ 287.100697] ? copy_msghdr_from_user+0x440/0x440 [ 287.100714] ? __fget+0x32f/0x510 [ 287.100732] ? lock_downgrade+0x720/0x720 [ 287.100747] ? check_preemption_disabled+0x41/0x280 [ 287.100764] ? check_preemption_disabled+0x41/0x280 [ 287.100783] ? __fget+0x356/0x510 [ 287.100800] ? do_dup2+0x450/0x450 [ 287.100822] ? __fdget+0x1d0/0x230 [ 287.100841] __x64_sys_sendmsg+0x132/0x220 [ 287.100854] ? __sys_sendmsg+0x1b0/0x1b0 [ 287.100881] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.100897] ? trace_hardirqs_off_caller+0x6e/0x210 20:27:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e001f0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.100912] ? do_syscall_64+0x21/0x620 [ 287.100929] do_syscall_64+0xf9/0x620 [ 287.100948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.100959] RIP: 0033:0x45de59 [ 287.100974] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.100982] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.100996] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 287.101005] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 287.101013] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 287.101022] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 287.101031] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 287.368121] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 287.368143] CPU: 1 PID: 16403 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 287.368152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.368157] Call Trace: [ 287.368180] dump_stack+0x1fc/0x2fe [ 287.368202] sysfs_warn_dup.cold+0x1c/0x2d [ 287.368219] sysfs_do_create_link_sd+0x116/0x130 [ 287.368237] sysfs_create_link+0x5f/0xc0 [ 287.368253] device_add+0x7d1/0x16d0 [ 287.368273] ? device_check_offline+0x280/0x280 [ 287.368288] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 287.368310] wiphy_register+0x1664/0x2130 [ 287.368332] ? bm_init+0x612/0x950 [ 287.368350] ? wiphy_unregister+0xea0/0xea0 [ 287.368373] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 287.368386] ? __kmalloc+0x38e/0x3c0 [ 287.368404] ? ieee80211_cs_list_valid+0x199/0x280 [ 287.368423] ieee80211_register_hw+0x13a7/0x3410 [ 287.368447] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 20:27:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00200022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.368462] ? memset+0x20/0x40 [ 287.368477] ? __hrtimer_init+0xe9/0x1d0 [ 287.368494] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 287.368511] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 287.368537] ? hwsim_mcast_del_radio+0x230/0x230 [ 287.368563] ? __kmalloc_track_caller+0x389/0x3c0 [ 287.368577] ? hwsim_new_radio_nl+0x273/0x850 [ 287.368592] ? memcpy+0x35/0x50 [ 287.368616] hwsim_new_radio_nl+0x5c3/0x850 [ 287.368633] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 287.368658] ? nla_parse+0x1b2/0x290 [ 287.368679] genl_family_rcv_msg+0x642/0xc40 [ 287.368699] ? genl_rcv+0x40/0x40 [ 287.368713] ? genl_rcv_msg+0x12f/0x160 [ 287.368728] ? __mutex_add_waiter+0x160/0x160 [ 287.368756] ? __radix_tree_lookup+0x216/0x370 [ 287.368778] genl_rcv_msg+0xbf/0x160 [ 287.368794] netlink_rcv_skb+0x160/0x440 [ 287.368811] ? genl_family_rcv_msg+0xc40/0xc40 [ 287.368827] ? netlink_ack+0xae0/0xae0 [ 287.368847] ? genl_rcv+0x15/0x40 [ 287.368868] genl_rcv+0x24/0x40 [ 287.368883] netlink_unicast+0x4d5/0x690 [ 287.368903] ? netlink_sendskb+0x110/0x110 [ 287.368921] ? _copy_from_iter_full+0x229/0x7c0 [ 287.368936] ? __phys_addr_symbol+0x2c/0x70 [ 287.368952] ? __check_object_size+0x17b/0x3d1 [ 287.368970] netlink_sendmsg+0x6bb/0xc40 [ 287.368988] ? aa_af_perm+0x230/0x230 [ 287.369003] ? nlmsg_notify+0x1a0/0x1a0 [ 287.369016] ? kernel_recvmsg+0x220/0x220 [ 287.369038] ? nlmsg_notify+0x1a0/0x1a0 [ 287.369053] sock_sendmsg+0xc3/0x120 [ 287.369073] ___sys_sendmsg+0x7bb/0x8e0 [ 287.369090] ? __lock_acquire+0x6de/0x3ff0 [ 287.369107] ? copy_msghdr_from_user+0x440/0x440 [ 287.369128] ? __fget+0x32f/0x510 [ 287.369151] ? lock_downgrade+0x720/0x720 [ 287.369170] ? check_preemption_disabled+0x41/0x280 [ 287.369189] ? check_preemption_disabled+0x41/0x280 [ 287.369209] ? __fget+0x356/0x510 20:27:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e003f0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 287.369227] ? do_dup2+0x450/0x450 [ 287.369252] ? __fdget+0x1d0/0x230 [ 287.369272] __x64_sys_sendmsg+0x132/0x220 [ 287.369286] ? __sys_sendmsg+0x1b0/0x1b0 [ 287.369315] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.369332] ? trace_hardirqs_off_caller+0x6e/0x210 [ 287.369348] ? do_syscall_64+0x21/0x620 [ 287.369367] do_syscall_64+0xf9/0x620 [ 287.369389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.369402] RIP: 0033:0x45de59 [ 287.369420] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.369428] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.369443] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 287.369451] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 287.369460] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 287.369469] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 287.369477] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 287.523083] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 287.523104] CPU: 1 PID: 16416 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 287.523113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.523118] Call Trace: [ 287.523139] dump_stack+0x1fc/0x2fe [ 287.523161] sysfs_warn_dup.cold+0x1c/0x2d [ 287.523178] sysfs_do_create_link_sd+0x116/0x130 [ 287.523195] sysfs_create_link+0x5f/0xc0 [ 287.523210] device_add+0x7d1/0x16d0 [ 287.523236] ? device_check_offline+0x280/0x280 [ 287.523255] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 287.523279] wiphy_register+0x1664/0x2130 [ 287.523300] ? bm_init+0x612/0x950 [ 287.523317] ? wiphy_unregister+0xea0/0xea0 [ 287.523338] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 287.523351] ? __kmalloc+0x38e/0x3c0 [ 287.523366] ? ieee80211_cs_list_valid+0x199/0x280 [ 287.523386] ieee80211_register_hw+0x13a7/0x3410 [ 287.523414] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 287.523432] ? memset+0x20/0x40 [ 287.523448] ? __hrtimer_init+0xe9/0x1d0 [ 287.523467] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 287.523498] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 287.523531] ? hwsim_mcast_del_radio+0x230/0x230 [ 287.523547] ? __kmalloc_track_caller+0x389/0x3c0 [ 287.523560] ? hwsim_new_radio_nl+0x273/0x850 [ 287.523575] ? memcpy+0x35/0x50 [ 287.523596] hwsim_new_radio_nl+0x5c3/0x850 [ 287.523615] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 287.523641] ? nla_parse+0x1b2/0x290 [ 287.523665] genl_family_rcv_msg+0x642/0xc40 [ 287.523687] ? genl_rcv+0x40/0x40 [ 287.523702] ? genl_rcv_msg+0x12f/0x160 [ 287.523721] ? __mutex_add_waiter+0x160/0x160 [ 287.523751] ? __radix_tree_lookup+0x216/0x370 [ 287.523776] genl_rcv_msg+0xbf/0x160 [ 287.523797] netlink_rcv_skb+0x160/0x440 [ 287.523817] ? genl_family_rcv_msg+0xc40/0xc40 [ 287.523834] ? netlink_ack+0xae0/0xae0 [ 287.523856] ? genl_rcv+0x15/0x40 [ 287.523883] genl_rcv+0x24/0x40 [ 287.523898] netlink_unicast+0x4d5/0x690 [ 287.523920] ? netlink_sendskb+0x110/0x110 [ 287.523939] ? _copy_from_iter_full+0x229/0x7c0 [ 287.523953] ? __phys_addr_symbol+0x2c/0x70 [ 287.523971] ? __check_object_size+0x17b/0x3d1 [ 287.523994] netlink_sendmsg+0x6bb/0xc40 [ 287.524015] ? aa_af_perm+0x230/0x230 [ 287.524031] ? nlmsg_notify+0x1a0/0x1a0 [ 287.524047] ? kernel_recvmsg+0x220/0x220 [ 287.524069] ? nlmsg_notify+0x1a0/0x1a0 [ 287.524087] sock_sendmsg+0xc3/0x120 [ 287.524106] ___sys_sendmsg+0x7bb/0x8e0 [ 287.524123] ? __lock_acquire+0x6de/0x3ff0 [ 287.524142] ? copy_msghdr_from_user+0x440/0x440 [ 287.524161] ? __fget+0x32f/0x510 [ 287.524181] ? lock_downgrade+0x720/0x720 [ 287.524199] ? check_preemption_disabled+0x41/0x280 [ 287.524220] ? check_preemption_disabled+0x41/0x280 [ 287.524239] ? __fget+0x356/0x510 [ 287.524257] ? do_dup2+0x450/0x450 [ 287.524282] ? __fdget+0x1d0/0x230 [ 287.524303] __x64_sys_sendmsg+0x132/0x220 [ 287.524318] ? __sys_sendmsg+0x1b0/0x1b0 [ 287.524349] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.524368] ? trace_hardirqs_off_caller+0x6e/0x210 [ 287.524386] ? do_syscall_64+0x21/0x620 [ 287.524406] do_syscall_64+0xf9/0x620 [ 287.524429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.524441] RIP: 0033:0x45de59 [ 287.524459] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.524468] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.524495] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 287.524505] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 287.524514] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 287.524523] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 287.524531] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 287.729787] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 287.729809] CPU: 1 PID: 16433 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 287.729817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.729823] Call Trace: [ 287.729844] dump_stack+0x1fc/0x2fe [ 287.729877] sysfs_warn_dup.cold+0x1c/0x2d [ 287.729896] sysfs_do_create_link_sd+0x116/0x130 [ 287.729913] sysfs_create_link+0x5f/0xc0 [ 287.729931] device_add+0x7d1/0x16d0 [ 287.729953] ? device_check_offline+0x280/0x280 [ 287.729972] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 287.729996] wiphy_register+0x1664/0x2130 [ 287.730026] ? bm_init+0x612/0x950 [ 287.730044] ? wiphy_unregister+0xea0/0xea0 [ 287.730069] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 287.730088] ? __kmalloc+0x38e/0x3c0 [ 287.730104] ? ieee80211_cs_list_valid+0x199/0x280 [ 287.730126] ieee80211_register_hw+0x13a7/0x3410 [ 287.730152] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 287.730169] ? memset+0x20/0x40 [ 287.730185] ? __hrtimer_init+0xe9/0x1d0 [ 287.730202] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 287.730223] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 287.730252] ? hwsim_mcast_del_radio+0x230/0x230 [ 287.730268] ? __kmalloc_track_caller+0x389/0x3c0 [ 287.730283] ? hwsim_new_radio_nl+0x273/0x850 [ 287.730298] ? memcpy+0x35/0x50 [ 287.730317] hwsim_new_radio_nl+0x5c3/0x850 [ 287.730337] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 287.730362] ? nla_parse+0x1b2/0x290 [ 287.730383] genl_family_rcv_msg+0x642/0xc40 [ 287.730409] ? genl_rcv+0x40/0x40 [ 287.730422] ? genl_rcv_msg+0x12f/0x160 [ 287.730439] ? __mutex_add_waiter+0x160/0x160 [ 287.730473] ? __radix_tree_lookup+0x216/0x370 [ 287.730496] genl_rcv_msg+0xbf/0x160 [ 287.730514] netlink_rcv_skb+0x160/0x440 [ 287.730531] ? genl_family_rcv_msg+0xc40/0xc40 [ 287.730546] ? netlink_ack+0xae0/0xae0 [ 287.730563] ? genl_rcv+0x15/0x40 [ 287.730583] genl_rcv+0x24/0x40 [ 287.730596] netlink_unicast+0x4d5/0x690 [ 287.730613] ? netlink_sendskb+0x110/0x110 [ 287.730629] ? _copy_from_iter_full+0x229/0x7c0 [ 287.730644] ? __phys_addr_symbol+0x2c/0x70 [ 287.730662] ? __check_object_size+0x17b/0x3d1 [ 287.730684] netlink_sendmsg+0x6bb/0xc40 [ 287.730704] ? aa_af_perm+0x230/0x230 [ 287.730722] ? nlmsg_notify+0x1a0/0x1a0 [ 287.730738] ? kernel_recvmsg+0x220/0x220 [ 287.730765] ? nlmsg_notify+0x1a0/0x1a0 [ 287.730782] sock_sendmsg+0xc3/0x120 [ 287.730802] ___sys_sendmsg+0x7bb/0x8e0 [ 287.730819] ? __lock_acquire+0x6de/0x3ff0 [ 287.730835] ? copy_msghdr_from_user+0x440/0x440 [ 287.730852] ? __fget+0x32f/0x510 [ 287.730871] ? lock_downgrade+0x720/0x720 [ 287.730887] ? check_preemption_disabled+0x41/0x280 [ 287.730911] ? check_preemption_disabled+0x41/0x280 [ 287.730931] ? __fget+0x356/0x510 [ 287.730949] ? do_dup2+0x450/0x450 [ 287.730975] ? __fdget+0x1d0/0x230 [ 287.730995] __x64_sys_sendmsg+0x132/0x220 [ 287.731008] ? __sys_sendmsg+0x1b0/0x1b0 [ 287.731037] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.731054] ? trace_hardirqs_off_caller+0x6e/0x210 [ 287.731071] ? do_syscall_64+0x21/0x620 [ 287.731095] do_syscall_64+0xf9/0x620 [ 287.731117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.731128] RIP: 0033:0x45de59 [ 287.731144] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.731152] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.731166] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 287.731175] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 287.731184] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 287.731193] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 287.731203] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c [ 287.769060] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 287.769084] CPU: 1 PID: 16433 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 287.769094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.769100] Call Trace: [ 287.769122] dump_stack+0x1fc/0x2fe [ 287.769146] sysfs_warn_dup.cold+0x1c/0x2d [ 287.769165] sysfs_do_create_link_sd+0x116/0x130 [ 287.769184] sysfs_create_link+0x5f/0xc0 [ 287.769203] device_add+0x7d1/0x16d0 [ 287.769224] ? device_check_offline+0x280/0x280 [ 287.769243] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 287.769269] wiphy_register+0x1664/0x2130 [ 287.769292] ? bm_init+0x612/0x950 [ 287.769313] ? wiphy_unregister+0xea0/0xea0 [ 287.769339] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 287.769354] ? __kmalloc+0x38e/0x3c0 [ 287.769370] ? ieee80211_cs_list_valid+0x199/0x280 [ 287.769390] ieee80211_register_hw+0x13a7/0x3410 [ 287.769418] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 287.769436] ? memset+0x20/0x40 [ 287.769450] ? __hrtimer_init+0xe9/0x1d0 [ 287.769470] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 287.769507] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 287.769540] ? hwsim_mcast_del_radio+0x230/0x230 [ 287.769560] ? __kmalloc_track_caller+0x389/0x3c0 [ 287.769575] ? hwsim_new_radio_nl+0x273/0x850 [ 287.769593] ? memcpy+0x35/0x50 [ 287.769613] hwsim_new_radio_nl+0x5c3/0x850 [ 287.769631] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 287.769657] ? nla_parse+0x1b2/0x290 [ 287.769681] genl_family_rcv_msg+0x642/0xc40 [ 287.769704] ? genl_rcv+0x40/0x40 [ 287.769719] ? genl_rcv_msg+0x12f/0x160 [ 287.769737] ? __mutex_add_waiter+0x160/0x160 [ 287.769766] ? __radix_tree_lookup+0x216/0x370 [ 287.769792] genl_rcv_msg+0xbf/0x160 [ 287.769813] netlink_rcv_skb+0x160/0x440 [ 287.769832] ? genl_family_rcv_msg+0xc40/0xc40 [ 287.769850] ? netlink_ack+0xae0/0xae0 [ 287.769881] ? genl_rcv+0x15/0x40 [ 287.769916] genl_rcv+0x24/0x40 [ 287.769932] netlink_unicast+0x4d5/0x690 [ 287.769954] ? netlink_sendskb+0x110/0x110 [ 287.769974] ? _copy_from_iter_full+0x229/0x7c0 [ 287.769995] ? __phys_addr_symbol+0x2c/0x70 [ 287.770012] ? __check_object_size+0x17b/0x3d1 [ 287.770031] netlink_sendmsg+0x6bb/0xc40 [ 287.770049] ? aa_af_perm+0x230/0x230 [ 287.770066] ? nlmsg_notify+0x1a0/0x1a0 [ 287.770081] ? kernel_recvmsg+0x220/0x220 [ 287.770105] ? nlmsg_notify+0x1a0/0x1a0 [ 287.770123] sock_sendmsg+0xc3/0x120 [ 287.770140] ___sys_sendmsg+0x7bb/0x8e0 [ 287.770157] ? __lock_acquire+0x6de/0x3ff0 [ 287.770174] ? copy_msghdr_from_user+0x440/0x440 [ 287.770191] ? __fget+0x32f/0x510 [ 287.770209] ? lock_downgrade+0x720/0x720 [ 287.770226] ? check_preemption_disabled+0x41/0x280 [ 287.770244] ? check_preemption_disabled+0x41/0x280 [ 287.770263] ? __fget+0x356/0x510 [ 287.770279] ? do_dup2+0x450/0x450 [ 287.770302] ? __fdget+0x1d0/0x230 [ 287.770321] __x64_sys_sendmsg+0x132/0x220 [ 287.770336] ? __sys_sendmsg+0x1b0/0x1b0 [ 287.770364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.770381] ? trace_hardirqs_off_caller+0x6e/0x210 [ 287.770396] ? do_syscall_64+0x21/0x620 [ 287.770414] do_syscall_64+0xf9/0x620 [ 287.770435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.770446] RIP: 0033:0x45de59 [ 287.770463] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.770471] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.770488] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 287.770497] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 287.770506] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 287.770515] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 287.770523] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:23 executing program 0: r0 = getpid() ptrace(0x10, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4f1a0b8c, 0x0, 0x4, 0x0, 0x0, 0x1000}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r3 = add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="bd325b64601f39cd9131eddbc093d66a49a3d57e6ff31af7f8869ca9fed632441edeac921a254ee2aaea19753ec62f5e90a6a908c11a69a6a378a7b979a3ae41a6e306f1924df6a47bbe51b5aa6bf420d49f2620ca246b9586fb12d4a7ab1672225b735c6dddfa1d201d6e2489ac45e1d2d3702efe88e43d843a5a10640a639295aa12ac83a4bfe0f3701994aa99b2b212a4fcd59501ac091967928826397eea664312ed46de", 0xa6, r2) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='big_key\x00', r3) keyctl$read(0xb, r2, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)={0x18, r5, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa8, r5, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x84, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xee}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x47}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffff8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3c2aac79}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_CON={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x800}, 0x0) 20:27:23 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3274, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00480022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:23 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000f80)='SEG6\x00') r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x44, 0x0, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_BANDS={0x8, 0xef, 0xd}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xff}, @NL80211_ATTR_NAN_MASTER_PREF={0x5}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x24004000) sendfile(0xffffffffffffffff, r4, &(0x7f00000000c0)=0x800007, 0x5) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000f80)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="cfac00000000000000000300000014000100fc0100"/34], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NFT_MSG_GETOBJ(r4, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, 0x13, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x3}]}, 0x60}}, 0x4) sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYBLOB="cdac00000000000000000300000014000100ff020000000000000000000000000001"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, r3, 0x300, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r7 = accept4$alg(r1, 0x0, 0x0, 0xc0800) splice(r0, 0x0, r7, 0x0, 0x200000, 0x0) [ 289.727049] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 289.761151] CPU: 0 PID: 16476 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 289.769106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.778745] Call Trace: [ 289.781362] dump_stack+0x1fc/0x2fe [ 289.785008] sysfs_warn_dup.cold+0x1c/0x2d [ 289.789261] sysfs_do_create_link_sd+0x116/0x130 [ 289.794057] sysfs_create_link+0x5f/0xc0 [ 289.798134] device_add+0x7d1/0x16d0 [ 289.801862] ? device_check_offline+0x280/0x280 [ 289.806546] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 289.811848] wiphy_register+0x1664/0x2130 [ 289.816017] ? bm_init+0x612/0x950 [ 289.819573] ? wiphy_unregister+0xea0/0xea0 [ 289.823913] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 289.828942] ? __kmalloc+0x38e/0x3c0 [ 289.832670] ? ieee80211_cs_list_valid+0x199/0x280 [ 289.837611] ieee80211_register_hw+0x13a7/0x3410 [ 289.842381] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 289.847317] ? memset+0x20/0x40 [ 289.850605] ? __hrtimer_init+0xe9/0x1d0 [ 289.854671] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 289.859791] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 289.864837] ? hwsim_mcast_del_radio+0x230/0x230 [ 289.869609] ? __kmalloc_track_caller+0x389/0x3c0 [ 289.874463] ? hwsim_new_radio_nl+0x273/0x850 [ 289.878974] ? memcpy+0x35/0x50 [ 289.882273] hwsim_new_radio_nl+0x5c3/0x850 [ 289.886613] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 289.891824] ? nla_parse+0x1b2/0x290 [ 289.895558] genl_family_rcv_msg+0x642/0xc40 [ 289.899986] ? genl_rcv+0x40/0x40 [ 289.903457] ? genl_rcv_msg+0x12f/0x160 [ 289.907444] ? __mutex_add_waiter+0x160/0x160 [ 289.911956] ? __radix_tree_lookup+0x216/0x370 [ 289.916586] genl_rcv_msg+0xbf/0x160 [ 289.920412] netlink_rcv_skb+0x160/0x440 [ 289.924514] ? genl_family_rcv_msg+0xc40/0xc40 [ 289.929105] ? netlink_ack+0xae0/0xae0 [ 289.933006] ? genl_rcv+0x15/0x40 [ 289.936487] genl_rcv+0x24/0x40 [ 289.939778] netlink_unicast+0x4d5/0x690 [ 289.943939] ? netlink_sendskb+0x110/0x110 [ 289.948274] ? _copy_from_iter_full+0x229/0x7c0 [ 289.952950] ? __phys_addr_symbol+0x2c/0x70 [ 289.957282] ? __check_object_size+0x17b/0x3d1 [ 289.961883] netlink_sendmsg+0x6bb/0xc40 [ 289.965959] ? aa_af_perm+0x230/0x230 [ 289.969768] ? nlmsg_notify+0x1a0/0x1a0 [ 289.973750] ? kernel_recvmsg+0x220/0x220 [ 289.977914] ? nlmsg_notify+0x1a0/0x1a0 [ 289.981902] sock_sendmsg+0xc3/0x120 [ 289.985627] ___sys_sendmsg+0x7bb/0x8e0 [ 289.989623] ? __lock_acquire+0x6de/0x3ff0 [ 289.993875] ? copy_msghdr_from_user+0x440/0x440 [ 289.998643] ? __fget+0x32f/0x510 [ 290.002117] ? lock_downgrade+0x720/0x720 [ 290.006306] ? check_preemption_disabled+0x41/0x280 [ 290.011337] ? check_preemption_disabled+0x41/0x280 [ 290.016371] ? __fget+0x356/0x510 [ 290.019839] ? do_dup2+0x450/0x450 [ 290.023406] ? __fdget+0x1d0/0x230 [ 290.026964] __x64_sys_sendmsg+0x132/0x220 [ 290.031214] ? __sys_sendmsg+0x1b0/0x1b0 [ 290.035305] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.040680] ? trace_hardirqs_off_caller+0x6e/0x210 [ 290.045707] ? do_syscall_64+0x21/0x620 [ 290.049695] do_syscall_64+0xf9/0x620 [ 290.053511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.058706] RIP: 0033:0x45de59 [ 290.061905] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.080816] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 290.088539] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 290.095816] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 290.103089] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 290.110365] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 290.117662] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e004c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e01540022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:24 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x81800) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:24 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x327a, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 290.407448] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 290.427114] CPU: 0 PID: 16512 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 290.435038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.444489] Call Trace: [ 290.447098] dump_stack+0x1fc/0x2fe [ 290.450744] sysfs_warn_dup.cold+0x1c/0x2d [ 290.454992] sysfs_do_create_link_sd+0x116/0x130 [ 290.459757] sysfs_create_link+0x5f/0xc0 [ 290.463858] device_add+0x7d1/0x16d0 [ 290.467604] ? device_check_offline+0x280/0x280 [ 290.472287] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 290.477581] wiphy_register+0x1664/0x2130 [ 290.481741] ? bm_init+0x612/0x950 [ 290.485294] ? wiphy_unregister+0xea0/0xea0 [ 290.489630] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 290.494656] ? __kmalloc+0x38e/0x3c0 [ 290.498381] ? ieee80211_cs_list_valid+0x199/0x280 [ 290.503326] ieee80211_register_hw+0x13a7/0x3410 [ 290.508108] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 290.513049] ? memset+0x20/0x40 [ 290.516334] ? __hrtimer_init+0xe9/0x1d0 [ 290.520412] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 290.525538] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 290.530752] ? hwsim_mcast_del_radio+0x230/0x230 [ 290.535519] ? __kmalloc_track_caller+0x389/0x3c0 [ 290.540980] ? hwsim_new_radio_nl+0x273/0x850 [ 290.545511] ? memcpy+0x35/0x50 [ 290.548809] hwsim_new_radio_nl+0x5c3/0x850 [ 290.553142] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 290.558348] ? nla_parse+0x1b2/0x290 [ 290.562077] genl_family_rcv_msg+0x642/0xc40 [ 290.566504] ? genl_rcv+0x40/0x40 [ 290.569965] ? genl_rcv_msg+0x12f/0x160 [ 290.573948] ? __mutex_add_waiter+0x160/0x160 [ 290.578462] ? __radix_tree_lookup+0x216/0x370 [ 290.583061] genl_rcv_msg+0xbf/0x160 [ 290.586785] netlink_rcv_skb+0x160/0x440 [ 290.590853] ? genl_family_rcv_msg+0xc40/0xc40 [ 290.595442] ? netlink_ack+0xae0/0xae0 [ 290.599345] ? genl_rcv+0x15/0x40 [ 290.602812] genl_rcv+0x24/0x40 [ 290.606131] netlink_unicast+0x4d5/0x690 [ 290.610199] ? netlink_sendskb+0x110/0x110 [ 290.614441] ? _copy_from_iter_full+0x229/0x7c0 [ 290.619114] ? __phys_addr_symbol+0x2c/0x70 [ 290.623445] ? __check_object_size+0x17b/0x3d1 [ 290.628036] netlink_sendmsg+0x6bb/0xc40 [ 290.632108] ? aa_af_perm+0x230/0x230 [ 290.635919] ? nlmsg_notify+0x1a0/0x1a0 [ 290.639903] ? kernel_recvmsg+0x220/0x220 [ 290.644087] ? nlmsg_notify+0x1a0/0x1a0 [ 290.648069] sock_sendmsg+0xc3/0x120 [ 290.651819] ___sys_sendmsg+0x7bb/0x8e0 [ 290.655805] ? __lock_acquire+0x6de/0x3ff0 [ 290.660051] ? copy_msghdr_from_user+0x440/0x440 [ 290.664815] ? __fget+0x32f/0x510 [ 290.668282] ? lock_downgrade+0x720/0x720 [ 290.672436] ? check_preemption_disabled+0x41/0x280 [ 290.677463] ? check_preemption_disabled+0x41/0x280 [ 290.682488] ? __fget+0x356/0x510 [ 290.685953] ? do_dup2+0x450/0x450 [ 290.689505] ? __fdget+0x1d0/0x230 [ 290.693059] __x64_sys_sendmsg+0x132/0x220 [ 290.697308] ? __sys_sendmsg+0x1b0/0x1b0 [ 290.701385] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.706754] ? trace_hardirqs_off_caller+0x6e/0x210 [ 290.711777] ? do_syscall_64+0x21/0x620 [ 290.715765] do_syscall_64+0xf9/0x620 [ 290.719610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.724804] RIP: 0033:0x45de59 [ 290.727999] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.746910] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 290.754633] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 290.761910] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 290.769193] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 290.776474] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 290.783750] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x7, 0x25}}}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}]]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x2000c082) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='trusted\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000180)=0x9) keyctl$read(0xb, r3, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r3, 0x1a, 0x19}, &(0x7f0000000040)=ANY=[@ANYBLOB="656e633d72ee0520686173683d7368613232342d617678320000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/77], &(0x7f0000000100)="4dcb1b0131e0b0d83e0d091f787e7ade80f0dab21e52bde30ab7", &(0x7f0000000140)=""/25) 20:27:25 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x5500, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00600022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:25 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000300)=0x23e4) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x1}, 0x7) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) r5 = signalfd4(r4, &(0x7f0000000180)={[0xb9c4]}, 0x8, 0x800) sendmsg$IPSET_CMD_FLUSH(r5, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x4, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040000}, 0x20048000) 20:27:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 291.140802] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 291.199441] CPU: 0 PID: 16534 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 291.207361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.216718] Call Trace: [ 291.219317] dump_stack+0x1fc/0x2fe [ 291.222970] sysfs_warn_dup.cold+0x1c/0x2d [ 291.227217] sysfs_do_create_link_sd+0x116/0x130 [ 291.231989] sysfs_create_link+0x5f/0xc0 [ 291.236091] device_add+0x7d1/0x16d0 [ 291.239846] ? device_check_offline+0x280/0x280 [ 291.244534] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 291.250004] wiphy_register+0x1664/0x2130 [ 291.254167] ? bm_init+0x612/0x950 [ 291.257723] ? wiphy_unregister+0xea0/0xea0 [ 291.262060] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 291.267117] ? __kmalloc+0x38e/0x3c0 [ 291.270878] ? ieee80211_cs_list_valid+0x199/0x280 [ 291.275829] ieee80211_register_hw+0x13a7/0x3410 [ 291.280605] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 291.285543] ? memset+0x20/0x40 [ 291.288832] ? __hrtimer_init+0xe9/0x1d0 [ 291.292908] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 291.298022] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 291.303100] ? hwsim_mcast_del_radio+0x230/0x230 [ 291.308043] ? __kmalloc_track_caller+0x389/0x3c0 [ 291.312893] ? hwsim_new_radio_nl+0x273/0x850 [ 291.317397] ? memcpy+0x35/0x50 [ 291.320696] hwsim_new_radio_nl+0x5c3/0x850 [ 291.325031] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 291.330251] ? nla_parse+0x1b2/0x290 [ 291.334500] genl_family_rcv_msg+0x642/0xc40 [ 291.338941] ? genl_rcv+0x40/0x40 [ 291.342405] ? genl_rcv_msg+0x12f/0x160 [ 291.346409] ? __mutex_add_waiter+0x160/0x160 [ 291.351667] ? __radix_tree_lookup+0x216/0x370 [ 291.356265] genl_rcv_msg+0xbf/0x160 [ 291.359991] netlink_rcv_skb+0x160/0x440 [ 291.364147] ? genl_family_rcv_msg+0xc40/0xc40 [ 291.369749] ? netlink_ack+0xae0/0xae0 [ 291.373646] ? genl_rcv+0x15/0x40 [ 291.377140] genl_rcv+0x24/0x40 [ 291.380428] netlink_unicast+0x4d5/0x690 [ 291.384502] ? netlink_sendskb+0x110/0x110 [ 291.388751] ? _copy_from_iter_full+0x229/0x7c0 [ 291.393428] ? __phys_addr_symbol+0x2c/0x70 [ 291.397763] ? __check_object_size+0x17b/0x3d1 [ 291.402362] netlink_sendmsg+0x6bb/0xc40 [ 291.406461] ? aa_af_perm+0x230/0x230 [ 291.410274] ? nlmsg_notify+0x1a0/0x1a0 [ 291.414257] ? kernel_recvmsg+0x220/0x220 [ 291.418422] ? nlmsg_notify+0x1a0/0x1a0 [ 291.422403] sock_sendmsg+0xc3/0x120 [ 291.426132] ___sys_sendmsg+0x7bb/0x8e0 [ 291.430128] ? __lock_acquire+0x6de/0x3ff0 [ 291.434378] ? copy_msghdr_from_user+0x440/0x440 [ 291.439149] ? __fget+0x32f/0x510 [ 291.442621] ? lock_downgrade+0x720/0x720 [ 291.446785] ? check_preemption_disabled+0x41/0x280 [ 291.451831] ? check_preemption_disabled+0x41/0x280 [ 291.456871] ? __fget+0x356/0x510 [ 291.460340] ? do_dup2+0x450/0x450 [ 291.463903] ? __fdget+0x1d0/0x230 [ 291.467460] __x64_sys_sendmsg+0x132/0x220 [ 291.471710] ? __sys_sendmsg+0x1b0/0x1b0 [ 291.475793] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.481171] ? trace_hardirqs_off_caller+0x6e/0x210 [ 291.486204] ? do_syscall_64+0x21/0x620 [ 291.490193] do_syscall_64+0xf9/0x620 [ 291.494012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.499209] RIP: 0033:0x45de59 [ 291.502432] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.521341] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 291.529061] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 291.536366] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 291.543685] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:27:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00680022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 291.550976] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 291.558363] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x92800, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x401, 0x0, 0x9, 0x5, 0x5987}, &(0x7f0000000140)=0x14) 20:27:25 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x5800, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e006c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:25 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000300)={r6, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r6, 0x6, 0x5, [0x8, 0x1f, 0x7, 0x0, 0x9]}, &(0x7f0000000340)=0x12) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='environ\x00') r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/seq/timer\x00', 0x0, 0x0) getpeername$inet6(r8, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, &(0x7f00000002c0)=0x1c) ioctl$DRM_IOCTL_MODE_GETPLANE(r7, 0xc02064b6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0]}) 20:27:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000040)=0x8, 0x4) keyctl$read(0xb, r1, 0x0, 0x0) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000000)=""/61) [ 291.793658] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 291.838160] CPU: 0 PID: 16568 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 291.846083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.855455] Call Trace: [ 291.858056] dump_stack+0x1fc/0x2fe [ 291.861701] sysfs_warn_dup.cold+0x1c/0x2d [ 291.865959] sysfs_do_create_link_sd+0x116/0x130 [ 291.870723] sysfs_create_link+0x5f/0xc0 [ 291.874821] device_add+0x7d1/0x16d0 [ 291.878554] ? device_check_offline+0x280/0x280 [ 291.883229] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 291.888523] wiphy_register+0x1664/0x2130 [ 291.892693] ? bm_init+0x612/0x950 [ 291.896251] ? wiphy_unregister+0xea0/0xea0 [ 291.900588] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 291.905611] ? __kmalloc+0x38e/0x3c0 [ 291.909332] ? ieee80211_cs_list_valid+0x199/0x280 [ 291.914274] ieee80211_register_hw+0x13a7/0x3410 [ 291.919048] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 291.923988] ? memset+0x20/0x40 [ 291.927278] ? __hrtimer_init+0xe9/0x1d0 [ 291.931348] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 291.936921] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 291.941956] ? hwsim_mcast_del_radio+0x230/0x230 [ 291.946718] ? __kmalloc_track_caller+0x389/0x3c0 [ 291.951566] ? hwsim_new_radio_nl+0x273/0x850 [ 291.956069] ? memcpy+0x35/0x50 [ 291.959362] hwsim_new_radio_nl+0x5c3/0x850 [ 291.963697] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 291.968935] ? nla_parse+0x1b2/0x290 [ 291.972660] genl_family_rcv_msg+0x642/0xc40 [ 291.977118] ? genl_rcv+0x40/0x40 [ 291.980578] ? genl_rcv_msg+0x12f/0x160 [ 291.984563] ? __mutex_add_waiter+0x160/0x160 [ 291.989081] ? __radix_tree_lookup+0x216/0x370 [ 291.993685] genl_rcv_msg+0xbf/0x160 [ 291.997413] netlink_rcv_skb+0x160/0x440 [ 292.001485] ? genl_family_rcv_msg+0xc40/0xc40 [ 292.006086] ? netlink_ack+0xae0/0xae0 [ 292.009993] ? genl_rcv+0x15/0x40 [ 292.013490] genl_rcv+0x24/0x40 [ 292.016778] netlink_unicast+0x4d5/0x690 [ 292.020853] ? netlink_sendskb+0x110/0x110 [ 292.025099] ? _copy_from_iter_full+0x229/0x7c0 [ 292.029785] ? __phys_addr_symbol+0x2c/0x70 [ 292.034157] ? __check_object_size+0x17b/0x3d1 [ 292.038758] netlink_sendmsg+0x6bb/0xc40 [ 292.042849] ? aa_af_perm+0x230/0x230 [ 292.046670] ? nlmsg_notify+0x1a0/0x1a0 [ 292.050652] ? kernel_recvmsg+0x220/0x220 [ 292.054813] ? nlmsg_notify+0x1a0/0x1a0 [ 292.058824] sock_sendmsg+0xc3/0x120 [ 292.062552] ___sys_sendmsg+0x7bb/0x8e0 [ 292.066535] ? __lock_acquire+0x6de/0x3ff0 [ 292.070780] ? copy_msghdr_from_user+0x440/0x440 [ 292.075548] ? __fget+0x32f/0x510 [ 292.079125] ? lock_downgrade+0x720/0x720 [ 292.083301] ? check_preemption_disabled+0x41/0x280 20:27:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @ax25={0x3, @default, 0x8}, @xdp={0x2c, 0xe, 0x0, 0x30}, @isdn={0x22, 0x3, 0x7, 0x4, 0x5}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='hsr0\x00', 0x3, 0xb, 0xf000}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000a80)=ANY=[@ANYBLOB="90000000", @ANYRES16, @ANYBLOB="000125bd7000fedbdf25110000003000018008000100", @ANYRES32=0x0, @ANYBLOB="140002006272696467655f736c6176655f310000080001006e2c221f5d84bb54109a2a4582fa4761db20d55e7eb03aa16074ed50e096d9a73f2636a3df99ffc5b10909a6a835f30d4ce35170b18ff6d064c058cdf7a618b69e005c95f5182dd145196f4418c7", @ANYRES32, @ANYBLOB="08000300050000004c0001801400020076657468315f746f5f687372000000001400020069703665727370616e30000000000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000"], 0x90}, 0x1, 0x0, 0x0, 0x4000}, 0xc8080) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="200029bd7000fddbdf2516000000180001801400020076657468315f000000000005000300"/54], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x200100c1) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="aeb161fc8ee45faa26c770fdd4f4a0376a2d6d142ce8f4dac2d0634762fbcbe134fa59879da53602d45acf0f8f7fc1d54c983f35ed0a70114e1c983eee64cdaa48c74d77db288019e91b276b5a2a9755a7ddc3eeaf8024d6401275a153f2230352f2afa9c8946d739d54ce7b9e933eb23c8f32078f4a555e438fd0f85d71c2516352c686067aa48ed81d7f000000ac66d353dba841a73090c9a638496c74", @ANYRES16, @ANYBLOB="00022cbd7000fcdbdf250a0000002c0001801400020067656e65766530000000000000000000140002007767300000000000000000000000000008000280040001000c00028008000200000000001403028008000200ff070000aa0004008e1dd2fb0c2f382f83c457c1d61f3db1d6eda01fd7f43ff798829e268093de9e3fc2879f4d8afb963563df95f2ea221163fbe55bc49020b19e3e3ad280e3929ce1585cf0d326eb83ed929cc84775dd28806f872eb72a8389498d0507efde3560efbc5ca0219d11b6851bcd29de15d65a561d231bade7e81682799cf9b67c10fb8500ce7233c5abd3bbcfa5c9893abe6135b1bd6684f264f7678fc48cba4037f9062e008d1ac100000400010080000500b246f60207e636803170b6864f2271ee264b395ed057bb9fb97b6ea6304a15dce9e7e4fb4c3cef8b1aebb9a1d4b7ad44084e20e6a3174a2d7884ae1f6da4bb5714aa6500a7e2f197df3412c40471289cda2b2431a7363fafd112d2bcecc9d4178e430a894275385f9edef35d66d0274b6d358138326ae12d5bf1ac3897000400cc3384562fac0edb4862a5eff39052ac7149d2613ccac9270059a17df260fb6b76c8b1d361567da4cb3323a1aef22a679b1a5ce7c0d9e4a165ead5d5828d5863537743caf98539b32557df88a82daf008188685a3b6a15c850aa3911d44511d1be19e0a299e0fe9bbc753b606ed950566c8c9163ec59fe3f49c91e3dcb93ab1d7c1ad09a8f906c5a7c3b755525b14bd9a2d917000800020000010000300003802c00018008000100ffffffff08000200c57b240008000100f50000000d00020074687265616465640000000004010380200001800800010008000000040003000d00020074687265616465640000000018000180040003000d00020074687265616465640000000008000180040003001000018008000100a00c000004000300740001800d000200746872656164656400000000080001000200000004000300080001000800000008000100420700000d0002007468726561646564000000000d0002007468726561646564000000000a0002003640402e4000000008000100090000000d0002007468726561646564000000003c000180080001000010000008000100ff01000005000200000000000a0002007d252a3a2c000000040003000d00020074687265616465640000000004000100e90003002b793007170ca7ec8e8dcaf89a188807b8676a9f97fe2584c4f6dda03949cfb97ae3d926b0c78d51aa4af551d6b89eee25aa9b446cfdcf3fb80542910c26369f3ad25b3e1019ea414ed797295ee26e6e64788702cac06ec1985d0024e54d2da9ec0767f805535078e4c7a33571bcd6de3178b4e61b83d4ca0121fa484c305caf034a57d8fd940ce1d806b08db60c448cb5a615e23fdc53b76bc0877c26ae6ac0b16289f39362705e35ec53fb697ef168318f006e1668cabb05f3a69c86a49d12042c9636dd97f94e95afc74a7f3c68f2ce07c071fd9971a16d93d9105f3ac02842e0bb2a14000000a00002808c000400c31b31da6d50ed23fce0dbcbf2e99151c3fca980616c840118c4208de9efdeaae15be902a89400a2a69c14470bc9404ec0c9d3e15b408293b09ef8b1405fb3f2d1c5401b278b0a5d1674c6e83b6967ed99298b7ccb6f76a12de4b4c82c15dcd06436ee93b778a2469e87712137ead734b354dfd7fc2950a61d14ae17e974d805787cd724426074e6040005000c0003800800018004000300a802028004000100f800038034000180040003000a0002003a2526025d0000000d000200746872656164656400000000080001000400000008000100010000005800018011000200275b2f275d2bea2d135e7d2e000000000d00020074687265616465640000000009000200272d7d5e000000000d00020074687265616465640000000004000300060002005d00000008000100ef00000040000180040003000d0002007468726561646564000000000d00020074687265616465640000000004000300040003000800010061d70d430800010001000000140001800d000200746872656164656400000000140001800d000200746872656164656400000000b400038008000180040003000c00018007000200255400003c00018004000300040003000d000200746872656164656400000000040003000400030008000100070000000400030004000300050002000000000024000180080001000700000008000100040000000d0002007468726561646564000000003c00018008000100060000000d00020074687265616465640000000004000300040003000d0002007468726561646564000000000800010081000000f30004004408c0cd29330fca9e9c42644012a544b4e2c716ccebe917109d24cf7e8087f04380d8f36ab4a4e3086dc867430e00f94c0afdc461354c02d321c82c7f45b9909c6787c32f72eec4541804a87c7fe7154d1e4608c627b03ad768e12444c22820e2eab6911043a4ad48343b8921e8d060170d582323f3c6f129e5f7c7f2d20ef35628faecb975b9d5fac470ccb5927611c39eb5d2e1d474137b1e8030aa7bf32c17c67f09e59120d8764d90c66ba0fd179e13f5af19823d579eeb1a4d487bc4807e2477d0c8528c0a521edef9cde6b2a385f34590ede279a74e576730ebb66f58f290fab6e9084c23754a6aa58e27f500"], 0x79c}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="2f88988683e5f0704ad28f6672e05d", @ANYRES16, @ANYBLOB="000125bd7000fddbdf251600000070000180140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f6261746176001400020076657468315f746f5f62726964676500140002007767320000000000000000080000000014000200766500"/80], 0x84}, 0x1, 0x0, 0x0, 0x2400c005}, 0x4800) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="200a25a201000000df2509f9ff0007000300000008000f0003000000080003000010000008000d0c80000000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x80) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="248200002d00ed54007a08b267ae3604b5000000a90c28a8e6e0ff96a4627caf9622f78321f4c3ef74f535ec33068f50547f5b0c8a5467abec190cc2fe8852e6c1742910de61b6d5", @ANYRES32=r3], 0x24}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080)={@private2, 0x0}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xc4, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}]}, 0xc4}}, 0x20004000) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r5, &(0x7f0000001480)=""/4104, 0x1008) 20:27:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00740022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 292.088332] ? check_preemption_disabled+0x41/0x280 [ 292.093365] ? __fget+0x356/0x510 [ 292.096825] ? do_dup2+0x450/0x450 [ 292.100393] ? __fdget+0x1d0/0x230 [ 292.103945] __x64_sys_sendmsg+0x132/0x220 [ 292.108186] ? __sys_sendmsg+0x1b0/0x1b0 [ 292.112267] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.117644] ? trace_hardirqs_off_caller+0x6e/0x210 [ 292.122672] ? do_syscall_64+0x21/0x620 [ 292.127391] do_syscall_64+0xf9/0x620 [ 292.131240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.136438] RIP: 0033:0x45de59 [ 292.139639] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.158547] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 292.166271] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 292.173585] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 292.180883] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 292.188160] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 292.195448] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e007a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="b1979f2fe55550ab8c8c09d6f7ebd1d4926723e2f2216de6cc112f4677185d8a3e88", 0x22, r0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r4) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0xdbb, 0x3}) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r4, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r2, &(0x7f00000000c0)=0x800007, 0x5) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000040)={0x34}) 20:27:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00f00022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 292.454667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) ioctl$SCSI_IOCTL_GET_IDLUN(r4, 0x5382, &(0x7f0000000080)) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040), 0x4) 20:27:26 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6900, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000055008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 292.675677] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 292.683349] CPU: 1 PID: 16619 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 292.691233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.700591] Call Trace: [ 292.703190] dump_stack+0x1fc/0x2fe [ 292.706827] sysfs_warn_dup.cold+0x1c/0x2d [ 292.711072] sysfs_do_create_link_sd+0x116/0x130 [ 292.715839] sysfs_create_link+0x5f/0xc0 [ 292.719915] device_add+0x7d1/0x16d0 [ 292.723648] ? device_check_offline+0x280/0x280 [ 292.728328] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 292.733620] wiphy_register+0x1664/0x2130 [ 292.737784] ? bm_init+0x612/0x950 [ 292.741339] ? wiphy_unregister+0xea0/0xea0 [ 292.745679] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 292.750703] ? __kmalloc+0x38e/0x3c0 [ 292.754427] ? ieee80211_cs_list_valid+0x199/0x280 [ 292.759374] ieee80211_register_hw+0x13a7/0x3410 [ 292.764148] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 292.769083] ? memset+0x20/0x40 [ 292.772365] ? __hrtimer_init+0xe9/0x1d0 [ 292.776431] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 292.781542] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 292.786577] ? hwsim_mcast_del_radio+0x230/0x230 [ 292.791339] ? __kmalloc_track_caller+0x389/0x3c0 [ 292.796282] ? hwsim_new_radio_nl+0x273/0x850 [ 292.800794] ? memcpy+0x35/0x50 [ 292.804097] hwsim_new_radio_nl+0x5c3/0x850 [ 292.808460] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 292.813670] ? nla_parse+0x1b2/0x290 [ 292.817400] genl_family_rcv_msg+0x642/0xc40 [ 292.821821] ? genl_rcv+0x40/0x40 [ 292.825287] ? genl_rcv_msg+0x12f/0x160 [ 292.829377] ? __mutex_add_waiter+0x160/0x160 [ 292.833915] ? __radix_tree_lookup+0x216/0x370 [ 292.838509] genl_rcv_msg+0xbf/0x160 [ 292.842331] netlink_rcv_skb+0x160/0x440 [ 292.846408] ? genl_family_rcv_msg+0xc40/0xc40 [ 292.850997] ? netlink_ack+0xae0/0xae0 [ 292.854896] ? genl_rcv+0x15/0x40 [ 292.858365] genl_rcv+0x24/0x40 [ 292.861648] netlink_unicast+0x4d5/0x690 [ 292.865743] ? netlink_sendskb+0x110/0x110 [ 292.870013] ? _copy_from_iter_full+0x229/0x7c0 [ 292.874707] ? __phys_addr_symbol+0x2c/0x70 [ 292.879041] ? __check_object_size+0x17b/0x3d1 [ 292.883639] netlink_sendmsg+0x6bb/0xc40 [ 292.887711] ? aa_af_perm+0x230/0x230 [ 292.891522] ? nlmsg_notify+0x1a0/0x1a0 [ 292.895501] ? kernel_recvmsg+0x220/0x220 [ 292.899664] ? nlmsg_notify+0x1a0/0x1a0 [ 292.903650] sock_sendmsg+0xc3/0x120 [ 292.907377] ___sys_sendmsg+0x7bb/0x8e0 [ 292.911358] ? __lock_acquire+0x6de/0x3ff0 [ 292.915604] ? copy_msghdr_from_user+0x440/0x440 [ 292.920372] ? __fget+0x32f/0x510 [ 292.923837] ? lock_downgrade+0x720/0x720 [ 292.928034] ? check_preemption_disabled+0x41/0x280 [ 292.933062] ? check_preemption_disabled+0x41/0x280 [ 292.938181] ? __fget+0x356/0x510 [ 292.941670] ? do_dup2+0x450/0x450 [ 292.945227] ? __fdget+0x1d0/0x230 [ 292.948782] __x64_sys_sendmsg+0x132/0x220 [ 292.953026] ? __sys_sendmsg+0x1b0/0x1b0 [ 292.957138] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.962517] ? trace_hardirqs_off_caller+0x6e/0x210 [ 292.967574] ? do_syscall_64+0x21/0x620 [ 292.971559] do_syscall_64+0xf9/0x620 [ 292.975375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.980566] RIP: 0033:0x45de59 [ 292.983763] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.002689] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 293.010412] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 293.017693] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 293.024969] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 293.032246] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 293.039524] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:27 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000240)="e2c634010000a500000000353757bcef98d95fc09700", 0x16}, {&(0x7f0000000280)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e207007ddfe2b831fd90e8ec3d3129c31814cb9eaf72617531eb87e05348269454fa7bf3", 0x44}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0xdf, 0x4, 0x3f, 0x4, "741567bbe6c225e2a378b9c55d003a947c22ef171d44592a9cf0f879a774e492"}) setgroups(0x3, &(0x7f0000000080)=[0xee00, 0xffffffffffffffff, r4]) flock(r2, 0x0) r5 = accept4$alg(r3, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) ioctl$CHAR_RAW_GETSIZE64(r0, 0x80081272, &(0x7f0000000340)) 20:27:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000000)="46953e8abb5e1db1ebaad65552d7265668acc758fb606a1e6aeadcfee2e006f5883459437e9de9abd9e62c004330a3199100470f10deb0051e92cc52cc6e78b89c7c8b37f8d2998072cec75cc74e6db9951176929b83f6cc609ce1a792f4e047624b595e39fde83da7d25a91a4eaf4f7c378d0baed7e479f2e585c8f712fe7d64a37061443b2ec4b61c99232667613a11776", 0x92, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 293.100127] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 293.134114] syz-executor.3 (16587) used greatest stack depth: 23248 bytes left [ 293.158662] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 293.185078] CPU: 1 PID: 16619 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 293.193021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.202386] Call Trace: [ 293.205012] dump_stack+0x1fc/0x2fe [ 293.208655] sysfs_warn_dup.cold+0x1c/0x2d [ 293.212908] sysfs_do_create_link_sd+0x116/0x130 [ 293.217675] sysfs_create_link+0x5f/0xc0 [ 293.221746] device_add+0x7d1/0x16d0 [ 293.225477] ? device_check_offline+0x280/0x280 [ 293.230158] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 293.235482] wiphy_register+0x1664/0x2130 [ 293.239651] ? bm_init+0x612/0x950 [ 293.243205] ? wiphy_unregister+0xea0/0xea0 [ 293.247542] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 293.252595] ? __kmalloc+0x38e/0x3c0 [ 293.256319] ? ieee80211_cs_list_valid+0x199/0x280 [ 293.261287] ieee80211_register_hw+0x13a7/0x3410 [ 293.266073] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 293.271015] ? memset+0x20/0x40 [ 293.274738] ? __hrtimer_init+0xe9/0x1d0 [ 293.278806] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 293.284017] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 293.289060] ? hwsim_mcast_del_radio+0x230/0x230 [ 293.293825] ? __kmalloc_track_caller+0x389/0x3c0 [ 293.298933] ? hwsim_new_radio_nl+0x273/0x850 [ 293.303444] ? memcpy+0x35/0x50 [ 293.306733] hwsim_new_radio_nl+0x5c3/0x850 [ 293.311073] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 293.316285] ? nla_parse+0x1b2/0x290 [ 293.320023] genl_family_rcv_msg+0x642/0xc40 [ 293.324461] ? genl_rcv+0x40/0x40 [ 293.327920] ? genl_rcv_msg+0x12f/0x160 [ 293.331902] ? __mutex_add_waiter+0x160/0x160 [ 293.336420] ? __radix_tree_lookup+0x216/0x370 [ 293.341194] genl_rcv_msg+0xbf/0x160 [ 293.344920] netlink_rcv_skb+0x160/0x440 [ 293.348990] ? genl_family_rcv_msg+0xc40/0xc40 [ 293.353581] ? netlink_ack+0xae0/0xae0 [ 293.357478] ? genl_rcv+0x15/0x40 [ 293.360971] genl_rcv+0x24/0x40 [ 293.364290] netlink_unicast+0x4d5/0x690 [ 293.368362] ? netlink_sendskb+0x110/0x110 [ 293.372609] ? _copy_from_iter_full+0x229/0x7c0 [ 293.377305] ? __phys_addr_symbol+0x2c/0x70 [ 293.381634] ? __check_object_size+0x17b/0x3d1 [ 293.386233] netlink_sendmsg+0x6bb/0xc40 [ 293.390329] ? aa_af_perm+0x230/0x230 [ 293.394160] ? nlmsg_notify+0x1a0/0x1a0 [ 293.398147] ? kernel_recvmsg+0x220/0x220 [ 293.402317] ? nlmsg_notify+0x1a0/0x1a0 [ 293.406302] sock_sendmsg+0xc3/0x120 [ 293.410028] ___sys_sendmsg+0x7bb/0x8e0 [ 293.414012] ? __lock_acquire+0x6de/0x3ff0 [ 293.418259] ? copy_msghdr_from_user+0x440/0x440 [ 293.423026] ? __fget+0x32f/0x510 [ 293.426500] ? lock_downgrade+0x720/0x720 [ 293.430663] ? check_preemption_disabled+0x41/0x280 [ 293.435711] ? check_preemption_disabled+0x41/0x280 [ 293.440742] ? __fget+0x356/0x510 [ 293.444208] ? do_dup2+0x450/0x450 [ 293.447767] ? __fdget+0x1d0/0x230 [ 293.451324] __x64_sys_sendmsg+0x132/0x220 [ 293.455574] ? __sys_sendmsg+0x1b0/0x1b0 [ 293.459697] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.465070] ? trace_hardirqs_off_caller+0x6e/0x210 [ 293.470097] ? do_syscall_64+0x21/0x620 [ 293.474085] do_syscall_64+0xf9/0x620 [ 293.477902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.483099] RIP: 0033:0x45de59 [ 293.486297] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:27:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, &(0x7f0000000000)) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 293.505242] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 293.513047] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 293.520332] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 293.527615] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 293.534906] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 293.542188] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000058008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x10000, 0x0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:27 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000001c0)={0x2, 0x7, 0x1b, 0x5, 0x2}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000004c0)={0xb6, "71e85c7ac0490ef802f000ba8159f5b5771d1f191d1af2bc458b13512f00ad437e82b3c56da54b8381de1554a2958ef097a237b3aca362889ce2c9d72adcaed07f5d5c74097c91e5e30c9b7b3af9705b097867334ca091edf6742da1b4b2c87d62067d47a09fe410922c8ad0da90b71ed493b01bfdfb261921d0c9471356865ff8a1b5ca6d6e5b91ca5fae5d7659cdedeb582ef6533d535784307046b78337e86013b76af62bccce9df32347da11da0d152a97084b0740ebeb27f98f5df46dfed8f4960fed09044caa7b31f2cd564ddf22d8a6718f7aa4e8f5931ed874616f4b9f54fe406c4bf8d8030e108b31deef6e6f86434879145ac5903b96f5a7f923ce6a8d0ea94ba33b5cd1c90fea91b7f33603515d1565a6423119e5f4fb6bdaab1ffc717623b9e7209fc36a63bb99649569fd8cf7f608f6e7b05a24501bdd8243e04aac40502afcaec3daf3207b7cdcd4b8cd48678f1885af9077c555791702f97b9fe59742df6e46cb8789502a9a34a4059c01c4d6a3896bc2505fee595f38b7614d2472c668bf3f476c38427c55d2be1bde1fad5d44891b10705601cd6f11ccd055bae5ac8fa2845623b0b337875491f53f135f5bd31343a0e8cc60ba0e54410e9f39f63e9b16f5bc9c9eed782440f6aebbb6b82d4bf14a2b3115e49814e2023d44ef0cbc84d0e980144af22d4ef3590eeca28f444a160648829224c466045f9d"}) getrusage(0xffffffffffffffff, &(0x7f0000000400)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000300)={'batadv0\x00'}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) splice(r0, 0x0, r4, 0x0, 0x200001, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000240)="eae5f82221e304fbb159522946f95803a0c905ad0725d7a7483595bcba0d744343894265d7a2720588e0ae5259149d1976500a6152573db1a4b2f80afcc90a32a37c33fe91e148de9bc7000b44db1edaab22a53a9993dbfdf980f23d1f9fbe585be9ccdd3fccc2ce8f5d26a92e4fde154dc24420531672b20ebe67947f270ba8791cacb5de8ca11f119a720367cf8d7d994e4702cb2c83c6409c0ebe57b24ba4691d17d4192f6c96c67930339124cba693caee7cb0b2c57e95", 0xffffff88, 0xfffffffffffffffa) 20:27:27 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="0a00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d08, &(0x7f0000000000)) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) 20:27:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000069008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:27 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="0f00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:28 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/62) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000781008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:28 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="1400000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:28 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) vmsplice(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x2) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8040}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r6, r5, &(0x7f00000000c0)=0x800007, 0x5) fsetxattr$trusted_overlay_nlink(r5, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x80000001}, 0x16, 0x1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x5, 0x1, 0xff, 0xa, 0x5, 0x80}, &(0x7f0000000180)=0x20) r7 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r5, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0xf05, 0x2, 0x1, 0x9, 0x9, 0xffffffff, 0x5], 0x7, 0x180000, 0x0, 0xffffffffffffffff}) ioctl$SIOCX25SFACILITIES(r8, 0x89e3, &(0x7f0000000340)={0x7b, 0x0, 0x6, 0x6, 0xcb}) 20:27:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000798008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:28 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x48500, 0x0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000800)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000d80)=ANY=[@ANYBLOB="0000000075867780d79ac1b8ef330289f64df6a21e2dd6493b980edba54bfbb4bfbaed75c31ac475d1d3662475d09f0b7816cc3a118c88c1a44e490c19dfcbab1d3d0371adad562f29fe5de3cd2fc4c5904c12e329ea47ddd74a9629f5bd7bf51d88", @ANYRES16=0x0, @ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x5}, 0x4008000) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x800007, 0x5) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f00000005c0)) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x200) r2 = syz_mount_image$adfs(&(0x7f0000000100)='adfs\x00', &(0x7f0000000140)='./file0\x00', 0x5f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000180)="d6daa7ef2f09c6a1bc94942e0c6416f2e791fa2dc5675b7e9c228ace3139dd4a4853bc7f0e0f8ba7e30723c0a22aaa997ec2f4adbcae44e0aea98ee04d7dcd3d0cafe1f084ac60dd7d002e4a4cea252338b1bd647b96", 0x56, 0x5}, {&(0x7f0000000200)="e1a87932490ebd20a4d8e5746a81613e20771cfd3366267e25f67f196f", 0x1d, 0xffff}, {&(0x7f0000000240)="c215fca0", 0x4, 0xff}], 0x40003, &(0x7f0000000a40)=ANY=[@ANYBLOB=',!,^}&*((%,/dev/admmidi#\x00,/dev/admmidi#\x00,keyring\x00,syz,big_key\x00,seclabel,dont_appraise,func=PATH_CHECK,uid>', @ANYRESDEC=0xee00, @ANYBLOB="2c666f776e65723c53c44d0c1726ebd6ed1c99cdfadb4ad991547cd2a27ae266d3adfe1d37f7efa97f68e5934aa3e4f5ba9eb0a44ee05afab51af2ec4b271d5ca4fd7bfacb864637cedf3fcaa360fe5d364ec625cb9a54", @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC, @ANYBLOB=',subj_user=/proc/sysvipc/sem\x00,fsname=\\.,dont_hash,\x00']) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x50000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0x2c2, 0x20800) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) sendfile(r4, r2, &(0x7f0000000440)=0x800207, 0x5) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r4, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000840)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r5) keyctl$read(0xb, r6, 0x0, 0x0) r7 = socket(0x10, 0x802, 0x1) sendmsg$TIPC_NL_MON_GET(r7, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000b80)={0x1d8, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14ea}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}]}, @TIPC_NLA_SOCK={0x84, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xeaf}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x81}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_BEARER={0xa4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8000, @private2, 0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x3, @private1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x0, @local, 0x10000}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7fff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x4000045}, 0x44) 20:27:28 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2300000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00020022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 294.279994] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 20:27:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xe000, 0x0) accept$alg(r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r6, 0x0, 0xffffffffffffffff) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r8, 0x0, 0xffffffffffffffff) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r10, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2000, &(0x7f00000002c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@afid={'afid', 0x3d, 0x1}}, {@cachetag={'cachetag', 0x3d, 'big_key\x00'}}, {@debug={'debug', 0x3d, 0x8}}], [{@uid_gt={'uid>', r8}}, {@fowner_gt={'fowner>'}}, {@uid_eq={'uid', 0x3d, r10}}, {@obj_role={'obj_role', 0x3d, '!&\x00'}}, {@subj_type={'subj_type', 0x3d, 'big_key\x00'}}, {@subj_type={'subj_type', 0x3d, '{#'}}]}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x2f, 0x8, 0x2, 0x9, 0x2, @empty, @mcast2, 0x1, 0x700, 0x40, 0x205f}}) 20:27:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x548) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) 20:27:28 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2500000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00030022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 294.511220] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. 20:27:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00040022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x7, {{0x2, 0x4e20, @loopback}}, 0x1, 0x4, [{{0x2, 0x4e22, @local}}, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e21, @private=0xa010101}}, {{0x2, 0x4e22, @local}}]}, 0x290) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @empty, @multicast1}, &(0x7f0000000100)=0xc) pipe2(&(0x7f0000000000), 0x4000) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:29 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000640)={r1}, 0x8) r4 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6, 0x200) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x9, 0x7, 0x10001, 0x8}, 0x14) bind$tipc(r3, &(0x7f0000000680)=@name={0x1e, 0x2, 0x3, {{0x2, 0x2}, 0x2}}, 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x200000, 0x0) 20:27:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:29 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2a00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00050022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000100)=""/157, &(0x7f0000000080)=0x9d) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000000)) keyctl$read(0xb, r1, 0x0, 0x0) [ 295.075612] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 20:27:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00060022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) init_module(&(0x7f0000000080)='sm3-generic\x00', 0xc, &(0x7f0000000180)='!\x00') r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000240)={0x3f, 0x0, 0x0, 'queue1\x00', 0x5}) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_GET_NEIGHBORS(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r6, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000000) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000000)=0x3, 0x4) keyctl$read(0xb, r1, &(0x7f0000000a80)=""/4101, 0x1005) 20:27:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00070022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2b00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) execveat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000040)='].+,))(\x00', &(0x7f0000000080)='syz', &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='@\x00', &(0x7f0000000280)=']@\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000500)=[&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)='%,[\x00', &(0x7f0000000440)='^}-\x00'], 0x100) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:29 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000080)={0x44, 0xb0b, 0xfffffe00, 0x390b}, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 295.444528] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.2'. 20:27:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x5, 0x4db}]}, 0xc, 0x3) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/254, 0xfe) 20:27:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00080022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r2, &(0x7f0000000240)=""/250, 0xfa) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r4, 0x942e, 0x0) r6 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x200000, 0x0) 20:27:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="3e0fc75a000fc7366d28f3a70fc72a66b9310b000066b8b000000066ba000000000f3036f0f7514eb83d000f00d066b9b80a000066b80050000066ba000000000f300f01df66b9560300000f32", 0x4d}], 0x1, 0xb, &(0x7f0000000100)=[@flags={0x3, 0x40406}], 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7f) keyctl$read(0xb, r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) ioctl$KVM_SET_BOOT_CPU_ID(r3, 0xae78, &(0x7f0000000140)=0x1) 20:27:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00090022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2d00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x32, @any, 0x7ff}, 0xe) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 295.761635] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.2'. 20:27:29 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x40020, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, @perf_config_ext={0x401, 0x10000000000}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r7, r6, &(0x7f00000000c0)=0x800007, 0x5) sendfile(r5, r4, &(0x7f0000000180)=0x800008, 0x1008) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000080)={0x2000, 0x100000, 0x1, 0x7, 0x2}) r8 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r8, 0x0, 0x200000, 0x0) 20:27:30 executing program 0: add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, 0x0, 0x0, 0x0) 20:27:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:30 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="3000000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 296.016726] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 296.045189] CPU: 0 PID: 16902 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 296.053134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.062501] Call Trace: [ 296.065105] dump_stack+0x1fc/0x2fe [ 296.068762] sysfs_warn_dup.cold+0x1c/0x2d [ 296.073008] sysfs_do_create_link_sd+0x116/0x130 [ 296.077770] sysfs_create_link+0x5f/0xc0 [ 296.081839] device_add+0x7d1/0x16d0 [ 296.085581] ? device_check_offline+0x280/0x280 [ 296.090256] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 296.095548] wiphy_register+0x1664/0x2130 [ 296.099713] ? bm_init+0x612/0x950 [ 296.103264] ? wiphy_unregister+0xea0/0xea0 [ 296.107596] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 296.112624] ? __kmalloc+0x38e/0x3c0 20:27:30 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x4040c3, 0x0) r6 = signalfd4(r0, &(0x7f0000000580)={[0xffffffffffffa13e]}, 0x8, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, 0x142f}}, 0x18) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r4}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000440)={r8, 0x3ff, 0x400, 0x380, 0xe7f, 0x8}, &(0x7f0000000500)=0x14) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)={0x2, 0x0, "d152b6886b8906658cbdb50f5ac0ac3d3c96b315d918b06b20aa74276119eb86c678bd6139b288ac28992c0a606de123911071fe4c43ed2ac0181b71283618c549f9e7f372e354d3b068ef3e741a5719535843b01ee45cc04f8fdff28655ece839d73ccd"}, 0x6c, r2) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x10000, 0x0) [ 296.116339] ? ieee80211_cs_list_valid+0x199/0x280 [ 296.121282] ieee80211_register_hw+0x13a7/0x3410 [ 296.126057] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 296.130996] ? memset+0x20/0x40 [ 296.134286] ? __hrtimer_init+0xe9/0x1d0 [ 296.138375] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 296.143512] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 296.148578] ? hwsim_mcast_del_radio+0x230/0x230 [ 296.153366] ? __kmalloc_track_caller+0x389/0x3c0 [ 296.158233] ? hwsim_new_radio_nl+0x273/0x850 [ 296.162756] ? memcpy+0x35/0x50 20:27:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 296.166047] hwsim_new_radio_nl+0x5c3/0x850 [ 296.170446] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 296.175662] ? nla_parse+0x1b2/0x290 [ 296.179412] genl_family_rcv_msg+0x642/0xc40 [ 296.183871] ? genl_rcv+0x40/0x40 [ 296.187338] ? genl_rcv_msg+0x12f/0x160 [ 296.191338] ? __mutex_add_waiter+0x160/0x160 [ 296.195852] ? __radix_tree_lookup+0x216/0x370 [ 296.200449] genl_rcv_msg+0xbf/0x160 [ 296.204783] netlink_rcv_skb+0x160/0x440 [ 296.208885] ? genl_family_rcv_msg+0xc40/0xc40 [ 296.213492] ? netlink_ack+0xae0/0xae0 [ 296.217392] ? genl_rcv+0x15/0x40 [ 296.220874] genl_rcv+0x24/0x40 [ 296.224159] netlink_unicast+0x4d5/0x690 [ 296.228231] ? netlink_sendskb+0x110/0x110 [ 296.232475] ? _copy_from_iter_full+0x229/0x7c0 [ 296.237170] ? __phys_addr_symbol+0x2c/0x70 [ 296.241496] ? __check_object_size+0x17b/0x3d1 [ 296.246117] netlink_sendmsg+0x6bb/0xc40 [ 296.250191] ? aa_af_perm+0x230/0x230 [ 296.254005] ? nlmsg_notify+0x1a0/0x1a0 [ 296.257992] ? kernel_recvmsg+0x220/0x220 [ 296.262153] ? nlmsg_notify+0x1a0/0x1a0 20:27:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000b0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:30 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="297f6c72ee50d6ec00"], 0x6) bind$alg(r2, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(blowfish-asm)\x00'}, 0x58) r5 = accept4(r2, 0x0, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x200000, 0x0) [ 296.266139] sock_sendmsg+0xc3/0x120 [ 296.269886] ___sys_sendmsg+0x7bb/0x8e0 [ 296.273876] ? __lock_acquire+0x6de/0x3ff0 [ 296.278124] ? copy_msghdr_from_user+0x440/0x440 [ 296.282893] ? __fget+0x32f/0x510 [ 296.286369] ? lock_downgrade+0x720/0x720 [ 296.290525] ? check_preemption_disabled+0x41/0x280 [ 296.295557] ? check_preemption_disabled+0x41/0x280 [ 296.300586] ? __fget+0x356/0x510 [ 296.304051] ? do_dup2+0x450/0x450 [ 296.307610] ? __fdget+0x1d0/0x230 [ 296.311165] __x64_sys_sendmsg+0x132/0x220 [ 296.315416] ? __sys_sendmsg+0x1b0/0x1b0 [ 296.319502] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.324892] ? trace_hardirqs_off_caller+0x6e/0x210 [ 296.329922] ? do_syscall_64+0x21/0x620 [ 296.333920] do_syscall_64+0xf9/0x620 [ 296.337772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.342990] RIP: 0033:0x45de59 [ 296.346192] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.365193] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 296.372920] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 296.380820] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 296.388097] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 296.395385] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 296.402661] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000e0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r2) 20:27:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00100022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 296.635125] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 296.660862] CPU: 0 PID: 16902 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 296.668873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.678740] Call Trace: [ 296.681351] dump_stack+0x1fc/0x2fe [ 296.684999] sysfs_warn_dup.cold+0x1c/0x2d [ 296.689249] sysfs_do_create_link_sd+0x116/0x130 [ 296.696976] sysfs_create_link+0x5f/0xc0 [ 296.701744] device_add+0x7d1/0x16d0 [ 296.705471] ? device_check_offline+0x280/0x280 [ 296.710170] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 296.715455] wiphy_register+0x1664/0x2130 [ 296.719613] ? bm_init+0x612/0x950 [ 296.723168] ? wiphy_unregister+0xea0/0xea0 [ 296.727502] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 296.736085] ? __kmalloc+0x38e/0x3c0 [ 296.739798] ? ieee80211_cs_list_valid+0x199/0x280 [ 296.744760] ieee80211_register_hw+0x13a7/0x3410 [ 296.749528] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 296.754462] ? memset+0x20/0x40 [ 296.757743] ? __hrtimer_init+0xe9/0x1d0 [ 296.761812] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 296.768057] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 296.773147] ? hwsim_mcast_del_radio+0x230/0x230 [ 296.777906] ? __kmalloc_track_caller+0x389/0x3c0 [ 296.782919] ? hwsim_new_radio_nl+0x273/0x850 [ 296.787417] ? memcpy+0x35/0x50 [ 296.790700] hwsim_new_radio_nl+0x5c3/0x850 [ 296.795041] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 296.800325] ? nla_parse+0x1b2/0x290 [ 296.804049] genl_family_rcv_msg+0x642/0xc40 [ 296.808468] ? genl_rcv+0x40/0x40 [ 296.811924] ? genl_rcv_msg+0x12f/0x160 [ 296.816692] ? __mutex_add_waiter+0x160/0x160 [ 296.821207] ? __radix_tree_lookup+0x216/0x370 [ 296.825811] genl_rcv_msg+0xbf/0x160 [ 296.829533] netlink_rcv_skb+0x160/0x440 [ 296.833597] ? genl_family_rcv_msg+0xc40/0xc40 [ 296.838182] ? netlink_ack+0xae0/0xae0 [ 296.842077] ? genl_rcv+0x15/0x40 [ 296.845538] genl_rcv+0x24/0x40 [ 296.848845] netlink_unicast+0x4d5/0x690 [ 296.852920] ? netlink_sendskb+0x110/0x110 [ 296.857162] ? _copy_from_iter_full+0x229/0x7c0 [ 296.861830] ? __phys_addr_symbol+0x2c/0x70 [ 296.866174] ? __check_object_size+0x17b/0x3d1 [ 296.870782] netlink_sendmsg+0x6bb/0xc40 [ 296.874860] ? aa_af_perm+0x230/0x230 [ 296.878663] ? nlmsg_notify+0x1a0/0x1a0 [ 296.882639] ? kernel_recvmsg+0x220/0x220 [ 296.886798] ? nlmsg_notify+0x1a0/0x1a0 [ 296.890777] sock_sendmsg+0xc3/0x120 [ 296.894615] ___sys_sendmsg+0x7bb/0x8e0 [ 296.898596] ? __lock_acquire+0x6de/0x3ff0 [ 296.902833] ? copy_msghdr_from_user+0x440/0x440 [ 296.907590] ? __fget+0x32f/0x510 [ 296.911054] ? lock_downgrade+0x720/0x720 [ 296.915203] ? check_preemption_disabled+0x41/0x280 [ 296.920229] ? check_preemption_disabled+0x41/0x280 [ 296.925260] ? __fget+0x356/0x510 [ 296.928717] ? do_dup2+0x450/0x450 [ 296.932406] ? __fdget+0x1d0/0x230 [ 296.935959] __x64_sys_sendmsg+0x132/0x220 [ 296.940457] ? __sys_sendmsg+0x1b0/0x1b0 [ 296.944549] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.950017] ? trace_hardirqs_off_caller+0x6e/0x210 [ 296.955078] ? do_syscall_64+0x21/0x620 [ 296.959073] do_syscall_64+0xf9/0x620 [ 296.963006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.968202] RIP: 0033:0x45de59 [ 296.971395] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.990405] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 296.998206] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 297.005567] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 297.012858] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 297.020218] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 297.027512] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x40000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r3) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x18c, r5, 0x300, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xf8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb602}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x82}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x25000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffe1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xff}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffff7}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffff9}]}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x4044094}, 0x44830) keyctl$read(0xb, r4, 0x0, 0x0) 20:27:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00480022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:31 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x80000) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) keyctl$read(0xb, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/162, 0xa2) 20:27:31 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:31 executing program 3: r0 = getpid() ptrace(0x10, r0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffc7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x0, 0x0, 0x6}, r0, 0x80000000000000, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) 20:27:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e004c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:31 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}, {&(0x7f0000000240)="59d49078d6826990089ed15339d0501dffcbe2ca6e95117a286bc3f7bd7c50c3ac56b3c1c0c7a6f57b04537abf10ac58fbdca7ea46b5f5c87bce1d2f47f68e6204b8f765051b50c05d5e62d480e24659976285004b9b90aeb09dbdd924442dcfab6d32d59892fb912a89fd59d4e5c5975793b6e5cf3787a4cfda7e89e98e33a0eb0f7fc740f28251b14a6eee1aa754ded6f280292e76db935b4688cb8868d5afaf7d2312879046", 0xa7}, {&(0x7f0000000300)="f7b644e8767a5932f6414f443f2f381d3ea4ccca8cc1aeb4cf4ed49c0c35f8d8aae0eea873aef3857577163143aba8e90a388e50bf9103955548cda8d9ccb8ebcd052570ae3fe5ab2451e27b587072740bc40ba1f2a01008c02d1f6f87b27c420462ecc85828d13f83e480c29fe076241d0bd661431fef3afd42cf0b5e5cef611d399d41de814288043c2fe02f47fede5d78a1be2b0c01208150e4d7cb88deb2311d58502f0bf45c07ba4a28808f86a7413b6db4eeda6bc67cdd867bf0240bfb1772c92cc1052be56440fb8c7ff14e7cc4e930569ba1", 0xd6}], 0x4, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$sock_netdev_private(r0, 0x89ff, &(0x7f0000000400)="ceecd2ff7afa496108552e0ee297be9caaec49d5064111c6ca5aa16dc7bf6394c21746a777995977009a61b7979eda63788970cbf4d01e0a53523508787f96e31cbc3842cfda4f57b6f815a00011d7c587f8e8acc421e3bb3a3dc57de0bb80543b0cb268ec4eaca1cc57c2f34859f126de3a0ad2521cee8207764bc1eddc9d7384be73ec408dafb426a50e95b2249028dbfc735eb47d26ffe1c30e008bfa945156d6f5e571f888e084d5") splice(r0, 0x0, r3, 0x0, 0x6, 0x7) 20:27:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x9, 0x2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, r2) keyctl$read(0xb, r1, 0x0, 0x0) [ 297.386214] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.2'. [ 297.409723] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 297.430230] CPU: 0 PID: 16974 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 297.438151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.447632] Call Trace: [ 297.450236] dump_stack+0x1fc/0x2fe [ 297.453881] sysfs_warn_dup.cold+0x1c/0x2d [ 297.458130] sysfs_do_create_link_sd+0x116/0x130 [ 297.462899] sysfs_create_link+0x5f/0xc0 [ 297.467058] device_add+0x7d1/0x16d0 [ 297.470786] ? device_check_offline+0x280/0x280 [ 297.475486] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 297.480785] wiphy_register+0x1664/0x2130 [ 297.484983] ? bm_init+0x612/0x950 [ 297.488541] ? wiphy_unregister+0xea0/0xea0 [ 297.492884] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 297.498695] ? __kmalloc+0x38e/0x3c0 [ 297.502422] ? ieee80211_cs_list_valid+0x199/0x280 [ 297.507369] ieee80211_register_hw+0x13a7/0x3410 [ 297.512181] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 297.517124] ? memset+0x20/0x40 [ 297.520414] ? __hrtimer_init+0xe9/0x1d0 [ 297.524492] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 297.529611] mac80211_hwsim_new_radio+0x1d3f/0x3c60 20:27:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) [ 297.535012] ? hwsim_mcast_del_radio+0x230/0x230 [ 297.539799] ? __kmalloc_track_caller+0x389/0x3c0 [ 297.544651] ? hwsim_new_radio_nl+0x273/0x850 [ 297.549169] ? memcpy+0x35/0x50 [ 297.552469] hwsim_new_radio_nl+0x5c3/0x850 [ 297.556800] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 297.562070] ? nla_parse+0x1b2/0x290 [ 297.565809] genl_family_rcv_msg+0x642/0xc40 [ 297.570231] ? genl_rcv+0x40/0x40 [ 297.573697] ? genl_rcv_msg+0x12f/0x160 [ 297.577682] ? __mutex_add_waiter+0x160/0x160 [ 297.582227] ? __radix_tree_lookup+0x216/0x370 20:27:31 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0xfffffd14) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 297.586996] genl_rcv_msg+0xbf/0x160 [ 297.590733] netlink_rcv_skb+0x160/0x440 [ 297.594806] ? genl_family_rcv_msg+0xc40/0xc40 [ 297.599400] ? netlink_ack+0xae0/0xae0 [ 297.603319] ? genl_rcv+0x15/0x40 [ 297.606788] genl_rcv+0x24/0x40 [ 297.610093] netlink_unicast+0x4d5/0x690 [ 297.614603] ? netlink_sendskb+0x110/0x110 [ 297.618937] ? _copy_from_iter_full+0x229/0x7c0 [ 297.623650] ? __phys_addr_symbol+0x2c/0x70 [ 297.628881] ? __check_object_size+0x17b/0x3d1 [ 297.633497] netlink_sendmsg+0x6bb/0xc40 [ 297.637670] ? aa_af_perm+0x230/0x230 [ 297.641484] ? nlmsg_notify+0x1a0/0x1a0 [ 297.645557] ? kernel_recvmsg+0x220/0x220 [ 297.649822] ? nlmsg_notify+0x1a0/0x1a0 [ 297.653827] sock_sendmsg+0xc3/0x120 [ 297.657559] ___sys_sendmsg+0x7bb/0x8e0 [ 297.661544] ? __lock_acquire+0x6de/0x3ff0 [ 297.665801] ? copy_msghdr_from_user+0x440/0x440 [ 297.670668] ? __fget+0x32f/0x510 [ 297.674143] ? lock_downgrade+0x720/0x720 [ 297.678308] ? check_preemption_disabled+0x41/0x280 20:27:31 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000080)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0xf) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 297.683985] ? check_preemption_disabled+0x41/0x280 [ 297.689156] ? __fget+0x356/0x510 [ 297.693593] ? do_dup2+0x450/0x450 [ 297.697409] ? __fdget+0x1d0/0x230 [ 297.701052] __x64_sys_sendmsg+0x132/0x220 [ 297.705300] ? __sys_sendmsg+0x1b0/0x1b0 [ 297.709389] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.714766] ? trace_hardirqs_off_caller+0x6e/0x210 [ 297.720581] ? do_syscall_64+0x21/0x620 [ 297.724578] do_syscall_64+0xf9/0x620 [ 297.728413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.733646] RIP: 0033:0x45de59 [ 297.736845] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.756191] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 297.764010] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 297.771301] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 297.778580] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 297.786123] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 297.798900] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00600022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x3000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x40, 0x0) setpriority(0x0, 0x0, 0x2) connect$l2tp6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x6}, 0x20) getsockopt$inet_dccp_int(r2, 0x21, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) request_key(&(0x7f0000000080)='trusted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='(*![,\x00', r0) keyctl$read(0xb, r1, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000200)={0x0, 0x3}) 20:27:32 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw6\x00') sendmsg$nl_route(r5, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="030000006a0004002dbd7000fedbdf25000000000088418ae4e39a7f725bd900000004000b9b04000000", @ANYRES32=0x0, @ANYBLOB="080001000000000008000a0001000000"], 0x34}, 0x1, 0x0, 0x0, 0x4080}, 0x20000814) 20:27:32 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="5800000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00680022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:32 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sync() splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0xf6df5) [ 298.255093] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 298.341829] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 298.365383] CPU: 0 PID: 17034 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 298.373326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.382692] Call Trace: [ 298.385299] dump_stack+0x1fc/0x2fe [ 298.388951] sysfs_warn_dup.cold+0x1c/0x2d [ 298.393210] sysfs_do_create_link_sd+0x116/0x130 [ 298.397990] sysfs_create_link+0x5f/0xc0 [ 298.402068] device_add+0x7d1/0x16d0 [ 298.405800] ? device_check_offline+0x280/0x280 [ 298.410481] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 298.415774] wiphy_register+0x1664/0x2130 [ 298.419946] ? bm_init+0x612/0x950 [ 298.423512] ? wiphy_unregister+0xea0/0xea0 [ 298.427863] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 298.432893] ? __kmalloc+0x38e/0x3c0 [ 298.436615] ? ieee80211_cs_list_valid+0x199/0x280 [ 298.441561] ieee80211_register_hw+0x13a7/0x3410 [ 298.446376] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 298.451319] ? memset+0x20/0x40 [ 298.454609] ? __hrtimer_init+0xe9/0x1d0 [ 298.458686] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 298.463831] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 298.469050] ? hwsim_mcast_del_radio+0x230/0x230 [ 298.473826] ? __kmalloc_track_caller+0x389/0x3c0 [ 298.478684] ? hwsim_new_radio_nl+0x273/0x850 [ 298.483196] ? memcpy+0x35/0x50 [ 298.486493] hwsim_new_radio_nl+0x5c3/0x850 [ 298.490932] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 298.496170] ? nla_parse+0x1b2/0x290 [ 298.499993] genl_family_rcv_msg+0x642/0xc40 [ 298.504423] ? genl_rcv+0x40/0x40 [ 298.507977] ? genl_rcv_msg+0x12f/0x160 [ 298.511971] ? __mutex_add_waiter+0x160/0x160 [ 298.516950] ? __radix_tree_lookup+0x216/0x370 [ 298.521554] genl_rcv_msg+0xbf/0x160 [ 298.525283] netlink_rcv_skb+0x160/0x440 [ 298.529371] ? genl_family_rcv_msg+0xc40/0xc40 [ 298.533971] ? netlink_ack+0xae0/0xae0 [ 298.537873] ? genl_rcv+0x15/0x40 [ 298.541343] genl_rcv+0x24/0x40 [ 298.544663] netlink_unicast+0x4d5/0x690 [ 298.548751] ? netlink_sendskb+0x110/0x110 [ 298.553001] ? _copy_from_iter_full+0x229/0x7c0 [ 298.558726] ? __phys_addr_symbol+0x2c/0x70 [ 298.563063] ? __check_object_size+0x17b/0x3d1 [ 298.567664] netlink_sendmsg+0x6bb/0xc40 [ 298.571769] ? aa_af_perm+0x230/0x230 [ 298.576785] ? nlmsg_notify+0x1a0/0x1a0 [ 298.580772] ? kernel_recvmsg+0x220/0x220 [ 298.584946] ? nlmsg_notify+0x1a0/0x1a0 [ 298.588933] sock_sendmsg+0xc3/0x120 [ 298.592684] ___sys_sendmsg+0x7bb/0x8e0 [ 298.596678] ? __lock_acquire+0x6de/0x3ff0 [ 298.600931] ? copy_msghdr_from_user+0x440/0x440 [ 298.605748] ? __fget+0x32f/0x510 [ 298.609221] ? lock_downgrade+0x720/0x720 [ 298.613408] ? check_preemption_disabled+0x41/0x280 [ 298.618462] ? check_preemption_disabled+0x41/0x280 [ 298.623509] ? __fget+0x356/0x510 [ 298.626984] ? do_dup2+0x450/0x450 [ 298.630549] ? __fdget+0x1d0/0x230 [ 298.634115] __x64_sys_sendmsg+0x132/0x220 [ 298.638371] ? __sys_sendmsg+0x1b0/0x1b0 [ 298.642579] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.648399] ? trace_hardirqs_off_caller+0x6e/0x210 [ 298.653437] ? do_syscall_64+0x21/0x620 [ 298.657434] do_syscall_64+0xf9/0x620 [ 298.661267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.666469] RIP: 0033:0x45de59 [ 298.669669] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:27:32 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000140), 0x0, 0x4) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = signalfd4(r3, &(0x7f0000000140)={[0x2]}, 0x8, 0x0) sendmsg$AUDIT_TTY_GET(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f8, 0x200, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f00000002c0)={0x2, 0x5, 0x9, 0x1, 0x8, 0xb6, 0x6, 0x37, 0x3f, 0x0, 0x40, "2b39b740f55732403386c7061d0b6df8d61340a35990ae59278a50979b3733f8"}) sendfile(r7, r5, &(0x7f00000000c0)=0x800007, 0x5) r8 = eventfd(0x5) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000340)={0x1, &(0x7f0000000300), 0x1, r8, 0x1}) ioctl$F2FS_IOC_RESIZE_FS(r5, 0x4008f510, &(0x7f0000000080)=0x2) [ 298.688589] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 298.696318] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 298.703600] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 298.710907] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 298.718195] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 298.725482] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) write$P9_RFSYNC(r1, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x52) r4 = accept4$phonet_pipe(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x80800) r5 = getpgrp(0x0) fcntl$setown(r4, 0x8, r5) connect$phonet_pipe(r1, &(0x7f0000000080)={0x23, 0x5, 0xe7, 0x9}, 0x10) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) 20:27:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e006c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00740022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 298.975406] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 298.999401] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 299.024078] CPU: 0 PID: 17034 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 299.032009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.041398] Call Trace: [ 299.044016] dump_stack+0x1fc/0x2fe [ 299.047654] sysfs_warn_dup.cold+0x1c/0x2d [ 299.052074] sysfs_do_create_link_sd+0x116/0x130 [ 299.056871] sysfs_create_link+0x5f/0xc0 [ 299.060943] device_add+0x7d1/0x16d0 [ 299.064675] ? device_check_offline+0x280/0x280 [ 299.069357] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 299.074667] wiphy_register+0x1664/0x2130 [ 299.078832] ? bm_init+0x612/0x950 [ 299.082388] ? wiphy_unregister+0xea0/0xea0 [ 299.086751] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 299.091775] ? __kmalloc+0x38e/0x3c0 [ 299.095674] ? ieee80211_cs_list_valid+0x199/0x280 [ 299.100652] ieee80211_register_hw+0x13a7/0x3410 [ 299.105451] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 299.110388] ? memset+0x20/0x40 [ 299.113674] ? __hrtimer_init+0xe9/0x1d0 [ 299.117782] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 299.122908] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 299.127965] ? hwsim_mcast_del_radio+0x230/0x230 [ 299.132728] ? __kmalloc_track_caller+0x389/0x3c0 [ 299.137576] ? hwsim_new_radio_nl+0x273/0x850 [ 299.142102] ? memcpy+0x35/0x50 [ 299.145419] hwsim_new_radio_nl+0x5c3/0x850 [ 299.149788] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 299.155006] ? nla_parse+0x1b2/0x290 [ 299.158737] genl_family_rcv_msg+0x642/0xc40 [ 299.163158] ? genl_rcv+0x40/0x40 [ 299.166619] ? genl_rcv_msg+0x12f/0x160 [ 299.170978] ? __mutex_add_waiter+0x160/0x160 [ 299.175494] ? __radix_tree_lookup+0x216/0x370 [ 299.180091] genl_rcv_msg+0xbf/0x160 [ 299.183843] netlink_rcv_skb+0x160/0x440 [ 299.187944] ? genl_family_rcv_msg+0xc40/0xc40 [ 299.192546] ? netlink_ack+0xae0/0xae0 [ 299.196468] ? genl_rcv+0x15/0x40 [ 299.199964] genl_rcv+0x24/0x40 [ 299.203256] netlink_unicast+0x4d5/0x690 [ 299.207341] ? netlink_sendskb+0x110/0x110 [ 299.211594] ? _copy_from_iter_full+0x229/0x7c0 [ 299.216271] ? __phys_addr_symbol+0x2c/0x70 [ 299.220607] ? __check_object_size+0x17b/0x3d1 [ 299.225201] netlink_sendmsg+0x6bb/0xc40 [ 299.229462] ? aa_af_perm+0x230/0x230 [ 299.233276] ? nlmsg_notify+0x1a0/0x1a0 [ 299.237258] ? kernel_recvmsg+0x220/0x220 [ 299.241427] ? nlmsg_notify+0x1a0/0x1a0 [ 299.245413] sock_sendmsg+0xc3/0x120 [ 299.249139] ___sys_sendmsg+0x7bb/0x8e0 [ 299.253120] ? __lock_acquire+0x6de/0x3ff0 [ 299.257363] ? copy_msghdr_from_user+0x440/0x440 [ 299.262159] ? __fget+0x32f/0x510 [ 299.265628] ? lock_downgrade+0x720/0x720 [ 299.269782] ? check_preemption_disabled+0x41/0x280 [ 299.274807] ? check_preemption_disabled+0x41/0x280 [ 299.279843] ? __fget+0x356/0x510 [ 299.283306] ? do_dup2+0x450/0x450 [ 299.286877] ? __fdget+0x1d0/0x230 [ 299.290440] __x64_sys_sendmsg+0x132/0x220 [ 299.294682] ? __sys_sendmsg+0x1b0/0x1b0 [ 299.298762] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.304133] ? trace_hardirqs_off_caller+0x6e/0x210 [ 299.309169] ? do_syscall_64+0x21/0x620 [ 299.313180] do_syscall_64+0xf9/0x620 [ 299.317001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.322197] RIP: 0033:0x45de59 20:27:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000300)=""/90, &(0x7f0000000080)=0x5a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)="40274486bf1e1891e5ec0bd0aa9b73118d60b046c23c445ef99caeca42f49d15fcd689b6a5d679dec4342647a70f10fbe03c7e2cc16fa875754f4ba001fbdab4e25e7dacdb597c119727858df88f72f869940e2b9d767455523c0fe0899cc740a36bb22b2ef0ed45db611d0295739d7ea8d070156d1776b5b9d03015415f56beb90ac11f58e85bffd3776e374e8cd8809153"}, 0x20) keyctl$search(0xa, r0, &(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x1}, r0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) ioctl$CHAR_RAW_SECDISCARD(r1, 0x127d, &(0x7f00000002c0)=0x7f) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x4, 0x0, 0x10000}) ioctl$DRM_IOCTL_SG_ALLOC(r4, 0xc0106438, &(0x7f0000000100)={0x5, r5}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000000c0)={0x0, r5}) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f00000000c0)={0x0, r5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000003c0)={r5, 0xb2f}) exit(0x1) [ 299.325393] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.344307] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 299.352022] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 299.359296] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 299.366569] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 299.373848] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 299.381123] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e007a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:33 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="6900000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) ioctl$F2FS_IOC_DEFRAGMENT(r2, 0xc010f508, &(0x7f0000000000)={0x60000000000, 0x8}) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r3, 0x0, 0x0) 20:27:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00f00022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 299.559071] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.2'. [ 299.613361] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 299.633588] CPU: 1 PID: 17088 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 299.641511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.650872] Call Trace: [ 299.653470] dump_stack+0x1fc/0x2fe [ 299.657112] sysfs_warn_dup.cold+0x1c/0x2d [ 299.661355] sysfs_do_create_link_sd+0x116/0x130 [ 299.666122] sysfs_create_link+0x5f/0xc0 [ 299.670191] device_add+0x7d1/0x16d0 [ 299.673918] ? device_check_offline+0x280/0x280 [ 299.678601] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 299.683930] wiphy_register+0x1664/0x2130 [ 299.688102] ? bm_init+0x612/0x950 [ 299.691659] ? wiphy_unregister+0xea0/0xea0 [ 299.695996] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 299.701031] ? __kmalloc+0x38e/0x3c0 [ 299.704754] ? ieee80211_cs_list_valid+0x199/0x280 [ 299.709785] ieee80211_register_hw+0x13a7/0x3410 [ 299.714559] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 299.719518] ? memset+0x20/0x40 [ 299.722857] ? __hrtimer_init+0xe9/0x1d0 [ 299.726938] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 299.732083] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 299.737167] ? hwsim_mcast_del_radio+0x230/0x230 [ 299.741937] ? __kmalloc_track_caller+0x389/0x3c0 [ 299.746790] ? hwsim_new_radio_nl+0x273/0x850 [ 299.751303] ? memcpy+0x35/0x50 [ 299.754596] hwsim_new_radio_nl+0x5c3/0x850 [ 299.760156] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 299.765364] ? nla_parse+0x1b2/0x290 [ 299.769096] genl_family_rcv_msg+0x642/0xc40 [ 299.773540] ? genl_rcv+0x40/0x40 [ 299.777011] ? genl_rcv_msg+0x12f/0x160 [ 299.780992] ? __mutex_add_waiter+0x160/0x160 [ 299.785506] ? __radix_tree_lookup+0x216/0x370 [ 299.790117] genl_rcv_msg+0xbf/0x160 [ 299.793846] netlink_rcv_skb+0x160/0x440 [ 299.797917] ? genl_family_rcv_msg+0xc40/0xc40 [ 299.802513] ? netlink_ack+0xae0/0xae0 [ 299.806409] ? genl_rcv+0x15/0x40 [ 299.809890] genl_rcv+0x24/0x40 [ 299.814310] netlink_unicast+0x4d5/0x690 [ 299.818386] ? netlink_sendskb+0x110/0x110 [ 299.822632] ? _copy_from_iter_full+0x229/0x7c0 [ 299.827311] ? __phys_addr_symbol+0x2c/0x70 [ 299.831643] ? __check_object_size+0x17b/0x3d1 [ 299.836232] netlink_sendmsg+0x6bb/0xc40 [ 299.840305] ? aa_af_perm+0x230/0x230 [ 299.844113] ? nlmsg_notify+0x1a0/0x1a0 [ 299.848090] ? kernel_recvmsg+0x220/0x220 [ 299.852249] ? nlmsg_notify+0x1a0/0x1a0 [ 299.856238] sock_sendmsg+0xc3/0x120 [ 299.859961] ___sys_sendmsg+0x7bb/0x8e0 [ 299.863941] ? __lock_acquire+0x6de/0x3ff0 [ 299.868183] ? copy_msghdr_from_user+0x440/0x440 [ 299.872943] ? __fget+0x32f/0x510 [ 299.876405] ? lock_downgrade+0x720/0x720 [ 299.880559] ? check_preemption_disabled+0x41/0x280 [ 299.885582] ? check_preemption_disabled+0x41/0x280 [ 299.890612] ? __fget+0x356/0x510 [ 299.894069] ? do_dup2+0x450/0x450 [ 299.897622] ? __fdget+0x1d0/0x230 [ 299.901171] __x64_sys_sendmsg+0x132/0x220 [ 299.905437] ? __sys_sendmsg+0x1b0/0x1b0 [ 299.909531] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.914904] ? trace_hardirqs_off_caller+0x6e/0x210 [ 299.919945] ? do_syscall_64+0x21/0x620 [ 299.923930] do_syscall_64+0xf9/0x620 [ 299.927745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.932938] RIP: 0033:0x45de59 [ 299.936137] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.955043] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:27:34 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x240100, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r3, 0x40096102, &(0x7f0000000440)={{&(0x7f00000003c0)={'Accelerator\x00', {&(0x7f0000000300)=@adf_dec={@bank={'Bank', '0', 'InterruptCoalescingNumResponses\x00'}, {}, {&(0x7f0000000240)=@adf_hex={@bank={'Bank', '1', 'InterruptCoalescingTimerNs\x00'}, {0x400000}}}}}, {&(0x7f0000000180)={'Accelerator\x00'}}}}, 0x7}) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 299.962761] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 299.970037] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 299.977311] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 299.984587] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 299.992128] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:34 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="c000000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00540122008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:34 executing program 0: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000240)='cifs.idmap\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="8ce5b0e88a6ff9d9477530b97becf3064e8e2489c9c9d3b4cac38a7b794ad84f9964", 0x22, 0xffffffffffffffff) keyctl$read(0xb, r3, 0x0, 0x33) r4 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{^-\x00', 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000180)) keyctl$instantiate(0xc, r5, 0x0, 0x0, r4) 20:27:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x40, 0x0) setpriority(0x0, 0x0, 0x2) connect$l2tp6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x6}, 0x20) getsockopt$inet_dccp_int(r2, 0x21, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) request_key(&(0x7f0000000080)='trusted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='(*![,\x00', r0) keyctl$read(0xb, r1, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000200)={0x0, 0x3}) [ 300.192372] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.2'. 20:27:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000322008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 300.245081] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 300.285314] CPU: 1 PID: 17117 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 300.293335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.302728] Call Trace: [ 300.305331] dump_stack+0x1fc/0x2fe [ 300.308983] sysfs_warn_dup.cold+0x1c/0x2d [ 300.313242] sysfs_do_create_link_sd+0x116/0x130 [ 300.318020] sysfs_create_link+0x5f/0xc0 [ 300.322096] device_add+0x7d1/0x16d0 [ 300.325846] ? device_check_offline+0x280/0x280 [ 300.330551] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 300.336046] wiphy_register+0x1664/0x2130 [ 300.340213] ? bm_init+0x612/0x950 [ 300.343773] ? wiphy_unregister+0xea0/0xea0 [ 300.348111] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 300.353138] ? __kmalloc+0x38e/0x3c0 [ 300.356865] ? ieee80211_cs_list_valid+0x199/0x280 [ 300.361816] ieee80211_register_hw+0x13a7/0x3410 [ 300.366597] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 300.371544] ? memset+0x20/0x40 [ 300.374839] ? __hrtimer_init+0xe9/0x1d0 [ 300.378916] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 300.384034] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 300.389074] ? hwsim_mcast_del_radio+0x230/0x230 [ 300.393843] ? __kmalloc_track_caller+0x389/0x3c0 [ 300.398971] ? hwsim_new_radio_nl+0x273/0x850 [ 300.403516] ? memcpy+0x35/0x50 [ 300.406808] hwsim_new_radio_nl+0x5c3/0x850 [ 300.411262] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 300.416497] ? nla_parse+0x1b2/0x290 [ 300.420315] genl_family_rcv_msg+0x642/0xc40 [ 300.424748] ? genl_rcv+0x40/0x40 [ 300.428230] ? genl_rcv_msg+0x12f/0x160 [ 300.432826] ? __mutex_add_waiter+0x160/0x160 [ 300.437340] ? __radix_tree_lookup+0x216/0x370 [ 300.441957] genl_rcv_msg+0xbf/0x160 [ 300.445690] netlink_rcv_skb+0x160/0x440 [ 300.449850] ? genl_family_rcv_msg+0xc40/0xc40 [ 300.455436] ? netlink_ack+0xae0/0xae0 [ 300.459356] ? genl_rcv+0x15/0x40 [ 300.462824] genl_rcv+0x24/0x40 [ 300.466108] netlink_unicast+0x4d5/0x690 [ 300.470176] ? netlink_sendskb+0x110/0x110 [ 300.474454] ? _copy_from_iter_full+0x229/0x7c0 [ 300.479129] ? __phys_addr_symbol+0x2c/0x70 [ 300.483466] ? __check_object_size+0x17b/0x3d1 [ 300.488181] netlink_sendmsg+0x6bb/0xc40 [ 300.492259] ? aa_af_perm+0x230/0x230 [ 300.496501] ? nlmsg_notify+0x1a0/0x1a0 [ 300.500482] ? kernel_recvmsg+0x220/0x220 [ 300.504755] ? nlmsg_notify+0x1a0/0x1a0 [ 300.508911] sock_sendmsg+0xc3/0x120 [ 300.512644] ___sys_sendmsg+0x7bb/0x8e0 [ 300.516990] ? __lock_acquire+0x6de/0x3ff0 [ 300.521248] ? copy_msghdr_from_user+0x440/0x440 [ 300.526042] ? __fget+0x32f/0x510 [ 300.529512] ? lock_downgrade+0x720/0x720 [ 300.533672] ? check_preemption_disabled+0x41/0x280 [ 300.538704] ? check_preemption_disabled+0x41/0x280 [ 300.543778] ? __fget+0x356/0x510 [ 300.547266] ? do_dup2+0x450/0x450 [ 300.550820] ? __fdget+0x1d0/0x230 [ 300.554371] __x64_sys_sendmsg+0x132/0x220 [ 300.558619] ? __sys_sendmsg+0x1b0/0x1b0 [ 300.562813] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.568454] ? trace_hardirqs_off_caller+0x6e/0x210 [ 300.573477] ? do_syscall_64+0x21/0x620 [ 300.581250] do_syscall_64+0xf9/0x620 [ 300.585071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.590268] RIP: 0033:0x45de59 [ 300.593467] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.612373] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 300.620789] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 300.628071] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 20:27:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x9, 0x2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, r2) keyctl$read(0xb, r1, 0x0, 0x0) [ 300.635357] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 300.642642] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 300.649933] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:34 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) mmap$dsp(&(0x7f0000ff4000/0xa000)=nil, 0xa000, 0x1000003, 0x10, 0xffffffffffffffff, 0x0) keyctl$read(0xb, r1, &(0x7f00000024c0)=""/4110, 0x100e) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x41}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x5, 0xf}}}}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xa, 0xbd, [0xc5e6, 0x3f, 0xfff]}]}, 0x2c}}, 0x40) 20:27:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4040, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000522008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 300.681675] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.2'. [ 300.715894] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 300.737823] CPU: 1 PID: 17117 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 300.746089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.756931] Call Trace: [ 300.759532] dump_stack+0x1fc/0x2fe [ 300.763262] sysfs_warn_dup.cold+0x1c/0x2d [ 300.767514] sysfs_do_create_link_sd+0x116/0x130 [ 300.772280] sysfs_create_link+0x5f/0xc0 [ 300.776352] device_add+0x7d1/0x16d0 [ 300.780084] ? device_check_offline+0x280/0x280 [ 300.785022] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 300.790590] wiphy_register+0x1664/0x2130 [ 300.795540] ? bm_init+0x612/0x950 [ 300.799268] ? wiphy_unregister+0xea0/0xea0 [ 300.803603] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 300.808634] ? __kmalloc+0x38e/0x3c0 [ 300.812362] ? ieee80211_cs_list_valid+0x199/0x280 [ 300.817309] ieee80211_register_hw+0x13a7/0x3410 [ 300.822091] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 300.827031] ? memset+0x20/0x40 [ 300.830330] ? __hrtimer_init+0xe9/0x1d0 [ 300.834406] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 300.839537] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 300.844932] ? hwsim_mcast_del_radio+0x230/0x230 [ 300.849700] ? __kmalloc_track_caller+0x389/0x3c0 [ 300.854559] ? hwsim_new_radio_nl+0x273/0x850 [ 300.859078] ? memcpy+0x35/0x50 [ 300.862373] hwsim_new_radio_nl+0x5c3/0x850 [ 300.866705] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 300.871918] ? nla_parse+0x1b2/0x290 [ 300.875646] genl_family_rcv_msg+0x642/0xc40 [ 300.880073] ? genl_rcv+0x40/0x40 [ 300.883622] ? genl_rcv_msg+0x12f/0x160 [ 300.887696] ? __mutex_add_waiter+0x160/0x160 [ 300.892214] ? __radix_tree_lookup+0x216/0x370 [ 300.896900] genl_rcv_msg+0xbf/0x160 [ 300.900635] netlink_rcv_skb+0x160/0x440 [ 300.904715] ? genl_family_rcv_msg+0xc40/0xc40 [ 300.909339] ? netlink_ack+0xae0/0xae0 [ 300.913248] ? genl_rcv+0x15/0x40 [ 300.916758] genl_rcv+0x24/0x40 [ 300.920223] netlink_unicast+0x4d5/0x690 [ 300.924393] ? netlink_sendskb+0x110/0x110 [ 300.928641] ? _copy_from_iter_full+0x229/0x7c0 [ 300.933321] ? __phys_addr_symbol+0x2c/0x70 [ 300.937735] ? __check_object_size+0x17b/0x3d1 [ 300.942329] netlink_sendmsg+0x6bb/0xc40 [ 300.946403] ? aa_af_perm+0x230/0x230 [ 300.950227] ? nlmsg_notify+0x1a0/0x1a0 [ 300.954220] ? kernel_recvmsg+0x220/0x220 [ 300.958485] ? nlmsg_notify+0x1a0/0x1a0 [ 300.962469] sock_sendmsg+0xc3/0x120 [ 300.966224] ___sys_sendmsg+0x7bb/0x8e0 [ 300.970212] ? __lock_acquire+0x6de/0x3ff0 [ 300.974456] ? copy_msghdr_from_user+0x440/0x440 [ 300.979252] ? __fget+0x32f/0x510 [ 300.982723] ? lock_downgrade+0x720/0x720 [ 300.986894] ? check_preemption_disabled+0x41/0x280 [ 300.991926] ? check_preemption_disabled+0x41/0x280 [ 300.996959] ? __fget+0x356/0x510 [ 301.000431] ? do_dup2+0x450/0x450 [ 301.003995] ? __fdget+0x1d0/0x230 [ 301.007581] __x64_sys_sendmsg+0x132/0x220 [ 301.011826] ? __sys_sendmsg+0x1b0/0x1b0 [ 301.015916] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.021980] ? trace_hardirqs_off_caller+0x6e/0x210 [ 301.027107] ? do_syscall_64+0x21/0x620 [ 301.031129] do_syscall_64+0xf9/0x620 [ 301.034947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.040147] RIP: 0033:0x45de59 [ 301.043379] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.062297] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 301.070040] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 301.077318] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 20:27:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000622008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000722008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000922008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 301.084625] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 301.091927] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 301.099211] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:35 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2302000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x9, 0x2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, r2) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/seq\x00', 0x81) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) r3 = signalfd4(r0, &(0x7f0000000000)={[0x9]}, 0x8, 0x80000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000140)="b5ded6e693b619fbd33eedb9b07d03a67f0a22a329f6e78bf9e9735c7b1bcaf609d9380aa00be10a3a940c41289c49d2a55e2c6bb773f6f5a9fb340c765dc2e3d10551a0b4c583ae336ee674f0f97d26de0dcfd4242f102ee1879cd597c8f1e8c9458032fb792710f21c8ede5ff2521b31776caa644ffd55fc9a17d6ad37ecae810337bd9a6e70a017774e76d1a7cdc2a54b1b8b594d", 0x96) io_cancel(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000a40)="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", 0x1000, 0xfffffffffffff816, 0x0, 0x2, r3}, &(0x7f0000000080)) 20:27:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:35 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x4040c3, 0x0) r6 = signalfd4(r0, &(0x7f0000000580)={[0xffffffffffffa13e]}, 0x8, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, 0x142f}}, 0x18) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r4}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000440)={r8, 0x3ff, 0x400, 0x380, 0xe7f, 0x8}, &(0x7f0000000500)=0x14) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)={0x2, 0x0, "d152b6886b8906658cbdb50f5ac0ac3d3c96b315d918b06b20aa74276119eb86c678bd6139b288ac28992c0a606de123911071fe4c43ed2ac0181b71283618c549f9e7f372e354d3b068ef3e741a5719535843b01ee45cc04f8fdff28655ece839d73ccd"}, 0x6c, r2) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x10000, 0x0) 20:27:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000b22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 301.250662] netlink: 499 bytes leftover after parsing attributes in process `syz-executor.2'. [ 301.292611] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 301.315028] CPU: 1 PID: 17180 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 301.322950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.332324] Call Trace: [ 301.334971] dump_stack+0x1fc/0x2fe [ 301.338636] sysfs_warn_dup.cold+0x1c/0x2d [ 301.342890] sysfs_do_create_link_sd+0x116/0x130 [ 301.347660] sysfs_create_link+0x5f/0xc0 [ 301.351735] device_add+0x7d1/0x16d0 [ 301.355465] ? device_check_offline+0x280/0x280 [ 301.360170] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 301.365468] wiphy_register+0x1664/0x2130 [ 301.369642] ? bm_init+0x612/0x950 [ 301.373203] ? wiphy_unregister+0xea0/0xea0 [ 301.377545] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 301.382691] ? __kmalloc+0x38e/0x3c0 [ 301.386417] ? ieee80211_cs_list_valid+0x199/0x280 [ 301.391368] ieee80211_register_hw+0x13a7/0x3410 [ 301.396164] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 301.401101] ? memset+0x20/0x40 [ 301.404385] ? __hrtimer_init+0xe9/0x1d0 [ 301.408449] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 301.413587] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 301.418620] ? hwsim_mcast_del_radio+0x230/0x230 [ 301.423407] ? __kmalloc_track_caller+0x389/0x3c0 [ 301.428253] ? hwsim_new_radio_nl+0x273/0x850 [ 301.432753] ? memcpy+0x35/0x50 [ 301.436042] hwsim_new_radio_nl+0x5c3/0x850 [ 301.440368] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 301.445585] ? nla_parse+0x1b2/0x290 [ 301.449320] genl_family_rcv_msg+0x642/0xc40 [ 301.453737] ? genl_rcv+0x40/0x40 [ 301.457205] ? genl_rcv_msg+0x12f/0x160 [ 301.461184] ? __mutex_add_waiter+0x160/0x160 [ 301.465701] ? __radix_tree_lookup+0x216/0x370 [ 301.470300] genl_rcv_msg+0xbf/0x160 [ 301.474025] netlink_rcv_skb+0x160/0x440 [ 301.478109] ? genl_family_rcv_msg+0xc40/0xc40 [ 301.482695] ? netlink_ack+0xae0/0xae0 [ 301.486593] ? genl_rcv+0x15/0x40 [ 301.490073] genl_rcv+0x24/0x40 [ 301.493458] netlink_unicast+0x4d5/0x690 [ 301.497534] ? netlink_sendskb+0x110/0x110 [ 301.501796] ? _copy_from_iter_full+0x229/0x7c0 [ 301.506472] ? __phys_addr_symbol+0x2c/0x70 [ 301.510794] ? __check_object_size+0x17b/0x3d1 [ 301.515384] netlink_sendmsg+0x6bb/0xc40 [ 301.519473] ? aa_af_perm+0x230/0x230 [ 301.523284] ? nlmsg_notify+0x1a0/0x1a0 [ 301.527261] ? kernel_recvmsg+0x220/0x220 [ 301.531441] ? nlmsg_notify+0x1a0/0x1a0 [ 301.535424] sock_sendmsg+0xc3/0x120 [ 301.539150] ___sys_sendmsg+0x7bb/0x8e0 [ 301.543134] ? __lock_acquire+0x6de/0x3ff0 [ 301.547375] ? copy_msghdr_from_user+0x440/0x440 [ 301.552135] ? __fget+0x32f/0x510 [ 301.555608] ? lock_downgrade+0x720/0x720 [ 301.559766] ? check_preemption_disabled+0x41/0x280 [ 301.565229] ? check_preemption_disabled+0x41/0x280 [ 301.570275] ? __fget+0x356/0x510 [ 301.573733] ? do_dup2+0x450/0x450 [ 301.577279] ? __fdget+0x1d0/0x230 [ 301.580825] __x64_sys_sendmsg+0x132/0x220 [ 301.585061] ? __sys_sendmsg+0x1b0/0x1b0 [ 301.589131] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.594503] ? trace_hardirqs_off_caller+0x6e/0x210 [ 301.599541] ? do_syscall_64+0x21/0x620 [ 301.603520] do_syscall_64+0xf9/0x620 [ 301.607330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.612522] RIP: 0033:0x45de59 [ 301.615726] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.634639] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:27:35 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="297f6c72ee50d6ec00"], 0x6) bind$alg(r2, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(blowfish-asm)\x00'}, 0x58) r5 = accept4(r2, 0x0, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x200000, 0x0) [ 301.642361] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 301.649660] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 301.656937] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 301.664234] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 301.671522] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000e22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00001f22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000000)={0xf70, 0x7fffffff}) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/seq\x00', 0x81) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) r3 = signalfd4(r0, &(0x7f0000000000)={[0x9]}, 0x8, 0x80000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000140)="b5ded6e693b619fbd33eedb9b07d03a67f0a22a329f6e78bf9e9735c7b1bcaf609d9380aa00be10a3a940c41289c49d2a55e2c6bb773f6f5a9fb340c765dc2e3d10551a0b4c583ae336ee674f0f97d26de0dcfd4242f102ee1879cd597c8f1e8c9458032fb792710f21c8ede5ff2521b31776caa644ffd55fc9a17d6ad37ecae810337bd9a6e70a017774e76d1a7cdc2a54b1b8b594d", 0x96) io_cancel(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000a40)="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", 0x1000, 0xfffffffffffff816, 0x0, 0x2, r3}, &(0x7f0000000080)) 20:27:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00002022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:36 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="3502000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x80d, 0x6}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x4c, &(0x7f0000000140)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x3f, @mcast1, 0x6000}, @in={0x2, 0x4e23, @rand_addr=0x64010101}, @in={0x2, 0x4e22, @broadcast}]}, &(0x7f0000000200)=0x10) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r3) keyctl$read(0xb, r4, 0x0, 0x0) 20:27:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) execveat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000040)='].+,))(\x00', &(0x7f0000000080)='syz', &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='@\x00', &(0x7f0000000280)=']@\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000500)=[&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)='%,[\x00', &(0x7f0000000440)='^}-\x00'], 0x100) keyctl$read(0xb, r1, 0x0, 0x0) [ 302.117577] netlink: 517 bytes leftover after parsing attributes in process `syz-executor.2'. 20:27:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00003f22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000100)=""/157, &(0x7f0000000080)=0x9d) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000000)) keyctl$read(0xb, r1, 0x0, 0x0) [ 302.170664] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 302.213426] CPU: 0 PID: 17235 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 302.222229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.231695] Call Trace: [ 302.234315] dump_stack+0x1fc/0x2fe [ 302.238232] sysfs_warn_dup.cold+0x1c/0x2d [ 302.242475] sysfs_do_create_link_sd+0x116/0x130 [ 302.247281] sysfs_create_link+0x5f/0xc0 [ 302.251366] device_add+0x7d1/0x16d0 [ 302.255107] ? device_check_offline+0x280/0x280 [ 302.259879] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 302.265177] wiphy_register+0x1664/0x2130 [ 302.269353] ? bm_init+0x612/0x950 [ 302.272922] ? wiphy_unregister+0xea0/0xea0 [ 302.277272] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 302.282299] ? __kmalloc+0x38e/0x3c0 [ 302.286016] ? ieee80211_cs_list_valid+0x199/0x280 [ 302.290960] ieee80211_register_hw+0x13a7/0x3410 [ 302.295729] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 302.300678] ? memset+0x20/0x40 [ 302.305091] ? __hrtimer_init+0xe9/0x1d0 [ 302.309152] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 302.314264] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 302.319323] ? hwsim_mcast_del_radio+0x230/0x230 [ 302.324084] ? __kmalloc_track_caller+0x389/0x3c0 [ 302.330324] ? hwsim_new_radio_nl+0x273/0x850 [ 302.334846] ? memcpy+0x35/0x50 [ 302.338139] hwsim_new_radio_nl+0x5c3/0x850 [ 302.343248] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 302.348627] ? nla_parse+0x1b2/0x290 [ 302.352347] genl_family_rcv_msg+0x642/0xc40 [ 302.356822] ? genl_rcv+0x40/0x40 [ 302.360387] ? genl_rcv_msg+0x12f/0x160 [ 302.364369] ? __mutex_add_waiter+0x160/0x160 [ 302.368878] ? __radix_tree_lookup+0x216/0x370 [ 302.373472] genl_rcv_msg+0xbf/0x160 [ 302.377204] netlink_rcv_skb+0x160/0x440 [ 302.381271] ? genl_family_rcv_msg+0xc40/0xc40 [ 302.385856] ? netlink_ack+0xae0/0xae0 [ 302.389747] ? genl_rcv+0x15/0x40 [ 302.393220] genl_rcv+0x24/0x40 [ 302.396501] netlink_unicast+0x4d5/0x690 [ 302.400576] ? netlink_sendskb+0x110/0x110 [ 302.404816] ? _copy_from_iter_full+0x229/0x7c0 [ 302.409484] ? __phys_addr_symbol+0x2c/0x70 [ 302.413816] ? __check_object_size+0x17b/0x3d1 [ 302.418405] netlink_sendmsg+0x6bb/0xc40 [ 302.422476] ? aa_af_perm+0x230/0x230 [ 302.426280] ? nlmsg_notify+0x1a0/0x1a0 [ 302.430255] ? kernel_recvmsg+0x220/0x220 [ 302.434414] ? nlmsg_notify+0x1a0/0x1a0 [ 302.438393] sock_sendmsg+0xc3/0x120 [ 302.442108] ___sys_sendmsg+0x7bb/0x8e0 [ 302.446096] ? __lock_acquire+0x6de/0x3ff0 [ 302.450342] ? copy_msghdr_from_user+0x440/0x440 [ 302.455101] ? __fget+0x32f/0x510 [ 302.458579] ? lock_downgrade+0x720/0x720 [ 302.462824] ? check_preemption_disabled+0x41/0x280 [ 302.468554] ? check_preemption_disabled+0x41/0x280 [ 302.473577] ? __fget+0x356/0x510 [ 302.477040] ? do_dup2+0x450/0x450 [ 302.480588] ? __fdget+0x1d0/0x230 [ 302.484138] __x64_sys_sendmsg+0x132/0x220 [ 302.488381] ? __sys_sendmsg+0x1b0/0x1b0 [ 302.492475] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.497975] ? trace_hardirqs_off_caller+0x6e/0x210 [ 302.503359] ? do_syscall_64+0x21/0x620 [ 302.507338] do_syscall_64+0xf9/0x620 [ 302.511170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.516371] RIP: 0033:0x45de59 [ 302.519647] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.538558] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 302.546282] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 302.553551] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 302.560948] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 302.568228] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 302.576323] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = getpid() ptrace(0x10, r1) sched_setparam(r1, &(0x7f0000000000)=0xee) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xe000, 0x0) accept$alg(r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r6, 0x0, 0xffffffffffffffff) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r8, 0x0, 0xffffffffffffffff) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r10, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2000, &(0x7f00000002c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@afid={'afid', 0x3d, 0x1}}, {@cachetag={'cachetag', 0x3d, 'big_key\x00'}}, {@debug={'debug', 0x3d, 0x8}}], [{@uid_gt={'uid>', r8}}, {@fowner_gt={'fowner>'}}, {@uid_eq={'uid', 0x3d, r10}}, {@obj_role={'obj_role', 0x3d, '!&\x00'}}, {@subj_type={'subj_type', 0x3d, 'big_key\x00'}}, {@subj_type={'subj_type', 0x3d, '{#'}}]}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x2f, 0x8, 0x2, 0x9, 0x2, @empty, @mcast2, 0x1, 0x700, 0x40, 0x205f}}) 20:27:36 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000000f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) execveat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000040)='].+,))(\x00', &(0x7f0000000080)='syz', &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='@\x00', &(0x7f0000000280)=']@\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000500)=[&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)='%,[\x00', &(0x7f0000000440)='^}-\x00'], 0x100) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xe000, 0x0) accept$alg(r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r6, 0x0, 0xffffffffffffffff) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r8, 0x0, 0xffffffffffffffff) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r10, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2000, &(0x7f00000002c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@afid={'afid', 0x3d, 0x1}}, {@cachetag={'cachetag', 0x3d, 'big_key\x00'}}, {@debug={'debug', 0x3d, 0x8}}], [{@uid_gt={'uid>', r8}}, {@fowner_gt={'fowner>'}}, {@uid_eq={'uid', 0x3d, r10}}, {@obj_role={'obj_role', 0x3d, '!&\x00'}}, {@subj_type={'subj_type', 0x3d, 'big_key\x00'}}, {@subj_type={'subj_type', 0x3d, '{#'}}]}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x2f, 0x8, 0x2, 0x9, 0x2, @empty, @mcast2, 0x1, 0x700, 0x40, 0x205f}}) 20:27:37 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e02000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x28, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r3, 0x8, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x54}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x7}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x44004}, 0x800) 20:27:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = getpid() ptrace(0x10, r1) sched_setparam(r1, &(0x7f0000000000)=0xee) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00015422008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 303.017530] netlink: 510 bytes leftover after parsing attributes in process `syz-executor.2'. [ 303.097600] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 303.129917] CPU: 0 PID: 17283 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 303.137837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.147191] Call Trace: [ 303.149794] dump_stack+0x1fc/0x2fe [ 303.153432] sysfs_warn_dup.cold+0x1c/0x2d [ 303.157677] sysfs_do_create_link_sd+0x116/0x130 [ 303.162528] sysfs_create_link+0x5f/0xc0 [ 303.166620] device_add+0x7d1/0x16d0 [ 303.170350] ? device_check_offline+0x280/0x280 [ 303.175032] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 303.180324] wiphy_register+0x1664/0x2130 [ 303.184503] ? bm_init+0x612/0x950 [ 303.188057] ? wiphy_unregister+0xea0/0xea0 [ 303.192744] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 303.197772] ? __kmalloc+0x38e/0x3c0 [ 303.201498] ? ieee80211_cs_list_valid+0x199/0x280 [ 303.206462] ieee80211_register_hw+0x13a7/0x3410 [ 303.211260] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 303.216223] ? memset+0x20/0x40 [ 303.219510] ? __hrtimer_init+0xe9/0x1d0 [ 303.223669] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 303.228786] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 303.233824] ? hwsim_mcast_del_radio+0x230/0x230 [ 303.238762] ? __kmalloc_track_caller+0x389/0x3c0 [ 303.243874] ? hwsim_new_radio_nl+0x273/0x850 [ 303.248382] ? memcpy+0x35/0x50 [ 303.251671] hwsim_new_radio_nl+0x5c3/0x850 [ 303.256001] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 303.261206] ? nla_parse+0x1b2/0x290 [ 303.264961] genl_family_rcv_msg+0x642/0xc40 [ 303.269383] ? genl_rcv+0x40/0x40 [ 303.272840] ? genl_rcv_msg+0x12f/0x160 [ 303.276848] ? __mutex_add_waiter+0x160/0x160 [ 303.281453] ? __radix_tree_lookup+0x216/0x370 [ 303.286064] genl_rcv_msg+0xbf/0x160 [ 303.289804] netlink_rcv_skb+0x160/0x440 [ 303.293882] ? genl_family_rcv_msg+0xc40/0xc40 [ 303.298477] ? netlink_ack+0xae0/0xae0 [ 303.302384] ? genl_rcv+0x15/0x40 [ 303.305854] genl_rcv+0x24/0x40 [ 303.309148] netlink_unicast+0x4d5/0x690 [ 303.313228] ? netlink_sendskb+0x110/0x110 [ 303.317472] ? _copy_from_iter_full+0x229/0x7c0 [ 303.322500] ? __phys_addr_symbol+0x2c/0x70 [ 303.326833] ? __check_object_size+0x17b/0x3d1 [ 303.331438] netlink_sendmsg+0x6bb/0xc40 [ 303.335535] ? aa_af_perm+0x230/0x230 [ 303.339762] ? nlmsg_notify+0x1a0/0x1a0 [ 303.343746] ? kernel_recvmsg+0x220/0x220 [ 303.347910] ? nlmsg_notify+0x1a0/0x1a0 [ 303.351895] sock_sendmsg+0xc3/0x120 [ 303.355618] ___sys_sendmsg+0x7bb/0x8e0 [ 303.359603] ? __lock_acquire+0x6de/0x3ff0 [ 303.363845] ? copy_msghdr_from_user+0x440/0x440 [ 303.368613] ? __fget+0x32f/0x510 [ 303.372093] ? lock_downgrade+0x720/0x720 [ 303.376278] ? check_preemption_disabled+0x41/0x280 [ 303.381318] ? check_preemption_disabled+0x41/0x280 [ 303.386613] ? __fget+0x356/0x510 [ 303.390081] ? do_dup2+0x450/0x450 [ 303.393651] ? __fdget+0x1d0/0x230 [ 303.397205] __x64_sys_sendmsg+0x132/0x220 [ 303.401454] ? __sys_sendmsg+0x1b0/0x1b0 [ 303.405538] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.410921] ? trace_hardirqs_off_caller+0x6e/0x210 [ 303.415956] ? do_syscall_64+0x21/0x620 [ 303.419947] do_syscall_64+0xf9/0x620 [ 303.423768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.428963] RIP: 0033:0x45de59 20:27:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:37 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000001c0)={0x2, 0x7, 0x1b, 0x5, 0x2}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000004c0)={0xb6, "71e85c7ac0490ef802f000ba8159f5b5771d1f191d1af2bc458b13512f00ad437e82b3c56da54b8381de1554a2958ef097a237b3aca362889ce2c9d72adcaed07f5d5c74097c91e5e30c9b7b3af9705b097867334ca091edf6742da1b4b2c87d62067d47a09fe410922c8ad0da90b71ed493b01bfdfb261921d0c9471356865ff8a1b5ca6d6e5b91ca5fae5d7659cdedeb582ef6533d535784307046b78337e86013b76af62bccce9df32347da11da0d152a97084b0740ebeb27f98f5df46dfed8f4960fed09044caa7b31f2cd564ddf22d8a6718f7aa4e8f5931ed874616f4b9f54fe406c4bf8d8030e108b31deef6e6f86434879145ac5903b96f5a7f923ce6a8d0ea94ba33b5cd1c90fea91b7f33603515d1565a6423119e5f4fb6bdaab1ffc717623b9e7209fc36a63bb99649569fd8cf7f608f6e7b05a24501bdd8243e04aac40502afcaec3daf3207b7cdcd4b8cd48678f1885af9077c555791702f97b9fe59742df6e46cb8789502a9a34a4059c01c4d6a3896bc2505fee595f38b7614d2472c668bf3f476c38427c55d2be1bde1fad5d44891b10705601cd6f11ccd055bae5ac8fa2845623b0b337875491f53f135f5bd31343a0e8cc60ba0e54410e9f39f63e9b16f5bc9c9eed782440f6aebbb6b82d4bf14a2b3115e49814e2023d44ef0cbc84d0e980144af22d4ef3590eeca28f444a160648829224c466045f9d"}) getrusage(0xffffffffffffffff, &(0x7f0000000400)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000300)={'batadv0\x00'}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) splice(r0, 0x0, r4, 0x0, 0x200001, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000240)="eae5f82221e304fbb159522946f95803a0c905ad0725d7a7483595bcba0d744343894265d7a2720588e0ae5259149d1976500a6152573db1a4b2f80afcc90a32a37c33fe91e148de9bc7000b44db1edaab22a53a9993dbfdf980f23d1f9fbe585be9ccdd3fccc2ce8f5d26a92e4fde154dc24420531672b20ebe67947f270ba8791cacb5de8ca11f119a720367cf8d7d994e4702cb2c83c6409c0ebe57b24ba4691d17d4192f6c96c67930339124cba693caee7cb0b2c57e95", 0xffffff88, 0xfffffffffffffffa) 20:27:37 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3260, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 303.432180] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.451612] RSP: 002b:00007f109a75fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 303.459334] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 303.466612] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 303.473892] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 303.481169] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 303.488449] R13: 00007ffcea5682af R14: 00007f109a7609c0 R15: 000000000118bf2c 20:27:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:37 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e03000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0', "a54bb081662c32896bb477577def702feabe3d068d74e7fcbb5be2b1a5237ba97b47798b269af54ba6951a161758206c995ee5ed54415a4edead75cbac22ad759dc60c841715b053f3a551c4a67799dd8648bf765c9848dc2b9f4a70fe806ee8dba7f4a7d96da90daae4752585d5062771809a35ac114656c80226f70998a42ecd2105ffea1cf669ee6472eb2bbfc401fce8745a20f9d9e93fed90589f43a5eb0b6bb9ad44eb35c01f24097fb019fcf49ecb8af59d2477966dc6dd0511a23e79b4a13ada0b2c4a12107136b7887bc1024e0a899f14b5bef81230692b723ab2d8cb5928f86d56be51bd42982b87435129d32100f73146541b5f"}, 0xfd) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x3f, 0x200880) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:27:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:37 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e04000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0', "a54bb081662c32896bb477577def702feabe3d068d74e7fcbb5be2b1a5237ba97b47798b269af54ba6951a161758206c995ee5ed54415a4edead75cbac22ad759dc60c841715b053f3a551c4a67799dd8648bf765c9848dc2b9f4a70fe806ee8dba7f4a7d96da90daae4752585d5062771809a35ac114656c80226f70998a42ecd2105ffea1cf669ee6472eb2bbfc401fce8745a20f9d9e93fed90589f43a5eb0b6bb9ad44eb35c01f24097fb019fcf49ecb8af59d2477966dc6dd0511a23e79b4a13ada0b2c4a12107136b7887bc1024e0a899f14b5bef81230692b723ab2d8cb5928f86d56be51bd42982b87435129d32100f73146541b5f"}, 0xfd) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x3f, 0x200880) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:27:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x51}, 0x8) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:38 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e05000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000240)="09f9641f1e9587b95db77b9f971c6b7116378947ed14b91d6f0532ad8690e80276304f489db06adfcf4291b75ae0b28188b8963d02667b3a024eebb60da96a69fef64be9387225130cf8c1faf63d7c7fa1e342d408df951e86f615d8df90dfbd5fd6e4cfebe7822c13e3fcdb5bcce1aaa6e2e819c4d6ec307cbb143dd96e4aa5fc7a55fe150ab6da8cb13a9aeebab108299958965711ad90de13c59d5ef44942dda50370bed9c7f806d39d316f7cd34d3f55086bf496ebbf1d5ea81ec4fcbfb2658e81b430374dc0120956fcd3c1b4167e55dcd7bdd31d9a5d71a577e4a673191365bf739b1ce66d260916090cb54bd690d246d861e6639a93", 0xf9, r1) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r4) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$link(0x8, r3, r0) 20:27:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007422008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x8a44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x274, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffff}, 0x0, 0xb, r0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x2, 0x2b0243) ioctl$VIDIOC_G_AUDOUT(r4, 0x80345631, &(0x7f0000000140)) getpeername$unix(r4, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000040)) 20:27:38 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000240)="09f9641f1e9587b95db77b9f971c6b7116378947ed14b91d6f0532ad8690e80276304f489db06adfcf4291b75ae0b28188b8963d02667b3a024eebb60da96a69fef64be9387225130cf8c1faf63d7c7fa1e342d408df951e86f615d8df90dfbd5fd6e4cfebe7822c13e3fcdb5bcce1aaa6e2e819c4d6ec307cbb143dd96e4aa5fc7a55fe150ab6da8cb13a9aeebab108299958965711ad90de13c59d5ef44942dda50370bed9c7f806d39d316f7cd34d3f55086bf496ebbf1d5ea81ec4fcbfb2658e81b430374dc0120956fcd3c1b4167e55dcd7bdd31d9a5d71a577e4a673191365bf739b1ce66d260916090cb54bd690d246d861e6639a93", 0xf9, r1) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r4) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$link(0x8, r3, r0) 20:27:38 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e06000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000240)="09f9641f1e9587b95db77b9f971c6b7116378947ed14b91d6f0532ad8690e80276304f489db06adfcf4291b75ae0b28188b8963d02667b3a024eebb60da96a69fef64be9387225130cf8c1faf63d7c7fa1e342d408df951e86f615d8df90dfbd5fd6e4cfebe7822c13e3fcdb5bcce1aaa6e2e819c4d6ec307cbb143dd96e4aa5fc7a55fe150ab6da8cb13a9aeebab108299958965711ad90de13c59d5ef44942dda50370bed9c7f806d39d316f7cd34d3f55086bf496ebbf1d5ea81ec4fcbfb2658e81b430374dc0120956fcd3c1b4167e55dcd7bdd31d9a5d71a577e4a673191365bf739b1ce66d260916090cb54bd690d246d861e6639a93", 0xf9, r1) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r4) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$link(0x8, r3, r0) 20:27:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}}}, &(0x7f0000000200)=0xe8) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x80000, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cache_loose='cache=loose'}, {@access_uid={'access', 0x3d, r2}}, {@afid={'afid', 0x3d, 0x7}}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@smackfsdef={'smackfsdef'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@hash='hash'}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz'}}, {@smackfsroot={'smackfsroot', 0x3d, '\'*.\xbe(@'}}, {@fsname={'fsname'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, '^'}}]}}) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:38 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000240)="09f9641f1e9587b95db77b9f971c6b7116378947ed14b91d6f0532ad8690e80276304f489db06adfcf4291b75ae0b28188b8963d02667b3a024eebb60da96a69fef64be9387225130cf8c1faf63d7c7fa1e342d408df951e86f615d8df90dfbd5fd6e4cfebe7822c13e3fcdb5bcce1aaa6e2e819c4d6ec307cbb143dd96e4aa5fc7a55fe150ab6da8cb13a9aeebab108299958965711ad90de13c59d5ef44942dda50370bed9c7f806d39d316f7cd34d3f55086bf496ebbf1d5ea81ec4fcbfb2658e81b430374dc0120956fcd3c1b4167e55dcd7bdd31d9a5d71a577e4a673191365bf739b1ce66d260916090cb54bd690d246d861e6639a93", 0xf9, r1) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r4) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$link(0x8, r3, r0) 20:27:38 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e07000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000f022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000240)="09f9641f1e9587b95db77b9f971c6b7116378947ed14b91d6f0532ad8690e80276304f489db06adfcf4291b75ae0b28188b8963d02667b3a024eebb60da96a69fef64be9387225130cf8c1faf63d7c7fa1e342d408df951e86f615d8df90dfbd5fd6e4cfebe7822c13e3fcdb5bcce1aaa6e2e819c4d6ec307cbb143dd96e4aa5fc7a55fe150ab6da8cb13a9aeebab108299958965711ad90de13c59d5ef44942dda50370bed9c7f806d39d316f7cd34d3f55086bf496ebbf1d5ea81ec4fcbfb2658e81b430374dc0120956fcd3c1b4167e55dcd7bdd31d9a5d71a577e4a673191365bf739b1ce66d260916090cb54bd690d246d861e6639a93", 0xf9, r1) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r4) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$link(0x8, r3, r0) 20:27:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101080, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000500)={0xe7, ""/231}) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf34fcdc2165ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x7c, r4) keyctl$search(0xa, r3, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$assume_authority(0x10, r3) 20:27:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3, 0x7ff, 0x1f47, 0x0], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000080)={@none, 0x200}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000500)) keyctl$read(0xb, 0x0, 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="dc0200000103010300000000000000000c0000049c000f80100002800c0002800500010084000000080004400000feaf600002800c000280050001008400000006000340000400000c000280050001003a0000002c000180140003002001000000000000000000000000000014000400fe80000000630b0000e60000000000bb06000340000000000600034000030000200001800c0002800500010021000000060003000000000000067b4000010000080003400000858208000340000000992c00138006000140000000000600014088a800000600014088a800000600014088a800000600024000040000f0000f803400018006000340000000000c0002800500010084000000060003400004000006000340000000000c0002800500010084000000780001802c00018014000300fe8000000000000000000000000000aa14000400000000000000000000000000000000001400018008000100ac1414aa08000200ac1414aa1400018008000100ac14144108000200ac1e01010c00028005000100010000000c0002800500010088000000060003400002000008000940000000033800018006000340000400002c000180140003002001000000000000000000000000000114000400fe8000000000000000000000000000aa75000a00c0230ed9c6d2fcb3e274b3a0be6d84e7d0da055053897b06277afa8bdd6b1af30a68f1bf799b252da0f1fca1c9aba7c3b90eb40e7673059101bc379b8fb926b47f57f351ceaf33b84a12b85656aeed824abecc58ec7e409c49fa2500ad4c985202bcd8692321221d1b1a2567edfa3ae63d00000016000a00d08eb6308ee5311eaba30e628de4d898f980000020000f8013000b00635f6c6c666f7277617264696e670000080009400000000344000f80300003802c00018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000000000aa100003800c00028005000100210000000c000f800800054000000401aca047301e2b12e1477b670ce109e2dbcb14fb6333f3551dce5207ac0179c69965f7625198fa36305180b33c0547227850fa4fabfdb4b2c2e083865812d9627392acba43b8dcdae5bf3503f029bf6a71510f9a34e76eab8e788e759f7bf38618e5735b3c46edf2bb4ca1a5b5c532ac16eae64d0b4b6e8f360a7e51b8544f1b0f232c1c9d0a540bc0044b565e380399f39a8bc525b3e2436ebe29ecc0a29d9ee13ed1828892c8b37965fd46bec810028b4291911eeabfc153b2cd96d4314a4c"], 0x2dc}, 0x1, 0x0, 0x0, 0x20000000}, 0x810) 20:27:38 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e08000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000000f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}}}, &(0x7f0000000200)=0xe8) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x80000, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cache_loose='cache=loose'}, {@access_uid={'access', 0x3d, r2}}, {@afid={'afid', 0x3d, 0x7}}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@smackfsdef={'smackfsdef'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@hash='hash'}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz'}}, {@smackfsroot={'smackfsroot', 0x3d, '\'*.\xbe(@'}}, {@fsname={'fsname'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, '^'}}]}}) keyctl$read(0xb, r1, 0x0, 0x0) [ 304.548341] Unknown ioctl 21381 20:27:38 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x30180) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x4050) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x28, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r6, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x200, 0x63}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x8840}, 0x40891) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f00000001c0)={0x800, 0x5, 0x1200000, 0x8}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x3) r8 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r10, r9, &(0x7f00000000c0)=0x800007, 0x5) ioctl$PIO_UNISCRNMAP(r9, 0x4b6a, &(0x7f0000000200)="efc63930e13a950f333d484c69771330d9086d88d9a1b0d11d61ea8d97a2975c28e98a01983957d3139095e0d27afe23") keyctl$read(0xb, r8, 0x0, 0x0) 20:27:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000222008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e09000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101080, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000500)={0xe7, ""/231}) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf34fcdc2165ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x7c, r4) keyctl$search(0xa, r3, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$assume_authority(0x10, r3) 20:27:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xf796}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) fdatasync(0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000100)=ANY=[@ANYBLOB="fcec3a0aa6756c53f237196b137189"]) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) r3 = getpid() ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) sched_setscheduler(r3, 0x5, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x800007, 0x5) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={'wlan1\x00', 0x8000, 0x2}) sendmmsg(r2, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r4) keyctl$read(0xb, r5, 0x0, 0x0) 20:27:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000322008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:38 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0a000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 304.790276] Unknown ioctl 21381 20:27:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xf796}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) fdatasync(0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000100)=ANY=[@ANYBLOB="fcec3a0aa6756c53f237196b137189"]) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) r3 = getpid() ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) sched_setscheduler(r3, 0x5, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x800007, 0x5) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={'wlan1\x00', 0x8000, 0x2}) sendmmsg(r2, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r4) keyctl$read(0xb, r5, 0x0, 0x0) 20:27:39 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0b000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x3ff, 0x4, 0x6, 0x2}}, 0x20) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x23f4a90029db4098, 0x0) signalfd(r4, &(0x7f0000000100)={[0x7fff]}, 0x8) keyctl$read(0xb, r3, 0x0, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 20:27:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000422008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:39 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0e000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000522008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000622008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:39 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e10000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008, 0x0, @perf_bp={0x0}, 0x40242}, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) move_pages(0x0, 0x6, &(0x7f0000000180)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000100)=[0x4], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xf796}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) fdatasync(0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000100)=ANY=[@ANYBLOB="fcec3a0aa6756c53f237196b137189"]) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) r3 = getpid() ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) sched_setscheduler(r3, 0x5, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x800007, 0x5) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={'wlan1\x00', 0x8000, 0x2}) sendmmsg(r2, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r4) keyctl$read(0xb, r5, 0x0, 0x0) 20:27:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000722008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:39 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e48000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008, 0x0, @perf_bp={0x0}, 0x40242}, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) move_pages(0x0, 0x6, &(0x7f0000000180)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000100)=[0x4], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc4eae67de6cc9717, 0x100000000000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'xfrm0\x00', 0x4}, 0x18) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e4c000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000922008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e60000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x3ff, 0x4, 0x6, 0x2}}, 0x20) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x23f4a90029db4098, 0x0) signalfd(r4, &(0x7f0000000100)={[0x7fff]}, 0x8) keyctl$read(0xb, r3, 0x0, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 20:27:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e68000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x40}, 0x40) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) ioctl$vim2m_VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000500)={0xc6, 0x1, 0x4, 0x8, 0x8, {r5, r6/1000+60000}, {0x4, 0xc, 0x4, 0x3f, 0x0, 0x80, "e2a6aa12"}, 0x400, 0x1, @userptr=0x3, 0x20, 0x0, r2}) splice(r4, &(0x7f00000003c0), r7, &(0x7f0000000440)=0x101, 0x100, 0x8) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0101ff9a", @ANYRES32=0x0], &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000300)={r9, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000000)={r9, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1, 0x7fffffff, 0x8, 0x5}, &(0x7f0000000100)=0x98) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0xfe81) 20:27:40 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x30180) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x4050) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x28, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r6, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x200, 0x63}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x8840}, 0x40891) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f00000001c0)={0x800, 0x5, 0x1200000, 0x8}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x3) r8 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r10, r9, &(0x7f00000000c0)=0x800007, 0x5) ioctl$PIO_UNISCRNMAP(r9, 0x4b6a, &(0x7f0000000200)="efc63930e13a950f333d484c69771330d9086d88d9a1b0d11d61ea8d97a2975c28e98a01983957d3139095e0d27afe23") keyctl$read(0xb, r8, 0x0, 0x0) 20:27:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r3 = accept(r2, 0x0, &(0x7f00000006c0)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x8], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000300)={0x2d9b, 0x75c, 0x18200, 0x7, 0xfffffffc, 0x800, 0x8001, 0x6, 0x0}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r5, &(0x7f0000000400)=0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x34, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x504, 0x55}}}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r3, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x40, r9, 0x600, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x4, 0x7e}}}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x37}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xa}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x254}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40040}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1000}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffffffff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000044}, 0x40004) r10 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vsock\x00', 0x2600, 0x0) ioctl$VIDIOC_EXPBUF(r4, 0xc0405610, &(0x7f0000000500)={0x7, 0x101, 0x80000000, 0x800, 0xffffffffffffffff}) ioctl$VIDIOC_EXPBUF(r10, 0xc0405610, &(0x7f0000000540)={0xa, 0x2, 0x3, 0x4000, r11}) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:40 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e6c000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000b22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 306.501945] Unknown ioctl -1069525488 20:27:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xe4be}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:40 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e74000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000e22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:40 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:40 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e7a000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00001022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x200000000000000) 20:27:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcda62f1cda741201a6887dd477f4d16425045c2fe6f48484373eca5dd7c3848b674596b256b4513c14e97c7537c143e713c85d936d36d9d55822be1f8d9f42de715b9d530639a5fa8451a8e8f3a1dc7c8399cb030000000a3c6cbcf018d4a46e50c4669b8e4822938cd30bdfd71135f3e7719ea174f8ef22ba3f32cd4cdc1ecf58a7c3f0b6f3c0863e295a44a8706b5f975fa90db3099abb288b6a691722ac7e1313fa3bde8af990bca4c956754e0a68", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:41 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2ef0000022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:41 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="bfc63401000000000000003500", 0xd}, {&(0x7f0000000140)="58a5138a5d98c857fff66ccb36b4cf877f0db832cf96055ce4dc38c33cf72e40e263397ddfe2b831fd90e8ec3d3129c31814cb", 0x33}], 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r4, &(0x7f00000017c0), 0x1ab, 0x0, 0x0) read$fb(0xffffffffffffffff, 0x0, 0x0) dup2(r2, r3) bind$inet(r2, &(0x7f0000000500)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000380)={&(0x7f0000000040), 0x10, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRESOCT], 0x80}, 0x1, 0x0, 0x0, 0x801}, 0x40801) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)=ANY=[@ANYBLOB="00ca00e44135b26ac8014a00", @ANYRES16=0x0, @ANYBLOB="00042cbd7000000000000b0000000800390000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008000) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x7, 0xffffffffffffff23, 0x5, 0x6]}) fchdir(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000240)={r5, 0x0, 0x30, 0x80, 0x7}, &(0x7f0000000280)=0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @mss={0x2, 0x7ff}, @window={0x3, 0xfff7, 0x1}, @timestamp], 0x4) 20:27:41 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e3c020022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x8, 0x4) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$SNDCTL_SEQ_RESET(0xffffffffffffffff, 0x5100) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200000, 0x0) 20:27:41 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00030022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000500)="88b234d56cc7f7e4ae8b1f5bd84ec305466133ba9d7c52f47f7930c2de94f369d0831c818ea86acd00e139e46a05d4196a5ae61adcea4245333e0d165319ddb413bc7c299adad24c5176ddfe43990744e9951deee3f18323f930a07fd3e8cd7d952798c498bb76561efd8ef8ffc1e389522fa62aac6d873c519ecfbb4f6965a04361464d812b77410374acf1db39746d5f2205c2400501c0c9becade55ccf547cd4314b95ca3cb53ffa94c92649474ba9b52a972bbada720e06df484ca73169fddcbe1ebe99d0dfaa6ef7fb76c097350f39ded0ebb290b811e41b88c8d24bd76462a533e54d7a1531d69ab9778b9b856639bfd6e", 0xf4, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000240)="189c6ac91439406aa6eb78c4f843db3dc47f1e389723980dc203d9d91d2298ace683779a62db8b1ce9d71b004dd68f149f45f12071ae465dcae84471814c44997c0a3b7c4b17bdace845f0ba382ddab5e7ee687c825f7f74b5911430fd8ed879a9c75f4960fce27c15dad047da155c980ff0", 0x72, r3) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x1042818) read$snddsp(0xffffffffffffffff, &(0x7f0000000a40)=""/4096, 0x1000) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200000, 0x0) 20:27:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00050022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000500)="88b234d56cc7f7e4ae8b1f5bd84ec305466133ba9d7c52f47f7930c2de94f369d0831c818ea86acd00e139e46a05d4196a5ae61adcea4245333e0d165319ddb413bc7c299adad24c5176ddfe43990744e9951deee3f18323f930a07fd3e8cd7d952798c498bb76561efd8ef8ffc1e389522fa62aac6d873c519ecfbb4f6965a04361464d812b77410374acf1db39746d5f2205c2400501c0c9becade55ccf547cd4314b95ca3cb53ffa94c92649474ba9b52a972bbada720e06df484ca73169fddcbe1ebe99d0dfaa6ef7fb76c097350f39ded0ebb290b811e41b88c8d24bd76462a533e54d7a1531d69ab9778b9b856639bfd6e", 0xf4, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000240)="189c6ac91439406aa6eb78c4f843db3dc47f1e389723980dc203d9d91d2298ace683779a62db8b1ce9d71b004dd68f149f45f12071ae465dcae84471814c44997c0a3b7c4b17bdace845f0ba382ddab5e7ee687c825f7f74b5911430fd8ed879a9c75f4960fce27c15dad047da155c980ff0", 0x72, r3) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x1042818) read$snddsp(0xffffffffffffffff, &(0x7f0000000a40)=""/4096, 0x1000) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200000, 0x0) 20:27:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r3 = signalfd4(r0, &(0x7f0000000000)={[0x3ff]}, 0x8, 0x80000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000100)={0x0, 0x9, 0x4, 0x400, 0xff, {0x77359400}, {0x4, 0xa, 0x4, 0x1f, 0x19, 0x6, "00ff0700"}, 0x2957, 0x2, @planes=&(0x7f0000000040)={0x1ff7fffc, 0x8, @userptr=0x1, 0x9}, 0x4, 0x0, r4}) keyctl$read(0xb, r2, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r7, r6, &(0x7f00000000c0)=0x800007, 0x5) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000080)=r6) 20:27:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00060022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00070022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007422008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000500)="88b234d56cc7f7e4ae8b1f5bd84ec305466133ba9d7c52f47f7930c2de94f369d0831c818ea86acd00e139e46a05d4196a5ae61adcea4245333e0d165319ddb413bc7c299adad24c5176ddfe43990744e9951deee3f18323f930a07fd3e8cd7d952798c498bb76561efd8ef8ffc1e389522fa62aac6d873c519ecfbb4f6965a04361464d812b77410374acf1db39746d5f2205c2400501c0c9becade55ccf547cd4314b95ca3cb53ffa94c92649474ba9b52a972bbada720e06df484ca73169fddcbe1ebe99d0dfaa6ef7fb76c097350f39ded0ebb290b811e41b88c8d24bd76462a533e54d7a1531d69ab9778b9b856639bfd6e", 0xf4, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000240)="189c6ac91439406aa6eb78c4f843db3dc47f1e389723980dc203d9d91d2298ace683779a62db8b1ce9d71b004dd68f149f45f12071ae465dcae84471814c44997c0a3b7c4b17bdace845f0ba382ddab5e7ee687c825f7f74b5911430fd8ed879a9c75f4960fce27c15dad047da155c980ff0", 0x72, r3) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x1042818) read$snddsp(0xffffffffffffffff, &(0x7f0000000a40)=""/4096, 0x1000) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00090022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcda62f1cda741201a6887dd477f4d16425045c2fe6f48484373eca5dd7c3848b674596b256b4513c14e97c7537c143e713c85d936d36d9d55822be1f8d9f42de715b9d530639a5fa8451a8e8f3a1dc7c8399cb030000000a3c6cbcf018d4a46e50c4669b8e4822938cd30bdfd71135f3e7719ea174f8ef22ba3f32cd4cdc1ecf58a7c3f0b6f3c0863e295a44a8706b5f975fa90db3099abb288b6a691722ac7e1313fa3bde8af990bca4c956754e0a68", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) keyctl$read(0xb, r3, 0x0, 0x0) keyctl$setperm(0x5, r3, 0x8) 20:27:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000500)="88b234d56cc7f7e4ae8b1f5bd84ec305466133ba9d7c52f47f7930c2de94f369d0831c818ea86acd00e139e46a05d4196a5ae61adcea4245333e0d165319ddb413bc7c299adad24c5176ddfe43990744e9951deee3f18323f930a07fd3e8cd7d952798c498bb76561efd8ef8ffc1e389522fa62aac6d873c519ecfbb4f6965a04361464d812b77410374acf1db39746d5f2205c2400501c0c9becade55ccf547cd4314b95ca3cb53ffa94c92649474ba9b52a972bbada720e06df484ca73169fddcbe1ebe99d0dfaa6ef7fb76c097350f39ded0ebb290b811e41b88c8d24bd76462a533e54d7a1531d69ab9778b9b856639bfd6e", 0xf4, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000240)="189c6ac91439406aa6eb78c4f843db3dc47f1e389723980dc203d9d91d2298ace683779a62db8b1ce9d71b004dd68f149f45f12071ae465dcae84471814c44997c0a3b7c4b17bdace845f0ba382ddab5e7ee687c825f7f74b5911430fd8ed879a9c75f4960fce27c15dad047da155c980ff0", 0x72, r3) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x1042818) read$snddsp(0xffffffffffffffff, &(0x7f0000000a40)=""/4096, 0x1000) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000b0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400041c1, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x9f54}, 0x52004, 0x0, 0x0, 0x0, 0x6, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) sendmsg$SMC_PNETID_DEL(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x70, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0xa005}, 0x4000040) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r7, 0x0, 0xa9, 0x2d, &(0x7f0000000300)="1b9582ba7eb06d5875d155ee72565a83af9f6be26697bd1bf314f938abc3847173b08b996a9242c27d4dc9bb8f90230ac8f49943f5f3b223ac40da175231c3e49ff3936718afd720bddbce3b6fe2417b4e3757ecd27fcb89494bcdcd83150ed997e0f2653953cc50806630969d4e666f244f75f38071493f75bd97f9c039dbbcfbe414cab6db06a884a90359dfb8d6cd2cfb755bcd334591ff244fe2410ac6cfee4f01c9042b3043ff", &(0x7f00000003c0)=""/45, 0xeb9a, 0x0, 0x1000, 0xd4, &(0x7f0000000a40)="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", &(0x7f0000000500)="cb6f4c3046a9a7b512da2b80cd911c522140d19d2f0ec418e6a13a408c5a7e5e1c144cf003725e12a39e6b2ac53a0ccebfc540f802745c9701f83f0f0599b65f61dc71250a2a82a00ea787c551c616fc8bc18d36af6a6f60955bcc5885b24dee2b65e4a642733046907277f3a1c3dcbc1ba7283cb5a1c4dbc968593514905988a1627bd5225bb353883d57c73b6506d30b5936d8414e7197247a78cd57e47547d9c239ccaa6717eb21927d78a19a305d30a808a442e85ddf3b3229a91a383f577c258f25b925544a7cefc5d2ff56472edf6a975f"}, 0x40) sendfile(r6, r5, &(0x7f00000000c0)=0x800007, 0x5) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r5, 0x800448d2, &(0x7f00000001c0)={0x1, &(0x7f0000000100)=[{@fixed}]}) ioctl$SIOCX25SFACILITIES(r5, 0x89e3, &(0x7f0000000000)={0x47, 0x7, 0xb, 0x5, 0x0, 0x81}) keyctl$read(0xb, r4, 0x0, 0x0) 20:27:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r3 = signalfd4(r0, &(0x7f0000000000)={[0x3ff]}, 0x8, 0x80000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000100)={0x0, 0x9, 0x4, 0x400, 0xff, {0x77359400}, {0x4, 0xa, 0x4, 0x1f, 0x19, 0x6, "00ff0700"}, 0x2957, 0x2, @planes=&(0x7f0000000040)={0x1ff7fffc, 0x8, @userptr=0x1, 0x9}, 0x4, 0x0, r4}) keyctl$read(0xb, r2, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r7, r6, &(0x7f00000000c0)=0x800007, 0x5) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000080)=r6) 20:27:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000e0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000055008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcda62f1cda741201a6887dd477f4d16425045c2fe6f48484373eca5dd7c3848b674596b256b4513c14e97c7537c143e713c85d936d36d9d55822be1f8d9f42de715b9d530639a5fa8451a8e8f3a1dc7c8399cb030000000a3c6cbcf018d4a46e50c4669b8e4822938cd30bdfd71135f3e7719ea174f8ef22ba3f32cd4cdc1ecf58a7c3f0b6f3c0863e295a44a8706b5f975fa90db3099abb288b6a691722ac7e1313fa3bde8af990bca4c956754e0a68", 0x119}], 0x1, 0x5) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x8, 0x400) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000240)=0x7fffffff) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r2, &(0x7f00000000c0)=0x800007, 0x5) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)={0x18, r6, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3108000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0xfc, r6, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_BEARER={0xdc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @private1, 0x3f}}}}, @TIPC_NLA_BEARER_NAME={0x11, 0x1, @l2={'eth', 0x3a, 'macvtap0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1edc6145}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x38e200}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x80000}, 0x4000000) 20:27:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r3 = signalfd4(r0, &(0x7f0000000000)={[0x3ff]}, 0x8, 0x80000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r5, r4, &(0x7f00000000c0)=0x800007, 0x5) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000100)={0x0, 0x9, 0x4, 0x400, 0xff, {0x77359400}, {0x4, 0xa, 0x4, 0x1f, 0x19, 0x6, "00ff0700"}, 0x2957, 0x2, @planes=&(0x7f0000000040)={0x1ff7fffc, 0x8, @userptr=0x1, 0x9}, 0x4, 0x0, r4}) keyctl$read(0xb, r2, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r7, r6, &(0x7f00000000c0)=0x800007, 0x5) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000080)=r6) 20:27:43 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e001f0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000058008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:43 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000040)=ANY=[]) removexattr(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() setpgid(r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getegid() socket$netlink(0x10, 0x3, 0x0) setregid(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setregid(0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) 20:27:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000500)="88b234d56cc7f7e4ae8b1f5bd84ec305466133ba9d7c52f47f7930c2de94f369d0831c818ea86acd00e139e46a05d4196a5ae61adcea4245333e0d165319ddb413bc7c299adad24c5176ddfe43990744e9951deee3f18323f930a07fd3e8cd7d952798c498bb76561efd8ef8ffc1e389522fa62aac6d873c519ecfbb4f6965a04361464d812b77410374acf1db39746d5f2205c2400501c0c9becade55ccf547cd4314b95ca3cb53ffa94c92649474ba9b52a972bbada720e06df484ca73169fddcbe1ebe99d0dfaa6ef7fb76c097350f39ded0ebb290b811e41b88c8d24bd76462a533e54d7a1531d69ab9778b9b856639bfd6e", 0xf4, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000240)="189c6ac91439406aa6eb78c4f843db3dc47f1e389723980dc203d9d91d2298ace683779a62db8b1ce9d71b004dd68f149f45f12071ae465dcae84471814c44997c0a3b7c4b17bdace845f0ba382ddab5e7ee687c825f7f74b5911430fd8ed879a9c75f4960fce27c15dad047da155c980ff0", 0x72, r3) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x1042818) read$snddsp(0xffffffffffffffff, &(0x7f0000000a40)=""/4096, 0x1000) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:43 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:43 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00200022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000069008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 309.226229] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 20:27:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000781008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000500)="88b234d56cc7f7e4ae8b1f5bd84ec305466133ba9d7c52f47f7930c2de94f369d0831c818ea86acd00e139e46a05d4196a5ae61adcea4245333e0d165319ddb413bc7c299adad24c5176ddfe43990744e9951deee3f18323f930a07fd3e8cd7d952798c498bb76561efd8ef8ffc1e389522fa62aac6d873c519ecfbb4f6965a04361464d812b77410374acf1db39746d5f2205c2400501c0c9becade55ccf547cd4314b95ca3cb53ffa94c92649474ba9b52a972bbada720e06df484ca73169fddcbe1ebe99d0dfaa6ef7fb76c097350f39ded0ebb290b811e41b88c8d24bd76462a533e54d7a1531d69ab9778b9b856639bfd6e", 0xf4, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000240)="189c6ac91439406aa6eb78c4f843db3dc47f1e389723980dc203d9d91d2298ace683779a62db8b1ce9d71b004dd68f149f45f12071ae465dcae84471814c44997c0a3b7c4b17bdace845f0ba382ddab5e7ee687c825f7f74b5911430fd8ed879a9c75f4960fce27c15dad047da155c980ff0", 0x72, r3) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) keyctl$search(0xa, r2, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x1042818) read$snddsp(0xffffffffffffffff, &(0x7f0000000a40)=""/4096, 0x1000) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:43 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e023c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 309.344910] EXT4-fs (loop0): re-mounted. Opts: [ 309.414965] EXT4-fs (loop0): re-mounted. Opts: 20:27:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000798008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x2000000) 20:27:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r2, 0x8010500d, &(0x7f0000000100)) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:27:43 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e003f0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000000f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000040)=ANY=[]) removexattr(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() setpgid(r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getegid() socket$netlink(0x10, 0x3, 0x0) setregid(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setregid(0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) [ 309.692399] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 309.743361] EXT4-fs (loop3): re-mounted. Opts: 20:27:44 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:44 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00480022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:44 executing program 0: ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000000)={0x5, 0x100, "6acfac92d16ca36885dece6c6037e55120f09c3744da88d0", {0x1, 0x20655e}, 0x9}) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000100)=[{0x21, 0x0, [0x5, 0x7, 0xfffff53a, 0xfffffffb, 0x8, 0x3, 0x0, 0x636, 0x8000, 0x10001, 0x8001, 0x8, 0x1000, 0x3, 0x8, 0x200]}, {0x11, 0x0, [0x3f, 0x7, 0x9, 0x72, 0x74280000, 0xa1c2, 0x9, 0xa9, 0x7f, 0x0, 0xfffffffa, 0x7fff, 0x8, 0x0, 0x3, 0x1]}, {0x20, 0x0, [0x5, 0x7, 0x1bfc, 0x2, 0xb8, 0xa1f4, 0xbdc, 0x7, 0x8001, 0x26bb, 0x4, 0x3, 0x1, 0x8, 0xff, 0x6000]}, {0x22, 0x0, [0xfff, 0xfffffff8, 0x9, 0x2, 0x7, 0x0, 0xba2, 0x0, 0x8, 0x1, 0x3f, 0x1, 0x0, 0x4, 0x1f, 0x7]}, {0x10, 0x0, [0x80000000, 0x1, 0x5, 0x7fffffff, 0x1, 0x41, 0xfffffffe, 0x843c, 0xfffffff7, 0x4, 0x3, 0x5, 0xff9, 0xffffffc1, 0x4, 0x3]}, {0x14, 0x0, [0x41, 0x4, 0x0, 0x8, 0x2, 0x40, 0x3, 0x2, 0x1, 0x3, 0x8, 0x1ff, 0x5, 0x8000, 0x3]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000500)={0x1, 0x0, {0xffff0000, 0x62d, 0x0, 0x427}}) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) flistxattr(r4, &(0x7f0000000340)=""/175, 0xaf) perf_event_open$cgroup(&(0x7f0000000400)={0x4, 0x70, 0x7, 0x9, 0x18, 0x81, 0x0, 0x80, 0x51000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x2, @perf_config_ext={0x3ff, 0x4}, 0x800, 0x2, 0x2, 0xf94db5842f623571, 0x0, 0x5, 0x80}, r3, 0xa, r3, 0x4) 20:27:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000055008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:44 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000040)=ANY=[]) removexattr(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() setpgid(r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getegid() socket$netlink(0x10, 0x3, 0x0) setregid(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setregid(0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) 20:27:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000058008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xa120, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) 20:27:44 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e004c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 310.147353] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 310.226038] EXT4-fs (loop3): re-mounted. Opts: 20:27:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x1000000) 20:27:44 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00600022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000069008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)=0x2) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x40, 0x2}) keyctl$read(0xb, r3, 0x0, 0x0) 20:27:45 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000081078151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00') add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) 20:27:45 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00680022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00') add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) 20:27:45 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e006c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0x53050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xa) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) sendto$unix(r1, &(0x7f0000000000)="042d53ccff89ee2c2ee8c1cbd36c55a85f08b649433b4eac17706d306282f19b199b23aa3d3d6bd81c635e46578b6dc09705d5bc5328c7ba986557ac43cc602fd89156053995894576baf68cac61e1809f33c77d796e575a6fd1a55a14b66843f08fed8908af23f4", 0x68, 0x800, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x80000, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x110, r3, 0x80000000) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r4, 0x0, 0x0) 20:27:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000098078151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:45 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00740022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022028151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:45 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000040)={0x8000, 0x4890, 0x800, 0x8, 0x8, 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:45 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e007a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022038151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) 20:27:46 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022048151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000041c1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000, 0x4}, 0x0, 0xd2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:46 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00f00022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00') add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) 20:27:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022058151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x18066, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$char_raw(0xffffffffffffffff, &(0x7f0000000c00)={"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"}, 0x1200) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:46 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x200000, 0x0) 20:27:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022068151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00') add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r2) 20:27:46 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000055008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x200000, 0x0) 20:27:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, 0xfffffffffffffff8) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)) keyctl$read(0xb, r0, 0x0, 0x0) 20:27:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022078151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000058008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x200000, 0x0) 20:27:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x15, r1, 0x0, 0x0) 20:27:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022088151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000069008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)={0x0, 0x0, "8957ecd89d19633a8dee1b7cddb65a152535c3e1cb116d21be1f0a0785dd7668b0bb0476b9ae0659737b8f1cb372b8bc4540da65bbcddeb2db1c6c2c5e3e851f611f6f23ab6874bef4d67e116527f63fed13c32f728732c7845e267fd9a22b339fe4bc00d8707251ff600ab06c1860ca56b6dcd31f66e7c93fb8a63f0eb38bcd95eb39c53cf5b44eccc01d3a0128226738f90fa4679b0ab9dd2de9398cbd82910d5ad559423c88b4e731c66ccca76e921895d31dd345627d58f53ae70d64e87287866cddadffbe323a39e1a5d2d006eebb567cb06e9f3d1e5a5ebc6a1632d85fdcb25c01e98f7661f491f4f324f2a0"}, 0xf7, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) keyctl$search(0xa, r3, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f0000000080)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', 'keyring\x00'}, 0x20, r3) 20:27:46 executing program 5: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x200000, 0x0) 20:27:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022098151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000780008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:46 executing program 5: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x200000, 0x0) 20:27:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) keyctl$revoke(0x3, r1) 20:27:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000000220a8151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)={0x0, 0x0, "8957ecd89d19633a8dee1b7cddb65a152535c3e1cb116d21be1f0a0785dd7668b0bb0476b9ae0659737b8f1cb372b8bc4540da65bbcddeb2db1c6c2c5e3e851f611f6f23ab6874bef4d67e116527f63fed13c32f728732c7845e267fd9a22b339fe4bc00d8707251ff600ab06c1860ca56b6dcd31f66e7c93fb8a63f0eb38bcd95eb39c53cf5b44eccc01d3a0128226738f90fa4679b0ab9dd2de9398cbd82910d5ad559423c88b4e731c66ccca76e921895d31dd345627d58f53ae70d64e87287866cddadffbe323a39e1a5d2d006eebb567cb06e9f3d1e5a5ebc6a1632d85fdcb25c01e98f7661f491f4f324f2a0"}, 0xf7, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) keyctl$search(0xa, r3, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f0000000080)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', 'keyring\x00'}, 0x20, r3) 20:27:47 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000797008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 5: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x200000, 0x0) 20:27:47 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:47 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00020022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xf, r1, 0x0, 0x0) 20:27:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000000220b8151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f00000002c0)="d7260fb48ad757537b40b57b66b1965f32551e321a186823732c1f3a92a855e751b19c9958cc757ae658fd137f7bc34b2af77c4573e265f6b92b4600f796219e2aa79a4b5f", 0x45, 0xfffffffffffffffb) keyctl$chown(0x4, r1, 0xffffffffffffffff, 0xee01) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x20, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) ftruncate(r0, 0x8) r3 = dup3(r2, r0, 0x80000) ioctl$USBDEVFS_SETINTERFACE(r3, 0x80085504, &(0x7f0000000180)={0x81}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r4) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r7, r6, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x19, &(0x7f0000000080)={0x0, 0xf897}, 0x8) keyctl$read(0xb, r5, 0x0, 0x0) 20:27:47 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00030022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000000220e8151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) keyctl$revoke(0x3, r1) 20:27:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) modify_ldt$read_default(0x2, &(0x7f0000000a40)=""/4096, 0x1000) 20:27:47 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00040022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022108151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="d4b7dc8bdefbd48e946a5e37af73f32384e0f305f16e44ac02d584756ac9b9a4bf29e3b9f4a49fc92b691489a656ae5c4d971d4ebac2545853ad709bc0c6cf4a259028fefd950763ec8e4905606cda81e04bc726962412e33f12b719592d002baeb5cddc889c8a78a86c57b6bc9c5b0c52e6ed8d8afd7122d9c0b60a69ad53c85ec9dd444d4b72c03a391f313ef51f13b000640627426d41e736b16c453c832c9d8a11f04a3f794473c0c58f1c5c3cbb3c225c075a180121a8d2f480862ee0431636b005", 0xc4, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:48 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xa, r1, 0x0, 0x0) 20:27:48 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00050022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022488151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x32, @loopback, 0x4e20, 0x0, 'none\x00', 0x28, 0x0, 0x49}, 0x2c) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = signalfd(r2, &(0x7f00000002c0)={[0x1]}, 0x8) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000003c0), 0x0) r6 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r7 = dup2(0xffffffffffffffff, r2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x2d, 0xffffff7f, 0x9, 0x9}, &(0x7f0000000080)=0x14) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x280200, 0x0) ioctl$vim2m_VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000200)={0xfffff068, 0x1, 0x4, 0xe001, 0x101, {r9, r10/1000+60000}, {0x4, 0x2, 0x1, 0x0, 0x3, 0xff, "97911331"}, 0x4, 0x3, @offset=0x6, 0xdf99, 0x0, r11}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x1, 0x9, 0x4, 0x6, 0xe8d, 0x5e00000, 0x7, 0x20, r8}, &(0x7f0000000140)=0x20) keyctl$read(0xb, r6, 0x0, 0x0) 20:27:48 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00060022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000000224c8151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:48 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x7, 0x4, 0x8, 0x0, 0x2, 0x6, 0x1, 0x2d, 0x40, 0xf0, 0x4, 0x5, 0x38, 0x1, 0x2276, 0x6, 0x3}, [{0x4, 0x1, 0x5, 0x40, 0xffffffffffffffff, 0x6, 0x5}, {0x2, 0x96f, 0xffffffffffffcb9d, 0x8001, 0x1, 0x40, 0x3, 0x20}], "fedf1940499adee7e4a485ad2fa0580873db50a352ac661e8b18796a7360a78233fa1f82ce2785382cb0ae992a2b631f7d2d27be2025dd1dad1432078189b3272e3e2258fed9c85ad78f1e1bc748df570981d4f24d39931c466bef770f4377095db5f6a78cc963c470f9f9fc97f04bb57e7e35f6a75a12d7fb12bf9d55c395d347362a53004f3e2edf", [[], [], []]}, 0x439) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00eth\x00'/20], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002d006d54007a08b267ae3604b5000000", @ANYRES32=r4], 0x24}}, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r4}, 0x10) 20:27:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x110}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3, 0x800c0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:48 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00070022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022608151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 314.497359] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x32, @loopback, 0x4e20, 0x0, 'none\x00', 0x28, 0x0, 0x49}, 0x2c) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = signalfd(r2, &(0x7f00000002c0)={[0x1]}, 0x8) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000003c0), 0x0) r6 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) r7 = dup2(0xffffffffffffffff, r2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x2d, 0xffffff7f, 0x9, 0x9}, &(0x7f0000000080)=0x14) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x280200, 0x0) ioctl$vim2m_VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000200)={0xfffff068, 0x1, 0x4, 0xe001, 0x101, {r9, r10/1000+60000}, {0x4, 0x2, 0x1, 0x0, 0x3, 0xff, "97911331"}, 0x4, 0x3, @offset=0x6, 0xdf99, 0x0, r11}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x1, 0x9, 0x4, 0x6, 0xe8d, 0x5e00000, 0x7, 0x20, r8}, &(0x7f0000000140)=0x20) keyctl$read(0xb, r6, 0x0, 0x0) 20:27:49 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0x119}], 0x1, 0x5) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000, 0x0) 20:27:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r1) keyctl$read(0xb, r2, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0x7, 0x7}) ioctl$FIONCLEX(r3, 0x5450) 20:27:49 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00080022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022688151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0x6, r1, 0x0, 0x0) 20:27:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7", 0x4d, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xff, 0x100) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x2, 0x3, 0x4, 0x2, 0x2, {}, {0x5, 0x3, 0xe4, 0xee, 0x0, 0x4, "54069ecc"}, 0x1ff, 0x4, @fd=r2, 0x200, 0x0, r4}) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x1, 0x0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:49 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00090022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000000226c8151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022748151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:49 executing program 3 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000240)=0x1) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="46acacfd24f5c8a030c6e418880b84b82422b319411623e0be65362a90f0ce36253602f754218bc1b5c229740bf7ee36575b978647bd572477604c3ed9be4209561940ec4e77d17df278a4a490243b778cedd036302e451e64d39bda2433e0f6737075432e409c24ce92d77503dc7ea2e32d0e3b159191ca0adf8ada7394bf878e2cfb21407d2b60c8907ea4693c15be8f41dbde528815d3641bea351be897bbd945677941c18cd864fbff255d72167b5906439c0fdca921e7eb258c6c381f02b1691bd225a4fd729640a3549d39ee85295794e36231cafeae395d71da58a5", 0xdf, r1) keyctl$read(0xb, r2, 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) [ 315.447117] FAULT_INJECTION: forcing a failure. [ 315.447117] name failslab, interval 1, probability 0, space 0, times 0 [ 315.485371] CPU: 0 PID: 18141 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 [ 315.493328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.502780] Call Trace: [ 315.505386] dump_stack+0x1fc/0x2fe [ 315.509032] should_fail.cold+0xa/0x14 [ 315.512931] ? setup_fault_attr+0x200/0x200 [ 315.517385] __should_failslab+0x115/0x180 [ 315.521814] should_failslab+0x5/0xf [ 315.525556] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 315.530699] __kmalloc_node+0x38/0x70 [ 315.534520] kvmalloc_node+0x61/0xf0 [ 315.538265] keyctl_read_key+0x245/0x4a0 [ 315.542348] __se_sys_keyctl+0x235/0x3f0 [ 315.546427] do_syscall_64+0xf9/0x620 [ 315.550249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.555456] RIP: 0033:0x45de59 [ 315.558659] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.577778] RSP: 002b:00007faefd052c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 315.585510] RAX: ffffffffffffffda RBX: 0000000000020540 RCX: 000000000045de59 [ 315.592798] RDX: 0000000020001480 RSI: 000000002efae8dc RDI: 000000000000000b [ 315.600095] RBP: 00007faefd052ca0 R08: 0000000000000000 R09: 0000000000000000 [ 315.607467] R10: 0000000000001008 R11: 0000000000000246 R12: 0000000000000000 [ 315.614753] R13: 00007ffe275e2d9f R14: 00007faefd0539c0 R15: 000000000118bf2c 20:27:50 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, 0x0, 0x0, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:50 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000000227a8151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:50 executing program 0: umount2(&(0x7f0000000000)='./file0\x00', 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb06}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000040)) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x98ee77afb3e2cd9c) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:50 executing program 3 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x62}}}, 0x84) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:50 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000b0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008125e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 316.195812] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' 20:27:50 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e000e0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 316.256928] CPU: 1 PID: 18172 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 316.264852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.274228] Call Trace: [ 316.276832] dump_stack+0x1fc/0x2fe [ 316.280483] sysfs_warn_dup.cold+0x1c/0x2d [ 316.284733] sysfs_do_create_link_sd+0x116/0x130 [ 316.289504] sysfs_create_link+0x5f/0xc0 [ 316.293591] device_add+0x7d1/0x16d0 [ 316.297320] ? device_check_offline+0x280/0x280 [ 316.302000] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 316.307312] wiphy_register+0x1664/0x2130 [ 316.311486] ? bm_init+0x612/0x950 [ 316.315039] ? wiphy_unregister+0xea0/0xea0 [ 316.319379] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 316.324404] ? __kmalloc+0x38e/0x3c0 [ 316.328125] ? ieee80211_cs_list_valid+0x199/0x280 [ 316.333069] ieee80211_register_hw+0x13a7/0x3410 [ 316.337928] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 316.342875] ? memset+0x20/0x40 [ 316.346166] ? __hrtimer_init+0xe9/0x1d0 [ 316.350235] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 316.355366] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 316.360416] ? hwsim_mcast_del_radio+0x230/0x230 [ 316.365179] ? __kmalloc_track_caller+0x389/0x3c0 [ 316.370032] ? hwsim_new_radio_nl+0x273/0x850 [ 316.374542] ? memcpy+0x35/0x50 [ 316.377836] hwsim_new_radio_nl+0x5c3/0x850 [ 316.382173] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 316.387387] ? nla_parse+0x1b2/0x290 [ 316.391123] genl_family_rcv_msg+0x642/0xc40 [ 316.395549] ? genl_rcv+0x40/0x40 [ 316.399006] ? genl_rcv_msg+0x12f/0x160 [ 316.402988] ? __mutex_add_waiter+0x160/0x160 [ 316.407514] ? __radix_tree_lookup+0x216/0x370 [ 316.412112] genl_rcv_msg+0xbf/0x160 [ 316.415837] netlink_rcv_skb+0x160/0x440 [ 316.419908] ? genl_family_rcv_msg+0xc40/0xc40 [ 316.424508] ? netlink_ack+0xae0/0xae0 [ 316.428437] ? genl_rcv+0x15/0x40 [ 316.431932] genl_rcv+0x24/0x40 [ 316.435221] netlink_unicast+0x4d5/0x690 [ 316.439298] ? netlink_sendskb+0x110/0x110 [ 316.444589] ? _copy_from_iter_full+0x229/0x7c0 [ 316.449278] ? __phys_addr_symbol+0x2c/0x70 [ 316.453617] ? __check_object_size+0x17b/0x3d1 [ 316.458216] netlink_sendmsg+0x6bb/0xc40 [ 316.462293] ? aa_af_perm+0x230/0x230 [ 316.466112] ? nlmsg_notify+0x1a0/0x1a0 [ 316.470190] ? kernel_recvmsg+0x220/0x220 [ 316.474359] ? nlmsg_notify+0x1a0/0x1a0 [ 316.478345] sock_sendmsg+0xc3/0x120 [ 316.482099] ___sys_sendmsg+0x7bb/0x8e0 [ 316.486112] ? __lock_acquire+0x6de/0x3ff0 [ 316.490387] ? copy_msghdr_from_user+0x440/0x440 [ 316.495155] ? __fget+0x32f/0x510 [ 316.498626] ? lock_downgrade+0x720/0x720 [ 316.502785] ? check_preemption_disabled+0x41/0x280 [ 316.507817] ? check_preemption_disabled+0x41/0x280 [ 316.512880] ? __fget+0x356/0x510 [ 316.516348] ? do_dup2+0x450/0x450 [ 316.519907] ? __fdget+0x1d0/0x230 [ 316.523491] __x64_sys_sendmsg+0x132/0x220 [ 316.527768] ? __sys_sendmsg+0x1b0/0x1b0 [ 316.531851] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.537231] ? trace_hardirqs_off_caller+0x6e/0x210 [ 316.542258] ? do_syscall_64+0x21/0x620 [ 316.546244] do_syscall_64+0xf9/0x620 [ 316.550063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.555269] RIP: 0033:0x45de59 [ 316.558502] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.577766] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 316.585487] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 316.592764] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 316.600043] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:27:50 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00100022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:50 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00480022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 316.607317] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 316.614596] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 316.680097] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 316.687769] CPU: 1 PID: 18202 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 316.695654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.705014] Call Trace: [ 316.707613] dump_stack+0x1fc/0x2fe [ 316.711254] sysfs_warn_dup.cold+0x1c/0x2d [ 316.715507] sysfs_do_create_link_sd+0x116/0x130 [ 316.720271] sysfs_create_link+0x5f/0xc0 [ 316.724342] device_add+0x7d1/0x16d0 [ 316.728074] ? device_check_offline+0x280/0x280 [ 316.732754] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 316.738052] wiphy_register+0x1664/0x2130 [ 316.742223] ? bm_init+0x612/0x950 [ 316.745790] ? wiphy_unregister+0xea0/0xea0 [ 316.750126] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 316.755153] ? __kmalloc+0x38e/0x3c0 [ 316.758873] ? ieee80211_cs_list_valid+0x199/0x280 [ 316.763838] ieee80211_register_hw+0x13a7/0x3410 [ 316.768658] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 316.773595] ? memset+0x20/0x40 [ 316.776887] ? __hrtimer_init+0xe9/0x1d0 [ 316.780965] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 316.786079] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 316.791117] ? hwsim_mcast_del_radio+0x230/0x230 [ 316.795921] ? __kmalloc_track_caller+0x389/0x3c0 [ 316.800774] ? hwsim_new_radio_nl+0x273/0x850 [ 316.805279] ? memcpy+0x35/0x50 [ 316.809442] hwsim_new_radio_nl+0x5c3/0x850 [ 316.813779] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 316.818993] ? nla_parse+0x1b2/0x290 [ 316.822724] genl_family_rcv_msg+0x642/0xc40 [ 316.827153] ? genl_rcv+0x40/0x40 20:27:50 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, 0x0, 0x0, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:51 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e004c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x1ff, 0x2, 0xcc000000, 0x0, 0x3}) keyctl$read(0xb, 0x0, 0x0, 0x0) dup(r1) eventfd(0x7ba1eeb2) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000100)=r2) [ 316.830614] ? genl_rcv_msg+0x12f/0x160 [ 316.834597] ? __mutex_add_waiter+0x160/0x160 [ 316.839108] ? __radix_tree_lookup+0x216/0x370 [ 316.843733] genl_rcv_msg+0xbf/0x160 [ 316.847455] netlink_rcv_skb+0x160/0x440 [ 316.851524] ? genl_family_rcv_msg+0xc40/0xc40 [ 316.856122] ? netlink_ack+0xae0/0xae0 [ 316.860028] ? genl_rcv+0x15/0x40 [ 316.863519] genl_rcv+0x24/0x40 [ 316.866851] netlink_unicast+0x4d5/0x690 [ 316.870924] ? netlink_sendskb+0x110/0x110 [ 316.875173] ? _copy_from_iter_full+0x229/0x7c0 20:27:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x2, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 316.879854] ? __phys_addr_symbol+0x2c/0x70 [ 316.884182] ? __check_object_size+0x17b/0x3d1 [ 316.888772] netlink_sendmsg+0x6bb/0xc40 [ 316.892844] ? aa_af_perm+0x230/0x230 [ 316.896655] ? nlmsg_notify+0x1a0/0x1a0 [ 316.900640] ? kernel_recvmsg+0x220/0x220 [ 316.904810] ? nlmsg_notify+0x1a0/0x1a0 [ 316.908793] sock_sendmsg+0xc3/0x120 [ 316.912529] ___sys_sendmsg+0x7bb/0x8e0 [ 316.916530] ? copy_msghdr_from_user+0x440/0x440 [ 316.921333] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 316.926446] ? __fget+0x32f/0x510 [ 316.929911] ? lock_downgrade+0x720/0x720 [ 316.934073] ? check_preemption_disabled+0x41/0x280 [ 316.939195] ? __fget+0x356/0x510 [ 316.942660] ? do_dup2+0x450/0x450 [ 316.946220] ? __fdget+0x1d0/0x230 [ 316.949812] __x64_sys_sendmsg+0x132/0x220 [ 316.954056] ? __sys_sendmsg+0x1b0/0x1b0 [ 316.958146] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.963525] ? trace_hardirqs_off_caller+0x6e/0x210 [ 316.968555] ? do_syscall_64+0x21/0x620 [ 316.972568] do_syscall_64+0xf9/0x620 [ 316.976382] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:27:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x3, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 316.981576] RIP: 0033:0x45de59 [ 316.984775] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.003697] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.011421] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 317.018724] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 317.026000] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 317.033273] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 317.040568] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:27:51 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00600022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x4, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008155e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:51 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00680022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'nat\x00', 0x0, 0x4, 0xb3, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000100)=""/179}, &(0x7f00000001c0)=0x78) keyctl$read(0xb, r1, 0x0, 0x0) 20:27:51 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e006c0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 317.310295] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 317.373908] CPU: 0 PID: 18238 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 317.381827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.391189] Call Trace: [ 317.394661] dump_stack+0x1fc/0x2fe [ 317.398304] sysfs_warn_dup.cold+0x1c/0x2d [ 317.402563] sysfs_do_create_link_sd+0x116/0x130 [ 317.407326] sysfs_create_link+0x5f/0xc0 [ 317.411484] device_add+0x7d1/0x16d0 [ 317.415221] ? device_check_offline+0x280/0x280 [ 317.419916] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 317.425243] wiphy_register+0x1664/0x2130 [ 317.429433] ? bm_init+0x612/0x950 [ 317.432989] ? wiphy_unregister+0xea0/0xea0 [ 317.440363] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 317.445381] ? __kmalloc+0x38e/0x3c0 [ 317.449096] ? ieee80211_cs_list_valid+0x199/0x280 [ 317.454039] ieee80211_register_hw+0x13a7/0x3410 [ 317.458815] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 317.463746] ? memset+0x20/0x40 [ 317.467189] ? __hrtimer_init+0xe9/0x1d0 [ 317.471435] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 317.476569] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 317.484135] ? hwsim_mcast_del_radio+0x230/0x230 [ 317.488901] ? __kmalloc_track_caller+0x389/0x3c0 [ 317.493750] ? hwsim_new_radio_nl+0x273/0x850 [ 317.500240] ? memcpy+0x35/0x50 [ 317.503521] hwsim_new_radio_nl+0x5c3/0x850 [ 317.507848] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 317.513063] ? nla_parse+0x1b2/0x290 [ 317.516789] genl_family_rcv_msg+0x642/0xc40 [ 317.521267] ? genl_rcv+0x40/0x40 [ 317.524729] ? genl_rcv_msg+0x12f/0x160 [ 317.528720] ? __mutex_add_waiter+0x160/0x160 [ 317.533415] ? __radix_tree_lookup+0x216/0x370 [ 317.538386] genl_rcv_msg+0xbf/0x160 [ 317.542210] netlink_rcv_skb+0x160/0x440 [ 317.546291] ? genl_family_rcv_msg+0xc40/0xc40 [ 317.550881] ? netlink_ack+0xae0/0xae0 [ 317.554773] ? genl_rcv+0x15/0x40 [ 317.558236] genl_rcv+0x24/0x40 [ 317.561516] netlink_unicast+0x4d5/0x690 [ 317.565584] ? netlink_sendskb+0x110/0x110 [ 317.569833] ? _copy_from_iter_full+0x229/0x7c0 [ 317.574506] ? __phys_addr_symbol+0x2c/0x70 [ 317.578853] ? __check_object_size+0x17b/0x3d1 [ 317.583444] netlink_sendmsg+0x6bb/0xc40 [ 317.587511] ? aa_af_perm+0x230/0x230 [ 317.591319] ? nlmsg_notify+0x1a0/0x1a0 [ 317.595293] ? kernel_recvmsg+0x220/0x220 [ 317.599459] ? nlmsg_notify+0x1a0/0x1a0 [ 317.603450] sock_sendmsg+0xc3/0x120 [ 317.607181] ___sys_sendmsg+0x7bb/0x8e0 [ 317.611243] ? __lock_acquire+0x6de/0x3ff0 [ 317.615480] ? copy_msghdr_from_user+0x440/0x440 [ 317.620241] ? __fget+0x32f/0x510 [ 317.623698] ? lock_downgrade+0x720/0x720 [ 317.627956] ? check_preemption_disabled+0x41/0x280 [ 317.634021] ? check_preemption_disabled+0x41/0x280 [ 317.639061] ? __fget+0x356/0x510 [ 317.642518] ? do_dup2+0x450/0x450 [ 317.646072] ? __fdget+0x1d0/0x230 [ 317.649626] __x64_sys_sendmsg+0x132/0x220 [ 317.653871] ? __sys_sendmsg+0x1b0/0x1b0 [ 317.657945] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 317.663322] ? trace_hardirqs_off_caller+0x6e/0x210 [ 317.668365] ? do_syscall_64+0x21/0x620 [ 317.672368] do_syscall_64+0xf9/0x620 [ 317.676175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.681378] RIP: 0033:0x45de59 [ 317.684576] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.704009] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.711728] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 317.719021] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 317.726296] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 317.733588] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 317.740884] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:52 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, 0x0, 0x0, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x5, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00740022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e007a0022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x6, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 318.172647] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 318.244555] CPU: 0 PID: 18262 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 318.252489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.261857] Call Trace: [ 318.264460] dump_stack+0x1fc/0x2fe [ 318.268120] sysfs_warn_dup.cold+0x1c/0x2d [ 318.272365] sysfs_do_create_link_sd+0x116/0x130 [ 318.277128] sysfs_create_link+0x5f/0xc0 [ 318.281201] device_add+0x7d1/0x16d0 [ 318.284929] ? device_check_offline+0x280/0x280 [ 318.289614] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 318.294908] wiphy_register+0x1664/0x2130 [ 318.299074] ? bm_init+0x612/0x950 [ 318.303610] ? wiphy_unregister+0xea0/0xea0 [ 318.307947] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 318.313039] ? __kmalloc+0x38e/0x3c0 [ 318.316788] ? ieee80211_cs_list_valid+0x199/0x280 [ 318.321736] ieee80211_register_hw+0x13a7/0x3410 [ 318.326516] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 318.331458] ? memset+0x20/0x40 [ 318.334743] ? __hrtimer_init+0xe9/0x1d0 [ 318.338821] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 318.343949] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 318.348989] ? hwsim_mcast_del_radio+0x230/0x230 [ 318.353754] ? __kmalloc_track_caller+0x389/0x3c0 [ 318.358606] ? hwsim_new_radio_nl+0x273/0x850 [ 318.363121] ? memcpy+0x35/0x50 [ 318.366412] hwsim_new_radio_nl+0x5c3/0x850 [ 318.370744] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 318.375984] ? nla_parse+0x1b2/0x290 [ 318.379715] genl_family_rcv_msg+0x642/0xc40 [ 318.384140] ? genl_rcv+0x40/0x40 [ 318.387600] ? genl_rcv_msg+0x12f/0x160 [ 318.391597] ? __mutex_add_waiter+0x160/0x160 [ 318.396115] ? __radix_tree_lookup+0x216/0x370 [ 318.400755] genl_rcv_msg+0xbf/0x160 [ 318.404479] netlink_rcv_skb+0x160/0x440 [ 318.408551] ? genl_family_rcv_msg+0xc40/0xc40 [ 318.413151] ? netlink_ack+0xae0/0xae0 [ 318.417051] ? genl_rcv+0x15/0x40 [ 318.420527] genl_rcv+0x24/0x40 [ 318.423820] netlink_unicast+0x4d5/0x690 [ 318.427897] ? netlink_sendskb+0x110/0x110 [ 318.432262] ? _copy_from_iter_full+0x229/0x7c0 [ 318.436946] ? __phys_addr_symbol+0x2c/0x70 20:27:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x7, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0xc021, 0x2}) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 318.441279] ? __check_object_size+0x17b/0x3d1 [ 318.445876] netlink_sendmsg+0x6bb/0xc40 [ 318.449952] ? aa_af_perm+0x230/0x230 [ 318.453762] ? nlmsg_notify+0x1a0/0x1a0 [ 318.457747] ? kernel_recvmsg+0x220/0x220 [ 318.461914] ? nlmsg_notify+0x1a0/0x1a0 [ 318.465918] sock_sendmsg+0xc3/0x120 [ 318.470601] ___sys_sendmsg+0x7bb/0x8e0 [ 318.474585] ? __lock_acquire+0x6de/0x3ff0 [ 318.478825] ? copy_msghdr_from_user+0x440/0x440 [ 318.483591] ? __fget+0x32f/0x510 [ 318.487057] ? lock_downgrade+0x720/0x720 [ 318.491215] ? check_preemption_disabled+0x41/0x280 [ 318.496252] ? check_preemption_disabled+0x41/0x280 [ 318.501336] ? __fget+0x356/0x510 [ 318.504805] ? do_dup2+0x450/0x450 [ 318.508449] ? __fdget+0x1d0/0x230 [ 318.512005] __x64_sys_sendmsg+0x132/0x220 [ 318.516247] ? __sys_sendmsg+0x1b0/0x1b0 [ 318.520339] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 318.525862] ? trace_hardirqs_off_caller+0x6e/0x210 [ 318.530892] ? do_syscall_64+0x21/0x620 [ 318.534888] do_syscall_64+0xf9/0x620 [ 318.538710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.543909] RIP: 0033:0x45de59 [ 318.547112] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.566025] RSP: 002b:00007f147409cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.573776] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 318.581056] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 318.588334] RBP: 000000000118c0b0 R08: 0000000000000000 R09: 0000000000000000 [ 318.595615] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c07c [ 318.602904] R13: 00007ffd1e5faf1f R14: 00007f147409d9c0 R15: 000000000118c07c 20:27:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008158e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x8, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000100)={0xffff, 0x3, 0x0, [{0x7, 0x0, 0x262, 0x4, 0x80, 0x5}, {0x1, 0x3, 0x87b, 0x1, 0x9, 0x1, 0x5}, {0x1, 0x100000001, 0x3, 0x3f, 0x8, 0x8}]}) r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x4, 0x80180) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r2, 0x40184152, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r3, 0x0, 0x0) 20:27:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00f00022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 318.786238] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 318.816283] CPU: 1 PID: 18299 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 318.824211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.833582] Call Trace: 20:27:53 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080), 0x0, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 318.836211] dump_stack+0x1fc/0x2fe [ 318.836234] sysfs_warn_dup.cold+0x1c/0x2d 20:27:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x9, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 318.836253] sysfs_do_create_link_sd+0x116/0x130 20:27:53 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e003c0222008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 318.836273] sysfs_create_link+0x5f/0xc0 [ 318.836290] device_add+0x7d1/0x16d0 [ 318.836310] ? device_check_offline+0x280/0x280 [ 318.836326] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 318.836350] wiphy_register+0x1664/0x2130 20:27:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00a80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:53 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000322008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 318.836372] ? bm_init+0x612/0x950 [ 318.836393] ? wiphy_unregister+0xea0/0xea0 [ 318.836424] ? rcu_read_lock_sched_held+0x16c/0x1d0 20:27:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xa, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 318.836441] ? __kmalloc+0x38e/0x3c0 [ 318.836454] ? ieee80211_cs_list_valid+0x199/0x280 [ 318.836480] ieee80211_register_hw+0x13a7/0x3410 [ 318.836499] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 318.836511] ? memset+0x20/0x40 [ 318.836521] ? __hrtimer_init+0xe9/0x1d0 [ 318.836534] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 318.836550] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 318.836578] ? hwsim_mcast_del_radio+0x230/0x230 [ 318.836590] ? __kmalloc_track_caller+0x389/0x3c0 [ 318.836601] ? hwsim_new_radio_nl+0x273/0x850 [ 318.836613] ? memcpy+0x35/0x50 [ 318.836629] hwsim_new_radio_nl+0x5c3/0x850 [ 318.836644] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 318.836669] ? nla_parse+0x1b2/0x290 [ 318.836689] genl_family_rcv_msg+0x642/0xc40 [ 318.836707] ? genl_rcv+0x40/0x40 [ 318.836718] ? genl_rcv_msg+0x12f/0x160 [ 318.836733] ? __mutex_add_waiter+0x160/0x160 [ 318.836759] ? __radix_tree_lookup+0x216/0x370 [ 318.836780] genl_rcv_msg+0xbf/0x160 [ 318.836796] netlink_rcv_skb+0x160/0x440 [ 318.836812] ? genl_family_rcv_msg+0xc40/0xc40 [ 318.836827] ? netlink_ack+0xae0/0xae0 [ 318.836845] ? genl_rcv+0x15/0x40 [ 318.836867] genl_rcv+0x24/0x40 [ 318.836881] netlink_unicast+0x4d5/0x690 [ 318.836899] ? netlink_sendskb+0x110/0x110 [ 318.836916] ? _copy_from_iter_full+0x229/0x7c0 [ 318.836930] ? __phys_addr_symbol+0x2c/0x70 [ 318.836945] ? __check_object_size+0x17b/0x3d1 [ 318.836963] netlink_sendmsg+0x6bb/0xc40 [ 318.836983] ? aa_af_perm+0x230/0x230 20:27:53 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000522008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 318.836996] ? nlmsg_notify+0x1a0/0x1a0 [ 318.837011] ? kernel_recvmsg+0x220/0x220 [ 318.837032] ? nlmsg_notify+0x1a0/0x1a0 [ 318.837046] sock_sendmsg+0xc3/0x120 [ 318.837059] ___sys_sendmsg+0x7bb/0x8e0 [ 318.837072] ? __lock_acquire+0x6de/0x3ff0 [ 318.837083] ? copy_msghdr_from_user+0x440/0x440 [ 318.837096] ? __fget+0x32f/0x510 [ 318.837109] ? lock_downgrade+0x720/0x720 [ 318.837121] ? check_preemption_disabled+0x41/0x280 [ 318.837134] ? check_preemption_disabled+0x41/0x280 [ 318.837149] ? __fget+0x356/0x510 [ 318.837163] ? do_dup2+0x450/0x450 [ 318.837180] ? __fdget+0x1d0/0x230 [ 318.837194] __x64_sys_sendmsg+0x132/0x220 [ 318.837204] ? __sys_sendmsg+0x1b0/0x1b0 [ 318.837227] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 318.837240] ? trace_hardirqs_off_caller+0x6e/0x210 [ 318.837254] ? do_syscall_64+0x21/0x620 [ 318.837268] do_syscall_64+0xf9/0x620 [ 318.837284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.837294] RIP: 0033:0x45de59 [ 318.837306] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.837313] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.837324] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 318.837330] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 318.837336] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 318.837343] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c 20:27:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xc, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 318.837350] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 319.022768] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 319.022789] CPU: 1 PID: 18317 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 319.022798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.022803] Call Trace: [ 319.022825] dump_stack+0x1fc/0x2fe [ 319.022849] sysfs_warn_dup.cold+0x1c/0x2d [ 319.022872] sysfs_do_create_link_sd+0x116/0x130 [ 319.022890] sysfs_create_link+0x5f/0xc0 [ 319.022907] device_add+0x7d1/0x16d0 [ 319.022926] ? device_check_offline+0x280/0x280 [ 319.022944] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 319.022969] wiphy_register+0x1664/0x2130 [ 319.022993] ? bm_init+0x612/0x950 [ 319.023018] ? wiphy_unregister+0xea0/0xea0 [ 319.023044] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 319.023059] ? __kmalloc+0x38e/0x3c0 [ 319.023074] ? ieee80211_cs_list_valid+0x199/0x280 [ 319.023097] ieee80211_register_hw+0x13a7/0x3410 [ 319.023125] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 319.023143] ? memset+0x20/0x40 [ 319.023167] ? __hrtimer_init+0xe9/0x1d0 [ 319.023185] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 319.023204] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 319.023234] ? hwsim_mcast_del_radio+0x230/0x230 [ 319.023248] ? __kmalloc_track_caller+0x389/0x3c0 [ 319.023261] ? hwsim_new_radio_nl+0x273/0x850 [ 319.023276] ? memcpy+0x35/0x50 [ 319.023298] hwsim_new_radio_nl+0x5c3/0x850 [ 319.023316] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 319.023340] ? nla_parse+0x1b2/0x290 [ 319.023363] genl_family_rcv_msg+0x642/0xc40 [ 319.023384] ? genl_rcv+0x40/0x40 [ 319.023396] ? genl_rcv_msg+0x12f/0x160 [ 319.023412] ? __mutex_add_waiter+0x160/0x160 [ 319.023437] ? __radix_tree_lookup+0x216/0x370 [ 319.023469] genl_rcv_msg+0xbf/0x160 [ 319.023488] netlink_rcv_skb+0x160/0x440 [ 319.023505] ? genl_family_rcv_msg+0xc40/0xc40 [ 319.023522] ? netlink_ack+0xae0/0xae0 [ 319.023541] ? genl_rcv+0x15/0x40 [ 319.023563] genl_rcv+0x24/0x40 [ 319.023577] netlink_unicast+0x4d5/0x690 [ 319.023595] ? netlink_sendskb+0x110/0x110 [ 319.023612] ? _copy_from_iter_full+0x229/0x7c0 [ 319.023625] ? __phys_addr_symbol+0x2c/0x70 [ 319.023642] ? __check_object_size+0x17b/0x3d1 [ 319.023662] netlink_sendmsg+0x6bb/0xc40 [ 319.023680] ? aa_af_perm+0x230/0x230 [ 319.023694] ? nlmsg_notify+0x1a0/0x1a0 [ 319.023708] ? kernel_recvmsg+0x220/0x220 [ 319.023731] ? nlmsg_notify+0x1a0/0x1a0 [ 319.023746] sock_sendmsg+0xc3/0x120 [ 319.023763] ___sys_sendmsg+0x7bb/0x8e0 [ 319.023778] ? __lock_acquire+0x6de/0x3ff0 [ 319.023794] ? copy_msghdr_from_user+0x440/0x440 [ 319.023810] ? __fget+0x32f/0x510 [ 319.023836] ? lock_downgrade+0x720/0x720 [ 319.023853] ? check_preemption_disabled+0x41/0x280 [ 319.023871] ? check_preemption_disabled+0x41/0x280 [ 319.023891] ? __fget+0x356/0x510 [ 319.023908] ? do_dup2+0x450/0x450 [ 319.023929] ? __fdget+0x1d0/0x230 [ 319.023949] __x64_sys_sendmsg+0x132/0x220 [ 319.023963] ? __sys_sendmsg+0x1b0/0x1b0 [ 319.023997] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 319.024016] ? trace_hardirqs_off_caller+0x6e/0x210 [ 319.024032] ? do_syscall_64+0x21/0x620 [ 319.024050] do_syscall_64+0xf9/0x620 [ 319.024071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.024082] RIP: 0033:0x45de59 [ 319.024097] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.024104] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 319.024119] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 20:27:53 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080), 0x0, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 319.024128] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 319.024137] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 319.024146] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 319.024156] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 [ 319.207707] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 319.874138] CPU: 0 PID: 18333 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 319.882032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.891390] Call Trace: [ 319.893993] dump_stack+0x1fc/0x2fe [ 319.897689] sysfs_warn_dup.cold+0x1c/0x2d [ 319.901944] sysfs_do_create_link_sd+0x116/0x130 [ 319.906726] sysfs_create_link+0x5f/0xc0 [ 319.910795] device_add+0x7d1/0x16d0 [ 319.914517] ? device_check_offline+0x280/0x280 [ 319.919278] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 319.924569] wiphy_register+0x1664/0x2130 [ 319.928750] ? bm_init+0x612/0x950 [ 319.932304] ? wiphy_unregister+0xea0/0xea0 [ 319.936645] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 319.941696] ? __kmalloc+0x38e/0x3c0 [ 319.945432] ? ieee80211_cs_list_valid+0x199/0x280 [ 319.950402] ieee80211_register_hw+0x13a7/0x3410 [ 319.955174] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 319.960113] ? memset+0x20/0x40 [ 319.963401] ? __hrtimer_init+0xe9/0x1d0 [ 319.967468] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 319.972584] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 319.977622] ? hwsim_mcast_del_radio+0x230/0x230 [ 319.982391] ? __kmalloc_track_caller+0x389/0x3c0 [ 319.987240] ? hwsim_new_radio_nl+0x273/0x850 [ 319.991766] ? memcpy+0x35/0x50 [ 319.995051] hwsim_new_radio_nl+0x5c3/0x850 [ 319.999393] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 320.004640] ? nla_parse+0x1b2/0x290 [ 320.008368] genl_family_rcv_msg+0x642/0xc40 [ 320.012789] ? genl_rcv+0x40/0x40 [ 320.016245] ? genl_rcv_msg+0x12f/0x160 [ 320.020230] ? __mutex_add_waiter+0x160/0x160 [ 320.024742] ? __radix_tree_lookup+0x216/0x370 [ 320.029342] genl_rcv_msg+0xbf/0x160 [ 320.033063] netlink_rcv_skb+0x160/0x440 [ 320.037130] ? genl_family_rcv_msg+0xc40/0xc40 [ 320.041716] ? netlink_ack+0xae0/0xae0 [ 320.045611] ? genl_rcv+0x15/0x40 [ 320.049070] genl_rcv+0x24/0x40 [ 320.052353] netlink_unicast+0x4d5/0x690 [ 320.056440] ? netlink_sendskb+0x110/0x110 [ 320.060684] ? _copy_from_iter_full+0x229/0x7c0 [ 320.065454] ? __phys_addr_symbol+0x2c/0x70 [ 320.069822] ? __check_object_size+0x17b/0x3d1 [ 320.074433] netlink_sendmsg+0x6bb/0xc40 [ 320.078501] ? aa_af_perm+0x230/0x230 [ 320.082303] ? nlmsg_notify+0x1a0/0x1a0 [ 320.086294] ? kernel_recvmsg+0x220/0x220 [ 320.090452] ? nlmsg_notify+0x1a0/0x1a0 [ 320.094451] sock_sendmsg+0xc3/0x120 [ 320.098170] ___sys_sendmsg+0x7bb/0x8e0 [ 320.102170] ? __lock_acquire+0x6de/0x3ff0 [ 320.106411] ? copy_msghdr_from_user+0x440/0x440 [ 320.111196] ? __fget+0x32f/0x510 [ 320.114653] ? lock_downgrade+0x720/0x720 [ 320.118856] ? check_preemption_disabled+0x41/0x280 [ 320.123912] ? check_preemption_disabled+0x41/0x280 [ 320.128936] ? __fget+0x356/0x510 [ 320.132406] ? do_dup2+0x450/0x450 [ 320.135956] ? __fdget+0x1d0/0x230 [ 320.139503] __x64_sys_sendmsg+0x132/0x220 [ 320.143766] ? __sys_sendmsg+0x1b0/0x1b0 [ 320.147845] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 320.153213] ? trace_hardirqs_off_caller+0x6e/0x210 [ 320.158235] ? do_syscall_64+0x21/0x620 [ 320.163623] do_syscall_64+0xf9/0x620 [ 320.167432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.172622] RIP: 0033:0x45de59 [ 320.175815] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.195086] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 320.202802] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 320.210095] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 320.217365] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 320.224650] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 320.231925] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 320.259367] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 320.285872] CPU: 1 PID: 18360 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 320.293791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.303155] Call Trace: [ 320.305758] dump_stack+0x1fc/0x2fe [ 320.309392] sysfs_warn_dup.cold+0x1c/0x2d [ 320.313635] sysfs_do_create_link_sd+0x116/0x130 [ 320.318494] sysfs_create_link+0x5f/0xc0 [ 320.322598] device_add+0x7d1/0x16d0 [ 320.326326] ? device_check_offline+0x280/0x280 [ 320.331000] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 320.336306] wiphy_register+0x1664/0x2130 [ 320.340472] ? bm_init+0x612/0x950 [ 320.344031] ? wiphy_unregister+0xea0/0xea0 [ 320.348370] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 320.353393] ? __kmalloc+0x38e/0x3c0 [ 320.357113] ? ieee80211_cs_list_valid+0x199/0x280 [ 320.362055] ieee80211_register_hw+0x13a7/0x3410 [ 320.367007] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 320.371952] ? memset+0x20/0x40 [ 320.375235] ? __hrtimer_init+0xe9/0x1d0 [ 320.379301] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 320.384413] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 320.389447] ? hwsim_mcast_del_radio+0x230/0x230 [ 320.394243] ? __kmalloc_track_caller+0x389/0x3c0 [ 320.399094] ? hwsim_new_radio_nl+0x273/0x850 [ 320.403597] ? memcpy+0x35/0x50 [ 320.406897] hwsim_new_radio_nl+0x5c3/0x850 [ 320.411231] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 320.416434] ? nla_parse+0x1b2/0x290 [ 320.420159] genl_family_rcv_msg+0x642/0xc40 [ 320.424583] ? genl_rcv+0x40/0x40 [ 320.428040] ? genl_rcv_msg+0x12f/0x160 [ 320.432028] ? __mutex_add_waiter+0x160/0x160 [ 320.436576] ? __radix_tree_lookup+0x216/0x370 [ 320.441192] genl_rcv_msg+0xbf/0x160 [ 320.445049] netlink_rcv_skb+0x160/0x440 [ 320.449123] ? genl_family_rcv_msg+0xc40/0xc40 [ 320.453721] ? netlink_ack+0xae0/0xae0 [ 320.457621] ? genl_rcv+0x15/0x40 [ 320.461208] genl_rcv+0x24/0x40 [ 320.464514] netlink_unicast+0x4d5/0x690 [ 320.468594] ? netlink_sendskb+0x110/0x110 [ 320.473015] ? _copy_from_iter_full+0x229/0x7c0 [ 320.477691] ? __phys_addr_symbol+0x2c/0x70 [ 320.482016] ? __check_object_size+0x17b/0x3d1 [ 320.486606] netlink_sendmsg+0x6bb/0xc40 [ 320.490675] ? aa_af_perm+0x230/0x230 [ 320.494478] ? nlmsg_notify+0x1a0/0x1a0 [ 320.498457] ? kernel_recvmsg+0x220/0x220 [ 320.502621] ? nlmsg_notify+0x1a0/0x1a0 [ 320.506601] sock_sendmsg+0xc3/0x120 [ 320.510331] ___sys_sendmsg+0x7bb/0x8e0 [ 320.514310] ? __lock_acquire+0x6de/0x3ff0 [ 320.518557] ? copy_msghdr_from_user+0x440/0x440 [ 320.523321] ? __fget+0x32f/0x510 [ 320.526792] ? lock_downgrade+0x720/0x720 [ 320.530957] ? check_preemption_disabled+0x41/0x280 [ 320.535991] ? check_preemption_disabled+0x41/0x280 [ 320.541020] ? __fget+0x356/0x510 [ 320.544480] ? do_dup2+0x450/0x450 [ 320.548033] ? __fdget+0x1d0/0x230 [ 320.551610] __x64_sys_sendmsg+0x132/0x220 [ 320.555855] ? __sys_sendmsg+0x1b0/0x1b0 [ 320.560060] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 320.565434] ? trace_hardirqs_off_caller+0x6e/0x210 [ 320.570545] ? do_syscall_64+0x21/0x620 [ 320.574527] do_syscall_64+0xf9/0x620 [ 320.578345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.583558] RIP: 0033:0x45de59 [ 320.586755] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:27:54 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000622008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 320.605761] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 320.613524] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 320.620899] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 320.628184] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 320.635467] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 320.643100] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:27:54 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) waitid(0x1, 0xffffffffffffffff, &(0x7f0000000000), 0x80000000, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) keyctl$read(0xb, r3, 0x0, 0x0) 20:27:54 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000722008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:54 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080), 0x0, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x80, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @multicast}, 0x10) 20:27:54 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000922008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e02580ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 320.938955] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 320.947866] CPU: 1 PID: 18396 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 320.955776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.965137] Call Trace: [ 320.967746] dump_stack+0x1fc/0x2fe [ 320.971395] sysfs_warn_dup.cold+0x1c/0x2d [ 320.975650] sysfs_do_create_link_sd+0x116/0x130 [ 320.980418] sysfs_create_link+0x5f/0xc0 [ 320.984495] device_add+0x7d1/0x16d0 [ 320.988256] ? device_check_offline+0x280/0x280 [ 320.992972] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 320.998268] wiphy_register+0x1664/0x2130 [ 321.002430] ? bm_init+0x612/0x950 [ 321.006001] ? wiphy_unregister+0xea0/0xea0 [ 321.010344] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 321.015374] ? __kmalloc+0x38e/0x3c0 [ 321.019095] ? ieee80211_cs_list_valid+0x199/0x280 [ 321.024040] ieee80211_register_hw+0x13a7/0x3410 [ 321.028847] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 321.033821] ? memset+0x20/0x40 [ 321.037111] ? __hrtimer_init+0xe9/0x1d0 [ 321.041179] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 321.046293] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 321.051334] ? hwsim_mcast_del_radio+0x230/0x230 [ 321.056098] ? __kmalloc_track_caller+0x389/0x3c0 [ 321.060945] ? hwsim_new_radio_nl+0x273/0x850 [ 321.065553] ? memcpy+0x35/0x50 [ 321.068843] hwsim_new_radio_nl+0x5c3/0x850 [ 321.073178] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 321.078387] ? nla_parse+0x1b2/0x290 [ 321.082120] genl_family_rcv_msg+0x642/0xc40 [ 321.086542] ? genl_rcv+0x40/0x40 [ 321.090002] ? genl_rcv_msg+0x12f/0x160 [ 321.093992] ? __mutex_add_waiter+0x160/0x160 [ 321.098510] ? __radix_tree_lookup+0x216/0x370 [ 321.103111] genl_rcv_msg+0xbf/0x160 [ 321.106842] netlink_rcv_skb+0x160/0x440 [ 321.110915] ? genl_family_rcv_msg+0xc40/0xc40 [ 321.115529] ? netlink_ack+0xae0/0xae0 [ 321.119447] ? genl_rcv+0x15/0x40 [ 321.122934] genl_rcv+0x24/0x40 [ 321.126229] netlink_unicast+0x4d5/0x690 [ 321.130307] ? netlink_sendskb+0x110/0x110 [ 321.134560] ? _copy_from_iter_full+0x229/0x7c0 [ 321.139241] ? __phys_addr_symbol+0x2c/0x70 [ 321.143581] ? __check_object_size+0x17b/0x3d1 [ 321.148186] netlink_sendmsg+0x6bb/0xc40 [ 321.152266] ? aa_af_perm+0x230/0x230 [ 321.156077] ? nlmsg_notify+0x1a0/0x1a0 [ 321.160089] ? kernel_recvmsg+0x220/0x220 [ 321.164268] ? nlmsg_notify+0x1a0/0x1a0 [ 321.168249] sock_sendmsg+0xc3/0x120 [ 321.171975] ___sys_sendmsg+0x7bb/0x8e0 [ 321.175972] ? __lock_acquire+0x6de/0x3ff0 [ 321.180219] ? copy_msghdr_from_user+0x440/0x440 [ 321.184986] ? __fget+0x32f/0x510 [ 321.188454] ? lock_downgrade+0x720/0x720 [ 321.193528] ? check_preemption_disabled+0x41/0x280 [ 321.198559] ? check_preemption_disabled+0x41/0x280 [ 321.203591] ? __fget+0x356/0x510 [ 321.207061] ? do_dup2+0x450/0x450 [ 321.210619] ? __fdget+0x1d0/0x230 [ 321.214179] __x64_sys_sendmsg+0x132/0x220 [ 321.218467] ? __sys_sendmsg+0x1b0/0x1b0 [ 321.222550] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 321.227934] ? trace_hardirqs_off_caller+0x6e/0x210 [ 321.232969] ? do_syscall_64+0x21/0x620 [ 321.236966] do_syscall_64+0xf9/0x620 [ 321.240804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.246001] RIP: 0033:0x45de59 [ 321.249201] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.269003] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 321.276766] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 20:27:55 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:55 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000b22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 321.284058] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 321.291343] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 321.298650] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 321.305934] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 321.468240] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 321.483836] CPU: 1 PID: 18396 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 321.491773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.501441] Call Trace: [ 321.504051] dump_stack+0x1fc/0x2fe [ 321.507694] sysfs_warn_dup.cold+0x1c/0x2d [ 321.511942] sysfs_do_create_link_sd+0x116/0x130 [ 321.516741] sysfs_create_link+0x5f/0xc0 [ 321.520813] device_add+0x7d1/0x16d0 [ 321.524539] ? device_check_offline+0x280/0x280 [ 321.529220] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 321.534543] wiphy_register+0x1664/0x2130 [ 321.538710] ? bm_init+0x612/0x950 [ 321.542264] ? wiphy_unregister+0xea0/0xea0 [ 321.546599] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 321.551741] ? __kmalloc+0x38e/0x3c0 [ 321.555464] ? ieee80211_cs_list_valid+0x199/0x280 [ 321.560417] ieee80211_register_hw+0x13a7/0x3410 [ 321.565198] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 321.570140] ? memset+0x20/0x40 [ 321.573437] ? __hrtimer_init+0xe9/0x1d0 [ 321.577508] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 321.582626] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 321.587672] ? hwsim_mcast_del_radio+0x230/0x230 [ 321.592438] ? __kmalloc_track_caller+0x389/0x3c0 [ 321.597304] ? hwsim_new_radio_nl+0x273/0x850 [ 321.601806] ? memcpy+0x35/0x50 [ 321.605101] hwsim_new_radio_nl+0x5c3/0x850 [ 321.609442] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 321.614661] ? nla_parse+0x1b2/0x290 [ 321.618390] genl_family_rcv_msg+0x642/0xc40 [ 321.622816] ? genl_rcv+0x40/0x40 [ 321.626287] ? genl_rcv_msg+0x12f/0x160 [ 321.630270] ? __mutex_add_waiter+0x160/0x160 [ 321.634793] ? __radix_tree_lookup+0x216/0x370 [ 321.639393] genl_rcv_msg+0xbf/0x160 [ 321.643159] netlink_rcv_skb+0x160/0x440 [ 321.647233] ? genl_family_rcv_msg+0xc40/0xc40 [ 321.651830] ? netlink_ack+0xae0/0xae0 [ 321.655732] ? genl_rcv+0x15/0x40 [ 321.659199] genl_rcv+0x24/0x40 [ 321.662490] netlink_unicast+0x4d5/0x690 [ 321.666563] ? netlink_sendskb+0x110/0x110 [ 321.670806] ? _copy_from_iter_full+0x229/0x7c0 [ 321.675485] ? __phys_addr_symbol+0x2c/0x70 [ 321.679831] ? __check_object_size+0x17b/0x3d1 [ 321.684429] netlink_sendmsg+0x6bb/0xc40 [ 321.688526] ? aa_af_perm+0x230/0x230 [ 321.692359] ? nlmsg_notify+0x1a0/0x1a0 [ 321.696341] ? kernel_recvmsg+0x220/0x220 [ 321.700504] ? nlmsg_notify+0x1a0/0x1a0 [ 321.704509] sock_sendmsg+0xc3/0x120 [ 321.708238] ___sys_sendmsg+0x7bb/0x8e0 [ 321.712246] ? __lock_acquire+0x6de/0x3ff0 [ 321.716662] ? copy_msghdr_from_user+0x440/0x440 [ 321.721452] ? __fget+0x32f/0x510 [ 321.724938] ? lock_downgrade+0x720/0x720 [ 321.729099] ? check_preemption_disabled+0x41/0x280 [ 321.734144] ? check_preemption_disabled+0x41/0x280 [ 321.739184] ? __fget+0x356/0x510 [ 321.742663] ? do_dup2+0x450/0x450 [ 321.746426] ? __fdget+0x1d0/0x230 [ 321.749988] __x64_sys_sendmsg+0x132/0x220 [ 321.754239] ? __sys_sendmsg+0x1b0/0x1b0 [ 321.758354] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 321.764690] ? trace_hardirqs_off_caller+0x6e/0x210 [ 321.769740] ? do_syscall_64+0x21/0x620 [ 321.773729] do_syscall_64+0xf9/0x620 [ 321.777547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.782769] RIP: 0033:0x45de59 [ 321.785973] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.804917] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 321.812684] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 321.819971] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 321.827254] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 321.834625] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 321.841939] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xd, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:56 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000e22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:56 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x103002, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCDELRT(r0, 0x5452, &(0x7f0000000180)={0xfdfdffff, {0x2, 0x0, @broadcast}, {}, {0x2, 0x0, @loopback}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000002c0)={0x2, 'vxcan1\x00'}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x110080, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="9589beceec0000008510000000000000"], &(0x7f0000000040)='syzkaller\x00', 0xfffffffb, 0x62, &(0x7f0000000080)=""/98, 0x40e00, 0x4, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x9, 0x1, 0x1}, 0x10, 0x0, r1}, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r2) keyctl$read(0xb, r3, 0x0, 0x0) 20:27:56 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb55b904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:56 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00001f22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xe, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 322.012838] IPVS: sync thread started: state = BACKUP, mcast_ifn = vxcan1, syncid = 0, id = 0 [ 322.034546] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 322.098620] CPU: 0 PID: 18435 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 322.106541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.115901] Call Trace: [ 322.118498] dump_stack+0x1fc/0x2fe [ 322.122137] sysfs_warn_dup.cold+0x1c/0x2d [ 322.126380] sysfs_do_create_link_sd+0x116/0x130 [ 322.131494] sysfs_create_link+0x5f/0xc0 [ 322.135569] device_add+0x7d1/0x16d0 [ 322.139300] ? device_check_offline+0x280/0x280 [ 322.143991] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 322.149289] wiphy_register+0x1664/0x2130 [ 322.153462] ? bm_init+0x612/0x950 [ 322.157072] ? wiphy_unregister+0xea0/0xea0 [ 322.161411] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 322.166436] ? __kmalloc+0x38e/0x3c0 [ 322.170158] ? ieee80211_cs_list_valid+0x199/0x280 [ 322.175476] ieee80211_register_hw+0x13a7/0x3410 [ 322.180255] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 322.185195] ? memset+0x20/0x40 [ 322.188482] ? __hrtimer_init+0xe9/0x1d0 [ 322.192584] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 322.197707] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 322.202774] ? hwsim_mcast_del_radio+0x230/0x230 [ 322.207538] ? __kmalloc_track_caller+0x389/0x3c0 [ 322.212387] ? hwsim_new_radio_nl+0x273/0x850 [ 322.216903] ? memcpy+0x35/0x50 [ 322.220193] hwsim_new_radio_nl+0x5c3/0x850 [ 322.224526] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 322.229735] ? nla_parse+0x1b2/0x290 [ 322.233466] genl_family_rcv_msg+0x642/0xc40 [ 322.238066] ? genl_rcv+0x40/0x40 [ 322.241523] ? genl_rcv_msg+0x12f/0x160 [ 322.245508] ? __mutex_add_waiter+0x160/0x160 [ 322.250025] ? __radix_tree_lookup+0x216/0x370 [ 322.254625] genl_rcv_msg+0xbf/0x160 [ 322.258356] netlink_rcv_skb+0x160/0x440 [ 322.262429] ? genl_family_rcv_msg+0xc40/0xc40 [ 322.267023] ? netlink_ack+0xae0/0xae0 [ 322.270923] ? genl_rcv+0x15/0x40 [ 322.274391] genl_rcv+0x24/0x40 [ 322.277680] netlink_unicast+0x4d5/0x690 [ 322.281754] ? netlink_sendskb+0x110/0x110 [ 322.286009] ? _copy_from_iter_full+0x229/0x7c0 [ 322.290858] ? __phys_addr_symbol+0x2c/0x70 [ 322.295190] ? __check_object_size+0x17b/0x3d1 [ 322.299790] netlink_sendmsg+0x6bb/0xc40 [ 322.303872] ? aa_af_perm+0x230/0x230 [ 322.307685] ? nlmsg_notify+0x1a0/0x1a0 [ 322.311696] ? kernel_recvmsg+0x220/0x220 [ 322.315868] ? nlmsg_notify+0x1a0/0x1a0 [ 322.319854] sock_sendmsg+0xc3/0x120 [ 322.323584] ___sys_sendmsg+0x7bb/0x8e0 [ 322.327570] ? __lock_acquire+0x6de/0x3ff0 [ 322.331849] ? copy_msghdr_from_user+0x440/0x440 [ 322.336615] ? __fget+0x32f/0x510 [ 322.340082] ? lock_downgrade+0x720/0x720 [ 322.344242] ? check_preemption_disabled+0x41/0x280 [ 322.349268] ? check_preemption_disabled+0x41/0x280 [ 322.354299] ? __fget+0x356/0x510 [ 322.357772] ? do_dup2+0x450/0x450 [ 322.361331] ? __fdget+0x1d0/0x230 [ 322.364884] __x64_sys_sendmsg+0x132/0x220 [ 322.369124] ? __sys_sendmsg+0x1b0/0x1b0 [ 322.373209] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 322.378605] ? trace_hardirqs_off_caller+0x6e/0x210 [ 322.384090] ? do_syscall_64+0x21/0x620 [ 322.388092] do_syscall_64+0xf9/0x620 [ 322.391922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.397126] RIP: 0033:0x45de59 [ 322.400343] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.419351] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 322.427079] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 322.434359] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 322.441660] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 322.448932] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 322.456210] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:56 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00002022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xf, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x0, @remote}}) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) [ 322.570622] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 322.611977] CPU: 0 PID: 18462 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 322.619910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.629449] Call Trace: [ 322.632060] dump_stack+0x1fc/0x2fe [ 322.635703] sysfs_warn_dup.cold+0x1c/0x2d [ 322.639947] sysfs_do_create_link_sd+0x116/0x130 [ 322.644720] sysfs_create_link+0x5f/0xc0 [ 322.648789] device_add+0x7d1/0x16d0 [ 322.652518] ? device_check_offline+0x280/0x280 [ 322.657205] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 322.662498] wiphy_register+0x1664/0x2130 [ 322.666657] ? bm_init+0x612/0x950 [ 322.670235] ? wiphy_unregister+0xea0/0xea0 [ 322.674577] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 322.679601] ? __kmalloc+0x38e/0x3c0 [ 322.683349] ? ieee80211_cs_list_valid+0x199/0x280 [ 322.688307] ieee80211_register_hw+0x13a7/0x3410 [ 322.693085] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 322.698045] ? memset+0x20/0x40 [ 322.701333] ? __hrtimer_init+0xe9/0x1d0 [ 322.705403] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 322.710517] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 322.715571] ? hwsim_mcast_del_radio+0x230/0x230 [ 322.720336] ? __kmalloc_track_caller+0x389/0x3c0 [ 322.725184] ? hwsim_new_radio_nl+0x273/0x850 [ 322.729685] ? memcpy+0x35/0x50 [ 322.732974] hwsim_new_radio_nl+0x5c3/0x850 [ 322.737308] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 322.742513] ? nla_parse+0x1b2/0x290 [ 322.746248] genl_family_rcv_msg+0x642/0xc40 [ 322.750675] ? genl_rcv+0x40/0x40 [ 322.754134] ? genl_rcv_msg+0x12f/0x160 [ 322.758138] ? __mutex_add_waiter+0x160/0x160 [ 322.762655] ? __radix_tree_lookup+0x216/0x370 [ 322.767260] genl_rcv_msg+0xbf/0x160 [ 322.770994] netlink_rcv_skb+0x160/0x440 [ 322.775068] ? genl_family_rcv_msg+0xc40/0xc40 [ 322.779684] ? netlink_ack+0xae0/0xae0 [ 322.783596] ? genl_rcv+0x15/0x40 [ 322.787068] genl_rcv+0x24/0x40 [ 322.790356] netlink_unicast+0x4d5/0x690 [ 322.794430] ? netlink_sendskb+0x110/0x110 [ 322.798672] ? _copy_from_iter_full+0x229/0x7c0 [ 322.803345] ? __phys_addr_symbol+0x2c/0x70 [ 322.807679] ? __check_object_size+0x17b/0x3d1 [ 322.812806] netlink_sendmsg+0x6bb/0xc40 [ 322.816922] ? aa_af_perm+0x230/0x230 [ 322.820740] ? nlmsg_notify+0x1a0/0x1a0 [ 322.824755] ? kernel_recvmsg+0x220/0x220 [ 322.828925] ? nlmsg_notify+0x1a0/0x1a0 [ 322.832914] sock_sendmsg+0xc3/0x120 [ 322.836643] ___sys_sendmsg+0x7bb/0x8e0 [ 322.840648] ? __lock_acquire+0x6de/0x3ff0 [ 322.844893] ? copy_msghdr_from_user+0x440/0x440 [ 322.849659] ? __fget+0x32f/0x510 [ 322.853125] ? lock_downgrade+0x720/0x720 [ 322.857288] ? check_preemption_disabled+0x41/0x280 20:27:57 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00023c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 322.862317] ? check_preemption_disabled+0x41/0x280 [ 322.867362] ? __fget+0x356/0x510 [ 322.870819] ? do_dup2+0x450/0x450 [ 322.874728] ? __fdget+0x1d0/0x230 [ 322.878457] __x64_sys_sendmsg+0x132/0x220 [ 322.882732] ? __sys_sendmsg+0x1b0/0x1b0 [ 322.886818] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 322.892196] ? trace_hardirqs_off_caller+0x6e/0x210 [ 322.897225] ? do_syscall_64+0x21/0x620 [ 322.901232] do_syscall_64+0xf9/0x620 [ 322.905086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.910279] RIP: 0033:0x45de59 [ 322.913485] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.932397] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 322.940119] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 322.947398] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 322.954711] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 20:27:57 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 322.961993] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 322.969267] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:27:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x5a, @loopback, 0x4e22, 0x3, 'lc\x00', 0x20, 0x400, 0x66}, {@broadcast, 0x4e22, 0x4, 0x7, 0x1}}, 0x44) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={r2}) 20:27:57 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00003f22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x10, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:57 executing program 0: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac", 0x2, r0) keyctl$read(0xb, r1, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bond_slave_0\x00') lookup_dcookie(0x7fffffff, &(0x7f00000001c0)=""/196, 0xc4) 20:27:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb58b904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x11, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:57 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xf, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xa, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x12, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:57 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 323.506610] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 323.568766] CPU: 0 PID: 18522 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 323.576736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.586106] Call Trace: [ 323.588711] dump_stack+0x1fc/0x2fe [ 323.592360] sysfs_warn_dup.cold+0x1c/0x2d [ 323.597213] sysfs_do_create_link_sd+0x116/0x130 [ 323.601981] sysfs_create_link+0x5f/0xc0 [ 323.606056] device_add+0x7d1/0x16d0 [ 323.609793] ? device_check_offline+0x280/0x280 [ 323.614479] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 323.619780] wiphy_register+0x1664/0x2130 [ 323.623952] ? bm_init+0x612/0x950 [ 323.627699] ? wiphy_unregister+0xea0/0xea0 [ 323.632049] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 323.637082] ? __kmalloc+0x38e/0x3c0 [ 323.640816] ? ieee80211_cs_list_valid+0x199/0x280 [ 323.645762] ieee80211_register_hw+0x13a7/0x3410 [ 323.650539] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 323.655480] ? memset+0x20/0x40 [ 323.658780] ? __hrtimer_init+0xe9/0x1d0 [ 323.662848] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 323.667971] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 323.673021] ? hwsim_mcast_del_radio+0x230/0x230 [ 323.677788] ? __kmalloc_track_caller+0x389/0x3c0 [ 323.682737] ? hwsim_new_radio_nl+0x273/0x850 [ 323.687246] ? memcpy+0x35/0x50 [ 323.690540] hwsim_new_radio_nl+0x5c3/0x850 [ 323.694874] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 323.700599] ? nla_parse+0x1b2/0x290 [ 323.704350] genl_family_rcv_msg+0x642/0xc40 [ 323.708806] ? genl_rcv+0x40/0x40 [ 323.712266] ? genl_rcv_msg+0x12f/0x160 [ 323.716249] ? __mutex_add_waiter+0x160/0x160 [ 323.720770] ? __radix_tree_lookup+0x216/0x370 [ 323.725372] genl_rcv_msg+0xbf/0x160 [ 323.729099] netlink_rcv_skb+0x160/0x440 [ 323.733201] ? genl_family_rcv_msg+0xc40/0xc40 [ 323.737793] ? netlink_ack+0xae0/0xae0 [ 323.741695] ? genl_rcv+0x15/0x40 [ 323.745196] genl_rcv+0x24/0x40 [ 323.748485] netlink_unicast+0x4d5/0x690 [ 323.752563] ? netlink_sendskb+0x110/0x110 [ 323.756818] ? _copy_from_iter_full+0x229/0x7c0 [ 323.761503] ? __phys_addr_symbol+0x2c/0x70 [ 323.765842] ? __check_object_size+0x17b/0x3d1 [ 323.770438] netlink_sendmsg+0x6bb/0xc40 [ 323.774512] ? aa_af_perm+0x230/0x230 [ 323.778323] ? nlmsg_notify+0x1a0/0x1a0 [ 323.782304] ? kernel_recvmsg+0x220/0x220 [ 323.786464] ? nlmsg_notify+0x1a0/0x1a0 [ 323.790447] sock_sendmsg+0xc3/0x120 [ 323.794180] ___sys_sendmsg+0x7bb/0x8e0 [ 323.798191] ? __lock_acquire+0x6de/0x3ff0 [ 323.802526] ? copy_msghdr_from_user+0x440/0x440 [ 323.807386] ? __fget+0x32f/0x510 [ 323.811315] ? lock_downgrade+0x720/0x720 [ 323.815475] ? check_preemption_disabled+0x41/0x280 [ 323.820523] ? check_preemption_disabled+0x41/0x280 [ 323.825670] ? __fget+0x356/0x510 [ 323.829138] ? do_dup2+0x450/0x450 [ 323.832693] ? __fdget+0x1d0/0x230 [ 323.836241] __x64_sys_sendmsg+0x132/0x220 [ 323.840657] ? __sys_sendmsg+0x1b0/0x1b0 [ 323.844742] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 323.850317] ? trace_hardirqs_off_caller+0x6e/0x210 [ 323.855373] ? do_syscall_64+0x21/0x620 [ 323.859365] do_syscall_64+0xf9/0x620 [ 323.863179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.868398] RIP: 0033:0x45de59 [ 323.871597] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.890784] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 323.898509] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 323.905782] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 20:27:58 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x11, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 323.913759] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 323.921559] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 323.929281] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:58 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x13, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:58 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 324.417345] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 324.436813] CPU: 1 PID: 18559 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 324.444751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.454123] Call Trace: [ 324.456735] dump_stack+0x1fc/0x2fe [ 324.460375] sysfs_warn_dup.cold+0x1c/0x2d [ 324.464640] sysfs_do_create_link_sd+0x116/0x130 [ 324.469410] sysfs_create_link+0x5f/0xc0 [ 324.473509] device_add+0x7d1/0x16d0 [ 324.477267] ? device_check_offline+0x280/0x280 [ 324.482229] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 324.487551] wiphy_register+0x1664/0x2130 [ 324.492321] ? bm_init+0x612/0x950 [ 324.496229] ? wiphy_unregister+0xea0/0xea0 [ 324.500649] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 324.505680] ? __kmalloc+0x38e/0x3c0 [ 324.509424] ? ieee80211_cs_list_valid+0x199/0x280 [ 324.514371] ieee80211_register_hw+0x13a7/0x3410 [ 324.519317] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 324.524365] ? memset+0x20/0x40 [ 324.527670] ? __hrtimer_init+0xe9/0x1d0 [ 324.531737] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 324.536861] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 324.542000] ? hwsim_mcast_del_radio+0x230/0x230 [ 324.546768] ? __kmalloc_track_caller+0x389/0x3c0 [ 324.551614] ? hwsim_new_radio_nl+0x273/0x850 [ 324.556142] ? memcpy+0x35/0x50 [ 324.559478] hwsim_new_radio_nl+0x5c3/0x850 [ 324.563816] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 324.569028] ? nla_parse+0x1b2/0x290 [ 324.572762] genl_family_rcv_msg+0x642/0xc40 [ 324.577186] ? genl_rcv+0x40/0x40 [ 324.580647] ? genl_rcv_msg+0x12f/0x160 [ 324.584628] ? __mutex_add_waiter+0x160/0x160 [ 324.589331] ? __radix_tree_lookup+0x216/0x370 [ 324.593930] genl_rcv_msg+0xbf/0x160 [ 324.597657] netlink_rcv_skb+0x160/0x440 [ 324.601727] ? genl_family_rcv_msg+0xc40/0xc40 [ 324.606427] ? netlink_ack+0xae0/0xae0 [ 324.611052] ? genl_rcv+0x15/0x40 [ 324.614618] genl_rcv+0x24/0x40 [ 324.617943] netlink_unicast+0x4d5/0x690 [ 324.622028] ? netlink_sendskb+0x110/0x110 [ 324.626391] ? _copy_from_iter_full+0x229/0x7c0 [ 324.631112] ? __phys_addr_symbol+0x2c/0x70 [ 324.635444] ? __check_object_size+0x17b/0x3d1 [ 324.640039] netlink_sendmsg+0x6bb/0xc40 [ 324.644140] ? aa_af_perm+0x230/0x230 [ 324.647960] ? nlmsg_notify+0x1a0/0x1a0 [ 324.651940] ? kernel_recvmsg+0x220/0x220 [ 324.656110] ? nlmsg_notify+0x1a0/0x1a0 [ 324.660105] sock_sendmsg+0xc3/0x120 [ 324.663927] ___sys_sendmsg+0x7bb/0x8e0 [ 324.667916] ? __lock_acquire+0x6de/0x3ff0 [ 324.672334] ? copy_msghdr_from_user+0x440/0x440 [ 324.677119] ? __fget+0x32f/0x510 [ 324.680589] ? lock_downgrade+0x720/0x720 [ 324.684762] ? check_preemption_disabled+0x41/0x280 [ 324.689795] ? check_preemption_disabled+0x41/0x280 [ 324.694829] ? __fget+0x356/0x510 [ 324.698292] ? do_dup2+0x450/0x450 [ 324.701843] ? __fdget+0x1d0/0x230 [ 324.705569] __x64_sys_sendmsg+0x132/0x220 [ 324.709950] ? __sys_sendmsg+0x1b0/0x1b0 [ 324.714044] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 324.719443] ? trace_hardirqs_off_caller+0x6e/0x210 [ 324.724474] ? do_syscall_64+0x21/0x620 [ 324.728463] do_syscall_64+0xf9/0x620 [ 324.732282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.737526] RIP: 0033:0x45de59 [ 324.740732] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.759733] RSP: 002b:00007f147409cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 324.767468] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 324.774747] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 324.782032] RBP: 000000000118c0b0 R08: 0000000000000000 R09: 0000000000000000 [ 324.789308] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c07c [ 324.796589] R13: 00007ffd1e5faf1f R14: 00007f147409d9c0 R15: 000000000118c07c 20:27:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb902044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x9, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x14, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:59 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:27:59 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007422008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 324.958405] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 325.009603] CPU: 0 PID: 18583 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 325.017637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.027458] Call Trace: [ 325.030764] dump_stack+0x1fc/0x2fe [ 325.034410] sysfs_warn_dup.cold+0x1c/0x2d [ 325.038684] sysfs_do_create_link_sd+0x116/0x130 [ 325.043455] sysfs_create_link+0x5f/0xc0 [ 325.047527] device_add+0x7d1/0x16d0 [ 325.051273] ? device_check_offline+0x280/0x280 [ 325.056037] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 325.061337] wiphy_register+0x1664/0x2130 [ 325.065500] ? bm_init+0x612/0x950 [ 325.069052] ? wiphy_unregister+0xea0/0xea0 [ 325.073392] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 325.078433] ? __kmalloc+0x38e/0x3c0 [ 325.082683] ? ieee80211_cs_list_valid+0x199/0x280 [ 325.087627] ieee80211_register_hw+0x13a7/0x3410 [ 325.092405] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 325.097362] ? memset+0x20/0x40 [ 325.100648] ? __hrtimer_init+0xe9/0x1d0 [ 325.104732] ? mac80211_hwsim_sta_notify+0x140/0x140 20:27:59 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 325.109850] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 325.114884] ? hwsim_mcast_del_radio+0x230/0x230 [ 325.120275] ? __kmalloc_track_caller+0x389/0x3c0 [ 325.125137] ? hwsim_new_radio_nl+0x273/0x850 [ 325.129642] ? memcpy+0x35/0x50 [ 325.132945] hwsim_new_radio_nl+0x5c3/0x850 [ 325.137301] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 325.142508] ? nla_parse+0x1b2/0x290 [ 325.146232] genl_family_rcv_msg+0x642/0xc40 [ 325.150652] ? genl_rcv+0x40/0x40 [ 325.154109] ? genl_rcv_msg+0x12f/0x160 [ 325.158089] ? __mutex_add_waiter+0x160/0x160 [ 325.162608] ? __radix_tree_lookup+0x216/0x370 [ 325.167210] genl_rcv_msg+0xbf/0x160 [ 325.170955] netlink_rcv_skb+0x160/0x440 [ 325.175038] ? genl_family_rcv_msg+0xc40/0xc40 [ 325.179632] ? netlink_ack+0xae0/0xae0 [ 325.183530] ? genl_rcv+0x15/0x40 [ 325.187000] genl_rcv+0x24/0x40 [ 325.190291] netlink_unicast+0x4d5/0x690 [ 325.194370] ? netlink_sendskb+0x110/0x110 [ 325.198625] ? _copy_from_iter_full+0x229/0x7c0 [ 325.203298] ? __phys_addr_symbol+0x2c/0x70 [ 325.207626] ? __check_object_size+0x17b/0x3d1 [ 325.212308] netlink_sendmsg+0x6bb/0xc40 [ 325.216388] ? aa_af_perm+0x230/0x230 [ 325.220544] ? nlmsg_notify+0x1a0/0x1a0 [ 325.224795] ? kernel_recvmsg+0x220/0x220 [ 325.228966] ? nlmsg_notify+0x1a0/0x1a0 [ 325.232950] sock_sendmsg+0xc3/0x120 [ 325.236676] ___sys_sendmsg+0x7bb/0x8e0 [ 325.240672] ? __lock_acquire+0x6de/0x3ff0 [ 325.244915] ? copy_msghdr_from_user+0x440/0x440 [ 325.249685] ? __fget+0x32f/0x510 [ 325.253888] ? lock_downgrade+0x720/0x720 [ 325.258580] ? check_preemption_disabled+0x41/0x280 [ 325.263620] ? check_preemption_disabled+0x41/0x280 [ 325.268657] ? __fget+0x356/0x510 [ 325.272121] ? do_dup2+0x450/0x450 [ 325.275679] ? __fdget+0x1d0/0x230 [ 325.279230] __x64_sys_sendmsg+0x132/0x220 [ 325.283479] ? __sys_sendmsg+0x1b0/0x1b0 [ 325.287559] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 325.292942] ? trace_hardirqs_off_caller+0x6e/0x210 [ 325.297991] ? do_syscall_64+0x21/0x620 [ 325.302006] do_syscall_64+0xf9/0x620 [ 325.305821] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:27:59 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000f022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 325.311915] RIP: 0033:0x45de59 [ 325.315114] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.334025] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 325.341747] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 325.349027] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 20:27:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x15, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x14, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 325.356301] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 325.363574] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 325.370851] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:27:59 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000000f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x6, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 325.594113] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 325.602893] CPU: 0 PID: 18617 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 325.610812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.620867] Call Trace: [ 325.623469] dump_stack+0x1fc/0x2fe [ 325.627123] sysfs_warn_dup.cold+0x1c/0x2d [ 325.631374] sysfs_do_create_link_sd+0x116/0x130 [ 325.636679] sysfs_create_link+0x5f/0xc0 [ 325.640843] device_add+0x7d1/0x16d0 [ 325.644657] ? device_check_offline+0x280/0x280 [ 325.649345] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 325.654642] wiphy_register+0x1664/0x2130 [ 325.658813] ? bm_init+0x612/0x950 [ 325.662453] ? wiphy_unregister+0xea0/0xea0 [ 325.666791] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 325.671816] ? __kmalloc+0x38e/0x3c0 [ 325.675541] ? ieee80211_cs_list_valid+0x199/0x280 [ 325.680483] ieee80211_register_hw+0x13a7/0x3410 [ 325.685260] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 325.690286] ? memset+0x20/0x40 [ 325.693663] ? __hrtimer_init+0xe9/0x1d0 [ 325.697738] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 325.702860] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 325.708598] ? hwsim_mcast_del_radio+0x230/0x230 [ 325.713362] ? __kmalloc_track_caller+0x389/0x3c0 [ 325.718218] ? hwsim_new_radio_nl+0x273/0x850 [ 325.722724] ? memcpy+0x35/0x50 [ 325.726022] hwsim_new_radio_nl+0x5c3/0x850 [ 325.730380] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 325.736435] ? nla_parse+0x1b2/0x290 [ 325.740611] genl_family_rcv_msg+0x642/0xc40 [ 325.745043] ? genl_rcv+0x40/0x40 [ 325.748513] ? genl_rcv_msg+0x12f/0x160 [ 325.752613] ? __mutex_add_waiter+0x160/0x160 [ 325.757132] ? __radix_tree_lookup+0x216/0x370 [ 325.761746] genl_rcv_msg+0xbf/0x160 [ 325.765486] netlink_rcv_skb+0x160/0x440 [ 325.769562] ? genl_family_rcv_msg+0xc40/0xc40 [ 325.774164] ? netlink_ack+0xae0/0xae0 [ 325.778064] ? genl_rcv+0x15/0x40 [ 325.781794] genl_rcv+0x24/0x40 [ 325.785090] netlink_unicast+0x4d5/0x690 [ 325.789168] ? netlink_sendskb+0x110/0x110 [ 325.793435] ? _copy_from_iter_full+0x229/0x7c0 [ 325.798114] ? __phys_addr_symbol+0x2c/0x70 [ 325.802448] ? __check_object_size+0x17b/0x3d1 [ 325.807073] netlink_sendmsg+0x6bb/0xc40 [ 325.811161] ? aa_af_perm+0x230/0x230 [ 325.814987] ? nlmsg_notify+0x1a0/0x1a0 [ 325.818977] ? kernel_recvmsg+0x220/0x220 [ 325.823151] ? nlmsg_notify+0x1a0/0x1a0 [ 325.827137] sock_sendmsg+0xc3/0x120 [ 325.830867] ___sys_sendmsg+0x7bb/0x8e0 [ 325.834865] ? __lock_acquire+0x6de/0x3ff0 [ 325.839116] ? copy_msghdr_from_user+0x440/0x440 [ 325.843911] ? __fget+0x32f/0x510 [ 325.847404] ? lock_downgrade+0x720/0x720 [ 325.851567] ? check_preemption_disabled+0x41/0x280 [ 325.856598] ? check_preemption_disabled+0x41/0x280 [ 325.861632] ? __fget+0x356/0x510 [ 325.865099] ? do_dup2+0x450/0x450 [ 325.868653] ? __fdget+0x1d0/0x230 [ 325.872212] __x64_sys_sendmsg+0x132/0x220 [ 325.876465] ? __sys_sendmsg+0x1b0/0x1b0 [ 325.880565] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 325.885948] ? trace_hardirqs_off_caller+0x6e/0x210 [ 325.890975] ? do_syscall_64+0x21/0x620 [ 325.894992] do_syscall_64+0xf9/0x620 [ 325.898814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.904010] RIP: 0033:0x45de59 [ 325.907207] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.926155] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 325.933878] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 325.941158] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 325.948443] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 325.955914] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 325.963539] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:28:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb903044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x16, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:00 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000222008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x15, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:00 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 326.125517] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 326.185976] CPU: 0 PID: 18639 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 326.193891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.203281] Call Trace: [ 326.206060] dump_stack+0x1fc/0x2fe [ 326.209725] sysfs_warn_dup.cold+0x1c/0x2d [ 326.213976] sysfs_do_create_link_sd+0x116/0x130 [ 326.218744] sysfs_create_link+0x5f/0xc0 [ 326.222857] device_add+0x7d1/0x16d0 [ 326.226606] ? device_check_offline+0x280/0x280 [ 326.231286] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 326.236581] wiphy_register+0x1664/0x2130 [ 326.240745] ? bm_init+0x612/0x950 [ 326.244300] ? wiphy_unregister+0xea0/0xea0 [ 326.248640] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 326.253665] ? __kmalloc+0x38e/0x3c0 [ 326.257822] ? ieee80211_cs_list_valid+0x199/0x280 [ 326.262765] ieee80211_register_hw+0x13a7/0x3410 [ 326.267559] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 326.272509] ? memset+0x20/0x40 [ 326.275803] ? __hrtimer_init+0xe9/0x1d0 [ 326.279877] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 326.284995] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 326.290034] ? hwsim_mcast_del_radio+0x230/0x230 [ 326.294804] ? __kmalloc_track_caller+0x389/0x3c0 [ 326.299659] ? hwsim_new_radio_nl+0x273/0x850 [ 326.304253] ? memcpy+0x35/0x50 [ 326.307546] hwsim_new_radio_nl+0x5c3/0x850 [ 326.311964] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 326.317172] ? nla_parse+0x1b2/0x290 [ 326.320903] genl_family_rcv_msg+0x642/0xc40 [ 326.325349] ? genl_rcv+0x40/0x40 [ 326.328810] ? genl_rcv_msg+0x12f/0x160 20:28:00 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000322008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 326.332815] ? __mutex_add_waiter+0x160/0x160 [ 326.337330] ? __radix_tree_lookup+0x216/0x370 [ 326.341931] genl_rcv_msg+0xbf/0x160 [ 326.345656] netlink_rcv_skb+0x160/0x440 [ 326.349725] ? genl_family_rcv_msg+0xc40/0xc40 [ 326.354340] ? netlink_ack+0xae0/0xae0 [ 326.358322] ? genl_rcv+0x15/0x40 [ 326.362870] genl_rcv+0x24/0x40 [ 326.366153] netlink_unicast+0x4d5/0x690 [ 326.370236] ? netlink_sendskb+0x110/0x110 [ 326.374499] ? _copy_from_iter_full+0x229/0x7c0 [ 326.379175] ? __phys_addr_symbol+0x2c/0x70 [ 326.383508] ? __check_object_size+0x17b/0x3d1 [ 326.388111] netlink_sendmsg+0x6bb/0xc40 [ 326.392184] ? aa_af_perm+0x230/0x230 [ 326.396008] ? nlmsg_notify+0x1a0/0x1a0 [ 326.399990] ? kernel_recvmsg+0x220/0x220 [ 326.404161] ? nlmsg_notify+0x1a0/0x1a0 [ 326.408145] sock_sendmsg+0xc3/0x120 [ 326.411868] ___sys_sendmsg+0x7bb/0x8e0 [ 326.415850] ? __lock_acquire+0x6de/0x3ff0 [ 326.420120] ? copy_msghdr_from_user+0x440/0x440 [ 326.424897] ? __fget+0x32f/0x510 [ 326.428373] ? lock_downgrade+0x720/0x720 [ 326.432532] ? check_preemption_disabled+0x41/0x280 [ 326.437565] ? check_preemption_disabled+0x41/0x280 [ 326.442598] ? __fget+0x356/0x510 [ 326.446068] ? do_dup2+0x450/0x450 [ 326.449629] ? __fdget+0x1d0/0x230 [ 326.453185] __x64_sys_sendmsg+0x132/0x220 [ 326.457514] ? __sys_sendmsg+0x1b0/0x1b0 [ 326.461621] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 326.467009] ? trace_hardirqs_off_caller+0x6e/0x210 [ 326.472045] ? do_syscall_64+0x21/0x620 [ 326.476039] do_syscall_64+0xf9/0x620 [ 326.479862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.485063] RIP: 0033:0x45de59 [ 326.488288] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.507324] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 326.515050] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 326.522363] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 326.529648] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:28:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x17, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x15, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 326.536926] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 326.544202] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:28:00 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000422008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 326.598105] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 326.609072] CPU: 0 PID: 18656 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 326.616983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.626349] Call Trace: [ 326.628957] dump_stack+0x1fc/0x2fe [ 326.632599] sysfs_warn_dup.cold+0x1c/0x2d [ 326.636861] sysfs_do_create_link_sd+0x116/0x130 [ 326.641633] sysfs_create_link+0x5f/0xc0 [ 326.645706] device_add+0x7d1/0x16d0 [ 326.649435] ? device_check_offline+0x280/0x280 [ 326.654117] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 326.659416] wiphy_register+0x1664/0x2130 [ 326.663600] ? bm_init+0x612/0x950 [ 326.667148] ? wiphy_unregister+0xea0/0xea0 [ 326.671486] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 326.676512] ? __kmalloc+0x38e/0x3c0 [ 326.680251] ? ieee80211_cs_list_valid+0x199/0x280 [ 326.685197] ieee80211_register_hw+0x13a7/0x3410 [ 326.689969] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 326.694911] ? memset+0x20/0x40 [ 326.698196] ? __hrtimer_init+0xe9/0x1d0 [ 326.702283] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 326.707400] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 326.712517] ? hwsim_mcast_del_radio+0x230/0x230 [ 326.717294] ? __kmalloc_track_caller+0x331/0x3c0 [ 326.723185] ? hwsim_new_radio_nl+0x273/0x850 [ 326.727689] ? memcpy+0x35/0x50 [ 326.731070] hwsim_new_radio_nl+0x5c3/0x850 [ 326.735404] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 326.740612] ? nla_parse+0x1b2/0x290 [ 326.744344] genl_family_rcv_msg+0x642/0xc40 [ 326.748767] ? genl_rcv+0x40/0x40 [ 326.752221] ? genl_rcv_msg+0x12f/0x160 [ 326.756216] ? __mutex_add_waiter+0x160/0x160 [ 326.760735] ? __radix_tree_lookup+0x216/0x370 [ 326.765455] genl_rcv_msg+0xbf/0x160 [ 326.769186] netlink_rcv_skb+0x160/0x440 [ 326.773265] ? genl_family_rcv_msg+0xc40/0xc40 [ 326.777889] ? netlink_ack+0xae0/0xae0 [ 326.781792] ? genl_rcv+0x15/0x40 [ 326.785261] genl_rcv+0x24/0x40 [ 326.788551] netlink_unicast+0x4d5/0x690 [ 326.792627] ? netlink_sendskb+0x110/0x110 [ 326.796900] ? _copy_from_iter_full+0x229/0x7c0 [ 326.801584] ? __phys_addr_symbol+0x2c/0x70 [ 326.805922] ? __check_object_size+0x17b/0x3d1 [ 326.810519] netlink_sendmsg+0x6bb/0xc40 [ 326.814596] ? aa_af_perm+0x230/0x230 [ 326.818408] ? nlmsg_notify+0x1a0/0x1a0 [ 326.822395] ? kernel_recvmsg+0x220/0x220 [ 326.826569] ? nlmsg_notify+0x1a0/0x1a0 [ 326.830556] sock_sendmsg+0xc3/0x120 [ 326.834281] ___sys_sendmsg+0x7bb/0x8e0 [ 326.838263] ? __lock_acquire+0x6de/0x3ff0 [ 326.842539] ? copy_msghdr_from_user+0x440/0x440 [ 326.847307] ? __fget+0x32f/0x510 [ 326.850775] ? lock_downgrade+0x720/0x720 [ 326.854933] ? check_preemption_disabled+0x41/0x280 [ 326.860665] ? check_preemption_disabled+0x41/0x280 [ 326.866047] ? __fget+0x356/0x510 [ 326.869513] ? do_dup2+0x450/0x450 [ 326.873078] ? __fdget+0x1d0/0x230 [ 326.876634] __x64_sys_sendmsg+0x132/0x220 [ 326.880879] ? __sys_sendmsg+0x1b0/0x1b0 [ 326.884971] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 326.890348] ? trace_hardirqs_off_caller+0x6e/0x210 [ 326.895387] ? do_syscall_64+0x21/0x620 [ 326.899375] do_syscall_64+0xf9/0x620 [ 326.904086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.909283] RIP: 0033:0x45de59 [ 326.912483] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.931435] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 326.939174] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 326.946550] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 326.953838] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 326.961122] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 326.968408] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:28:01 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x16, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x1d, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb905044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000522008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x16, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x8c) [ 327.277209] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 327.313267] CPU: 0 PID: 18693 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 327.321224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.330671] Call Trace: [ 327.333267] dump_stack+0x1fc/0x2fe [ 327.336905] sysfs_warn_dup.cold+0x1c/0x2d [ 327.341237] sysfs_do_create_link_sd+0x116/0x130 [ 327.346013] sysfs_create_link+0x5f/0xc0 [ 327.350089] device_add+0x7d1/0x16d0 [ 327.353844] ? device_check_offline+0x280/0x280 [ 327.358548] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 327.363847] wiphy_register+0x1664/0x2130 [ 327.368019] ? bm_init+0x612/0x950 [ 327.371600] ? wiphy_unregister+0xea0/0xea0 [ 327.375964] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 327.381014] ? __kmalloc+0x38e/0x3c0 [ 327.384740] ? ieee80211_cs_list_valid+0x199/0x280 [ 327.389696] ieee80211_register_hw+0x13a7/0x3410 [ 327.394474] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 327.399449] ? memset+0x20/0x40 [ 327.402737] ? __hrtimer_init+0xe9/0x1d0 [ 327.406808] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 327.411926] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 327.416982] ? hwsim_mcast_del_radio+0x230/0x230 [ 327.421765] ? __kmalloc_track_caller+0x389/0x3c0 20:28:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000622008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 327.426644] ? hwsim_new_radio_nl+0x273/0x850 [ 327.431154] ? memcpy+0x35/0x50 [ 327.434447] hwsim_new_radio_nl+0x5c3/0x850 [ 327.438776] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 327.443982] ? nla_parse+0x1b2/0x290 [ 327.447736] genl_family_rcv_msg+0x642/0xc40 [ 327.452178] ? genl_rcv+0x40/0x40 [ 327.455637] ? genl_rcv_msg+0x12f/0x160 [ 327.459626] ? __mutex_add_waiter+0x160/0x160 [ 327.464142] ? __radix_tree_lookup+0x216/0x370 [ 327.468740] genl_rcv_msg+0xbf/0x160 [ 327.472493] netlink_rcv_skb+0x160/0x440 [ 327.476566] ? genl_family_rcv_msg+0xc40/0xc40 [ 327.481183] ? netlink_ack+0xae0/0xae0 [ 327.485080] ? genl_rcv+0x15/0x40 [ 327.488556] genl_rcv+0x24/0x40 [ 327.491844] netlink_unicast+0x4d5/0x690 [ 327.495920] ? netlink_sendskb+0x110/0x110 [ 327.500171] ? _copy_from_iter_full+0x229/0x7c0 [ 327.504848] ? __phys_addr_symbol+0x2c/0x70 [ 327.509182] ? __check_object_size+0x17b/0x3d1 [ 327.513867] netlink_sendmsg+0x6bb/0xc40 [ 327.517939] ? aa_af_perm+0x230/0x230 [ 327.521749] ? nlmsg_notify+0x1a0/0x1a0 [ 327.525736] ? kernel_recvmsg+0x220/0x220 [ 327.529902] ? nlmsg_notify+0x1a0/0x1a0 [ 327.533887] sock_sendmsg+0xc3/0x120 [ 327.537636] ___sys_sendmsg+0x7bb/0x8e0 [ 327.541711] ? __lock_acquire+0x6de/0x3ff0 [ 327.546996] ? copy_msghdr_from_user+0x440/0x440 [ 327.551766] ? __fget+0x32f/0x510 [ 327.555237] ? lock_downgrade+0x720/0x720 [ 327.559396] ? check_preemption_disabled+0x41/0x280 [ 327.564438] ? check_preemption_disabled+0x41/0x280 [ 327.569487] ? __fget+0x356/0x510 [ 327.572950] ? do_dup2+0x450/0x450 [ 327.576515] ? __fdget+0x1d0/0x230 [ 327.580077] __x64_sys_sendmsg+0x132/0x220 [ 327.584320] ? __sys_sendmsg+0x1b0/0x1b0 [ 327.588399] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 327.593780] ? trace_hardirqs_off_caller+0x6e/0x210 [ 327.598805] ? do_syscall_64+0x21/0x620 [ 327.602789] do_syscall_64+0xf9/0x620 [ 327.606629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.611823] RIP: 0033:0x45de59 20:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x100f) [ 327.615035] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.633948] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 327.641669] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 327.648952] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 327.656231] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 327.663539] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 327.670856] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:28:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x4, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 327.729422] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 327.746362] CPU: 0 PID: 18713 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 327.754278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.763727] Call Trace: [ 327.766337] dump_stack+0x1fc/0x2fe [ 327.769981] sysfs_warn_dup.cold+0x1c/0x2d [ 327.774667] sysfs_do_create_link_sd+0x116/0x130 [ 327.779448] sysfs_create_link+0x5f/0xc0 [ 327.783524] device_add+0x7d1/0x16d0 [ 327.787254] ? device_check_offline+0x280/0x280 [ 327.791966] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 327.797268] wiphy_register+0x1664/0x2130 [ 327.801436] ? bm_init+0x612/0x950 [ 327.805037] ? wiphy_unregister+0xea0/0xea0 [ 327.809408] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 327.814436] ? __kmalloc+0x38e/0x3c0 [ 327.818159] ? ieee80211_cs_list_valid+0x199/0x280 [ 327.823100] ieee80211_register_hw+0x13a7/0x3410 20:28:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000722008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 327.827879] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 327.832824] ? memset+0x20/0x40 [ 327.836971] ? __hrtimer_init+0xe9/0x1d0 [ 327.841051] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 327.846178] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 327.851227] ? hwsim_mcast_del_radio+0x230/0x230 [ 327.855995] ? __kmalloc_track_caller+0x389/0x3c0 [ 327.860849] ? hwsim_new_radio_nl+0x273/0x850 [ 327.865381] ? memcpy+0x35/0x50 [ 327.868672] hwsim_new_radio_nl+0x5c3/0x850 [ 327.873014] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 327.878229] ? nla_parse+0x1b2/0x290 [ 327.881964] genl_family_rcv_msg+0x642/0xc40 [ 327.886422] ? genl_rcv+0x40/0x40 [ 327.889887] ? genl_rcv_msg+0x12f/0x160 [ 327.893899] ? __mutex_add_waiter+0x160/0x160 [ 327.898426] ? __radix_tree_lookup+0x216/0x370 [ 327.903125] genl_rcv_msg+0xbf/0x160 [ 327.906894] netlink_rcv_skb+0x160/0x440 [ 327.910967] ? genl_family_rcv_msg+0xc40/0xc40 [ 327.915558] ? netlink_ack+0xae0/0xae0 [ 327.919474] ? genl_rcv+0x15/0x40 [ 327.922942] genl_rcv+0x24/0x40 [ 327.926410] netlink_unicast+0x4d5/0x690 [ 327.930515] ? netlink_sendskb+0x110/0x110 [ 327.934875] ? _copy_from_iter_full+0x229/0x7c0 [ 327.939580] ? __phys_addr_symbol+0x2c/0x70 [ 327.943923] ? __check_object_size+0x17b/0x3d1 [ 327.948528] netlink_sendmsg+0x6bb/0xc40 [ 327.952607] ? aa_af_perm+0x230/0x230 [ 327.956423] ? nlmsg_notify+0x1a0/0x1a0 [ 327.960499] ? kernel_recvmsg+0x220/0x220 [ 327.964670] ? nlmsg_notify+0x1a0/0x1a0 [ 327.968657] sock_sendmsg+0xc3/0x120 [ 327.972394] ___sys_sendmsg+0x7bb/0x8e0 [ 327.976411] ? __lock_acquire+0x6de/0x3ff0 [ 327.980663] ? copy_msghdr_from_user+0x440/0x440 [ 327.985429] ? __fget+0x32f/0x510 [ 327.988911] ? lock_downgrade+0x720/0x720 [ 327.993072] ? check_preemption_disabled+0x41/0x280 [ 327.998127] ? check_preemption_disabled+0x41/0x280 [ 328.003181] ? __fget+0x356/0x510 [ 328.006648] ? do_dup2+0x450/0x450 [ 328.010205] ? __fdget+0x1d0/0x230 [ 328.014278] __x64_sys_sendmsg+0x132/0x220 [ 328.018523] ? __sys_sendmsg+0x1b0/0x1b0 [ 328.022629] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 328.028014] ? trace_hardirqs_off_caller+0x6e/0x210 [ 328.033047] ? do_syscall_64+0x21/0x620 [ 328.037037] do_syscall_64+0xf9/0x620 [ 328.040880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.046078] RIP: 0033:0x45de59 [ 328.049285] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.071264] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 328.079022] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 328.086301] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 328.094280] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 328.101559] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 328.108928] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:28:02 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcda62f1cda741201a6887dd477f4d16425045c2fe6f48484373eca5dd7c3848b674596b2", 0x8d}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1010) 20:28:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x4, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb906044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:02 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94", 0x1}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x4, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}]}) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000922008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:02 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94", 0x1}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 328.645411] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 328.710020] CPU: 0 PID: 18762 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 328.718163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.727709] Call Trace: [ 328.730322] dump_stack+0x1fc/0x2fe [ 328.733972] sysfs_warn_dup.cold+0x1c/0x2d [ 328.738222] sysfs_do_create_link_sd+0x116/0x130 [ 328.743006] sysfs_create_link+0x5f/0xc0 [ 328.747091] device_add+0x7d1/0x16d0 [ 328.750822] ? device_check_offline+0x280/0x280 [ 328.755528] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 328.760827] wiphy_register+0x1664/0x2130 [ 328.765003] ? bm_init+0x612/0x950 [ 328.768572] ? wiphy_unregister+0xea0/0xea0 [ 328.772918] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 328.777972] ? __kmalloc+0x38e/0x3c0 [ 328.781701] ? ieee80211_cs_list_valid+0x199/0x280 [ 328.786656] ieee80211_register_hw+0x13a7/0x3410 [ 328.791430] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 328.796366] ? memset+0x20/0x40 [ 328.799677] ? __hrtimer_init+0xe9/0x1d0 [ 328.803763] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 328.808890] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 328.813971] ? hwsim_mcast_del_radio+0x230/0x230 [ 328.818741] ? __kmalloc_track_caller+0x389/0x3c0 [ 328.823599] ? hwsim_new_radio_nl+0x273/0x850 [ 328.828114] ? memcpy+0x35/0x50 [ 328.831410] hwsim_new_radio_nl+0x5c3/0x850 [ 328.835748] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 328.840972] ? nla_parse+0x1b2/0x290 [ 328.844701] genl_family_rcv_msg+0x642/0xc40 [ 328.849125] ? genl_rcv+0x40/0x40 [ 328.852582] ? genl_rcv_msg+0x12f/0x160 [ 328.856571] ? __mutex_add_waiter+0x160/0x160 [ 328.861117] ? __radix_tree_lookup+0x216/0x370 [ 328.865719] genl_rcv_msg+0xbf/0x160 [ 328.869476] netlink_rcv_skb+0x160/0x440 [ 328.873548] ? genl_family_rcv_msg+0xc40/0xc40 [ 328.878145] ? netlink_ack+0xae0/0xae0 [ 328.882044] ? genl_rcv+0x15/0x40 [ 328.885514] genl_rcv+0x24/0x40 [ 328.888801] netlink_unicast+0x4d5/0x690 [ 328.892870] ? netlink_sendskb+0x110/0x110 [ 328.897116] ? _copy_from_iter_full+0x229/0x7c0 [ 328.901790] ? __phys_addr_symbol+0x2c/0x70 [ 328.906138] ? __check_object_size+0x17b/0x3d1 20:28:03 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 328.910730] netlink_sendmsg+0x6bb/0xc40 [ 328.914813] ? aa_af_perm+0x230/0x230 [ 328.918625] ? nlmsg_notify+0x1a0/0x1a0 [ 328.922634] ? kernel_recvmsg+0x220/0x220 [ 328.926803] ? nlmsg_notify+0x1a0/0x1a0 [ 328.930793] sock_sendmsg+0xc3/0x120 [ 328.934520] ___sys_sendmsg+0x7bb/0x8e0 [ 328.938525] ? __lock_acquire+0x6de/0x3ff0 [ 328.942793] ? copy_msghdr_from_user+0x440/0x440 [ 328.947566] ? __fget+0x32f/0x510 [ 328.951161] ? lock_downgrade+0x720/0x720 [ 328.955321] ? check_preemption_disabled+0x41/0x280 [ 328.960362] ? check_preemption_disabled+0x41/0x280 [ 328.965395] ? __fget+0x356/0x510 [ 328.968865] ? do_dup2+0x450/0x450 [ 328.972426] ? __fdget+0x1d0/0x230 [ 328.975985] __x64_sys_sendmsg+0x132/0x220 [ 328.980243] ? __sys_sendmsg+0x1b0/0x1b0 [ 328.984360] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 328.989738] ? trace_hardirqs_off_caller+0x6e/0x210 [ 328.994778] ? do_syscall_64+0x21/0x620 [ 328.998795] do_syscall_64+0xf9/0x620 [ 329.002894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.008088] RIP: 0033:0x45de59 [ 329.011283] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.030202] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 329.038013] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 329.045325] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 329.052625] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:28:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0x4, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:03 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94", 0x1}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 329.059908] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 329.067187] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:28:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) get_thread_area(&(0x7f0000000000)={0x8, 0x20000800, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) 20:28:03 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000b22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:03 executing program 0 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 329.348374] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 329.368413] CPU: 0 PID: 18797 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 329.376705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.386071] Call Trace: [ 329.388678] dump_stack+0x1fc/0x2fe [ 329.392323] sysfs_warn_dup.cold+0x1c/0x2d [ 329.396578] sysfs_do_create_link_sd+0x116/0x130 [ 329.401342] sysfs_create_link+0x5f/0xc0 [ 329.405587] device_add+0x7d1/0x16d0 [ 329.409316] ? device_check_offline+0x280/0x280 [ 329.413996] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 329.419286] wiphy_register+0x1664/0x2130 [ 329.423455] ? bm_init+0x612/0x950 [ 329.427011] ? wiphy_unregister+0xea0/0xea0 [ 329.431345] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 329.436491] ? __kmalloc+0x38e/0x3c0 [ 329.440225] ? ieee80211_cs_list_valid+0x199/0x280 [ 329.445196] ieee80211_register_hw+0x13a7/0x3410 [ 329.449972] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 329.454917] ? memset+0x20/0x40 [ 329.458201] ? __hrtimer_init+0xe9/0x1d0 [ 329.462270] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 329.467477] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 329.472607] ? hwsim_mcast_del_radio+0x230/0x230 [ 329.477372] ? __kmalloc_track_caller+0x389/0x3c0 [ 329.482245] ? hwsim_new_radio_nl+0x273/0x850 [ 329.486774] ? memcpy+0x35/0x50 [ 329.490065] hwsim_new_radio_nl+0x5c3/0x850 [ 329.494396] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 329.499607] ? nla_parse+0x1b2/0x290 [ 329.503374] genl_family_rcv_msg+0x642/0xc40 [ 329.507798] ? genl_rcv+0x40/0x40 [ 329.511258] ? genl_rcv_msg+0x12f/0x160 [ 329.515240] ? __mutex_add_waiter+0x160/0x160 [ 329.519752] ? __radix_tree_lookup+0x216/0x370 [ 329.524354] genl_rcv_msg+0xbf/0x160 [ 329.528083] netlink_rcv_skb+0x160/0x440 [ 329.532166] ? genl_family_rcv_msg+0xc40/0xc40 [ 329.536758] ? netlink_ack+0xae0/0xae0 [ 329.540687] ? genl_rcv+0x15/0x40 [ 329.544164] genl_rcv+0x24/0x40 [ 329.547459] netlink_unicast+0x4d5/0x690 [ 329.551537] ? netlink_sendskb+0x110/0x110 [ 329.555796] ? _copy_from_iter_full+0x229/0x7c0 [ 329.560473] ? __phys_addr_symbol+0x2c/0x70 [ 329.564834] ? __check_object_size+0x17b/0x3d1 [ 329.569457] netlink_sendmsg+0x6bb/0xc40 [ 329.574579] ? aa_af_perm+0x230/0x230 [ 329.578496] ? nlmsg_notify+0x1a0/0x1a0 [ 329.582476] ? kernel_recvmsg+0x220/0x220 [ 329.586643] ? nlmsg_notify+0x1a0/0x1a0 [ 329.590628] sock_sendmsg+0xc3/0x120 [ 329.594351] ___sys_sendmsg+0x7bb/0x8e0 [ 329.598330] ? __lock_acquire+0x6de/0x3ff0 [ 329.602571] ? copy_msghdr_from_user+0x440/0x440 [ 329.607359] ? __fget+0x32f/0x510 [ 329.610852] ? lock_downgrade+0x720/0x720 [ 329.615014] ? check_preemption_disabled+0x41/0x280 [ 329.620057] ? check_preemption_disabled+0x41/0x280 [ 329.625124] ? __fget+0x356/0x510 [ 329.628590] ? do_dup2+0x450/0x450 [ 329.632150] ? __fdget+0x1d0/0x230 [ 329.635700] __x64_sys_sendmsg+0x132/0x220 [ 329.639958] ? __sys_sendmsg+0x1b0/0x1b0 [ 329.644038] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 329.649498] ? trace_hardirqs_off_caller+0x6e/0x210 [ 329.654701] ? do_syscall_64+0x21/0x620 [ 329.658683] do_syscall_64+0xf9/0x620 [ 329.662498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.667696] RIP: 0033:0x45de59 [ 329.671506] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.690438] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:28:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb907044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:03 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462", 0x47}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000000)) 20:28:03 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000e22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 329.698169] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 329.705443] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 329.712713] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 329.719988] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 329.727263] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 [ 329.811020] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 329.861056] CPU: 0 PID: 18817 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 329.869083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.878444] Call Trace: [ 329.881054] dump_stack+0x1fc/0x2fe [ 329.884695] sysfs_warn_dup.cold+0x1c/0x2d [ 329.888944] sysfs_do_create_link_sd+0x116/0x130 [ 329.893718] sysfs_create_link+0x5f/0xc0 [ 329.897798] device_add+0x7d1/0x16d0 [ 329.901528] ? device_check_offline+0x280/0x280 [ 329.906210] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 329.911515] wiphy_register+0x1664/0x2130 [ 329.915690] ? wiphy_unregister+0xea0/0xea0 [ 329.920029] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 329.925057] ? __kmalloc+0x38e/0x3c0 [ 329.928807] ? ieee80211_cs_list_valid+0x199/0x280 [ 329.933759] ieee80211_register_hw+0x13a7/0x3410 [ 329.939854] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 329.944812] ? memset+0x20/0x40 [ 329.948106] ? __hrtimer_init+0xe9/0x1d0 [ 329.952464] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 329.957594] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 329.962635] ? hwsim_mcast_del_radio+0x230/0x230 [ 329.967425] ? __kmalloc_track_caller+0x389/0x3c0 [ 329.972272] ? hwsim_new_radio_nl+0x273/0x850 [ 329.976777] ? memcpy+0x35/0x50 [ 329.980075] hwsim_new_radio_nl+0x5c3/0x850 [ 329.984420] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 329.989637] ? nla_parse+0x1b2/0x290 [ 329.993369] genl_family_rcv_msg+0x642/0xc40 [ 329.997790] ? genl_rcv+0x40/0x40 [ 330.001246] ? genl_rcv_msg+0x12f/0x160 [ 330.005249] ? __mutex_add_waiter+0x160/0x160 20:28:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00001022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 330.009795] ? __radix_tree_lookup+0x216/0x370 [ 330.014398] genl_rcv_msg+0xbf/0x160 [ 330.018128] netlink_rcv_skb+0x160/0x440 [ 330.022197] ? genl_family_rcv_msg+0xc40/0xc40 [ 330.026790] ? netlink_ack+0xae0/0xae0 [ 330.030716] ? genl_rcv+0x15/0x40 [ 330.034182] genl_rcv+0x24/0x40 [ 330.037471] netlink_unicast+0x4d5/0x690 [ 330.041570] ? netlink_sendskb+0x110/0x110 [ 330.045819] ? _copy_from_iter_full+0x229/0x7c0 [ 330.050497] ? __phys_addr_symbol+0x2c/0x70 [ 330.054904] ? __check_object_size+0x17b/0x3d1 [ 330.059503] netlink_sendmsg+0x6bb/0xc40 [ 330.063573] ? aa_af_perm+0x230/0x230 [ 330.067556] ? nlmsg_notify+0x1a0/0x1a0 [ 330.071547] ? kernel_recvmsg+0x220/0x220 [ 330.075713] ? nlmsg_notify+0x1a0/0x1a0 [ 330.079696] sock_sendmsg+0xc3/0x120 [ 330.083446] ___sys_sendmsg+0x7bb/0x8e0 [ 330.087431] ? __lock_acquire+0x6de/0x3ff0 [ 330.091676] ? copy_msghdr_from_user+0x440/0x440 [ 330.096469] ? __fget+0x32f/0x510 [ 330.099936] ? lock_downgrade+0x720/0x720 [ 330.104092] ? check_preemption_disabled+0x41/0x280 [ 330.109120] ? check_preemption_disabled+0x41/0x280 [ 330.114150] ? __fget+0x356/0x510 [ 330.117617] ? do_dup2+0x450/0x450 [ 330.121172] ? __fdget+0x1d0/0x230 [ 330.124752] __x64_sys_sendmsg+0x132/0x220 [ 330.129002] ? __sys_sendmsg+0x1b0/0x1b0 [ 330.133082] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 330.138457] ? trace_hardirqs_off_caller+0x6e/0x210 [ 330.143484] ? do_syscall_64+0x21/0x620 [ 330.147497] do_syscall_64+0xf9/0x620 [ 330.151312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.156540] RIP: 0033:0x45de59 [ 330.159741] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.178661] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 330.186380] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 330.193690] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 330.200967] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 20:28:04 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462", 0x47}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x800007, 0x5) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000100)="2ed8e166b9240a000066b80500000066ba000000000f30baf80c66b858d7198b66efbafc0c66ed262e66660fde20b800008ee067f2a666b9ee09000066b87f00000066ba000000000f300f38cd76c70f20e06635000001000f22e0f2a7", 0x5d}], 0x1, 0xc6187afcdc5b7e0, &(0x7f0000000180)=[@cr0={0x0, 0x8}], 0x1) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r2) keyctl$read(0xb, r3, &(0x7f0000001480)=""/4104, 0x1008) 20:28:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0x2, r1, 0x0, 0x0) [ 330.208249] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 330.215527] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:28:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0x3, r1, 0x0, 0x0) [ 330.334095] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 330.360230] CPU: 0 PID: 18842 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 330.368150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.377510] Call Trace: [ 330.380152] dump_stack+0x1fc/0x2fe [ 330.383820] sysfs_warn_dup.cold+0x1c/0x2d [ 330.388067] sysfs_do_create_link_sd+0x116/0x130 [ 330.392860] sysfs_create_link+0x5f/0xc0 [ 330.396933] device_add+0x7d1/0x16d0 [ 330.400663] ? device_check_offline+0x280/0x280 [ 330.405345] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 330.410646] wiphy_register+0x1664/0x2130 [ 330.414836] ? bm_init+0x612/0x950 [ 330.418422] ? wiphy_unregister+0xea0/0xea0 [ 330.422765] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 330.427793] ? __kmalloc+0x38e/0x3c0 [ 330.431513] ? ieee80211_cs_list_valid+0x199/0x280 [ 330.436458] ieee80211_register_hw+0x13a7/0x3410 [ 330.441238] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 330.446266] ? memset+0x20/0x40 [ 330.449551] ? __hrtimer_init+0xe9/0x1d0 [ 330.453634] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 330.458757] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 330.463805] ? hwsim_mcast_del_radio+0x230/0x230 [ 330.468576] ? __kmalloc_track_caller+0x389/0x3c0 [ 330.473517] ? hwsim_new_radio_nl+0x273/0x850 [ 330.478025] ? memcpy+0x35/0x50 [ 330.481344] hwsim_new_radio_nl+0x5c3/0x850 [ 330.485678] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 330.490905] ? nla_parse+0x1b2/0x290 [ 330.494633] genl_family_rcv_msg+0x642/0xc40 [ 330.499059] ? genl_rcv+0x40/0x40 [ 330.502520] ? genl_rcv_msg+0x12f/0x160 [ 330.506503] ? __mutex_add_waiter+0x160/0x160 [ 330.511038] ? __radix_tree_lookup+0x216/0x370 [ 330.515651] genl_rcv_msg+0xbf/0x160 [ 330.519381] netlink_rcv_skb+0x160/0x440 [ 330.523452] ? genl_family_rcv_msg+0xc40/0xc40 [ 330.528044] ? netlink_ack+0xae0/0xae0 [ 330.531980] ? genl_rcv+0x15/0x40 [ 330.535455] genl_rcv+0x24/0x40 [ 330.538748] netlink_unicast+0x4d5/0x690 [ 330.542833] ? netlink_sendskb+0x110/0x110 [ 330.547085] ? _copy_from_iter_full+0x229/0x7c0 [ 330.551781] ? __phys_addr_symbol+0x2c/0x70 [ 330.556115] ? __check_object_size+0x17b/0x3d1 [ 330.560723] netlink_sendmsg+0x6bb/0xc40 [ 330.564820] ? aa_af_perm+0x230/0x230 [ 330.568639] ? nlmsg_notify+0x1a0/0x1a0 [ 330.572630] ? kernel_recvmsg+0x220/0x220 [ 330.576795] ? nlmsg_notify+0x1a0/0x1a0 [ 330.580780] sock_sendmsg+0xc3/0x120 [ 330.584506] ___sys_sendmsg+0x7bb/0x8e0 [ 330.588619] ? __lock_acquire+0x6de/0x3ff0 [ 330.592867] ? copy_msghdr_from_user+0x440/0x440 [ 330.597637] ? __fget+0x32f/0x510 [ 330.601108] ? lock_downgrade+0x720/0x720 [ 330.605269] ? check_preemption_disabled+0x41/0x280 [ 330.610301] ? check_preemption_disabled+0x41/0x280 [ 330.615349] ? __fget+0x356/0x510 [ 330.618825] ? do_dup2+0x450/0x450 [ 330.622383] ? __fdget+0x1d0/0x230 [ 330.625962] __x64_sys_sendmsg+0x132/0x220 [ 330.630201] ? __sys_sendmsg+0x1b0/0x1b0 20:28:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00004c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 330.634285] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 330.639662] ? trace_hardirqs_off_caller+0x6e/0x210 [ 330.644695] ? do_syscall_64+0x21/0x620 [ 330.648680] do_syscall_64+0xf9/0x620 [ 330.652493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.657687] RIP: 0033:0x45de59 [ 330.660913] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.679948] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 330.687667] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 330.694942] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 330.702328] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 330.709632] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 330.716907] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 20:28:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb908044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f9", 0x47c, r0) keyctl$read(0x4, r1, 0x0, 0x0) 20:28:05 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462", 0x47}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:05 executing program 3: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x80, r0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, [], 0x10}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @remote}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x23}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}]}, 0x80}, 0x1, 0x0, 0x0, 0x200400d0}, 0x48800) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/12, 0xc}, {&(0x7f0000000100)=""/37, 0x25}], 0x2, &(0x7f0000000180)=""/52, 0x34}, 0x10003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOGET_FSCREENINFO(0xffffffffffffffff, 0x4602, &(0x7f0000000580)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, &(0x7f00000000c0)=0x800007, 0x5) sendmsg$NLBL_UNLABEL_C_STATICLIST(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x98, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2e}}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1f}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:klogd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x98}}, 0x4004040) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r3) keyctl$read(0xb, r4, &(0x7f0000001480)=""/4104, 0x1008) 20:28:05 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006022008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:05 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006822008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0x5, r1, 0x0, 0x0) 20:28:05 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcd", 0x6a}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 331.105396] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 331.131570] CPU: 0 PID: 18887 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 331.139516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.148881] Call Trace: [ 331.151491] dump_stack+0x1fc/0x2fe [ 331.155166] sysfs_warn_dup.cold+0x1c/0x2d [ 331.159410] sysfs_do_create_link_sd+0x116/0x130 [ 331.164258] sysfs_create_link+0x5f/0xc0 [ 331.168352] device_add+0x7d1/0x16d0 [ 331.172080] ? device_check_offline+0x280/0x280 [ 331.176763] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 331.182055] wiphy_register+0x1664/0x2130 [ 331.186218] ? bm_init+0x612/0x950 [ 331.189786] ? wiphy_unregister+0xea0/0xea0 [ 331.194155] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 331.199179] ? __kmalloc+0x38e/0x3c0 [ 331.202900] ? ieee80211_cs_list_valid+0x199/0x280 [ 331.208022] ieee80211_register_hw+0x13a7/0x3410 [ 331.212802] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 331.217741] ? memset+0x20/0x40 [ 331.221055] ? __hrtimer_init+0xe9/0x1d0 [ 331.225124] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 331.230253] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 331.235301] ? hwsim_mcast_del_radio+0x230/0x230 [ 331.240066] ? __kmalloc_track_caller+0x389/0x3c0 [ 331.245347] ? hwsim_new_radio_nl+0x273/0x850 [ 331.245356] INFO: task kworker/0:0:5 blocked for more than 140 seconds. [ 331.245368] Not tainted 4.19.152-syzkaller #0 [ 331.250467] ? memcpy+0x35/0x50 [ 331.250489] hwsim_new_radio_nl+0x5c3/0x850 [ 331.250507] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 331.276869] ? nla_parse+0x1b2/0x290 [ 331.280601] genl_family_rcv_msg+0x642/0xc40 [ 331.285027] ? genl_rcv+0x40/0x40 [ 331.288482] ? genl_rcv_msg+0x12f/0x160 [ 331.292465] ? __mutex_add_waiter+0x160/0x160 [ 331.296978] ? __radix_tree_lookup+0x216/0x370 [ 331.299322] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 331.301579] genl_rcv_msg+0xbf/0x160 [ 331.301597] netlink_rcv_skb+0x160/0x440 [ 331.317428] ? genl_family_rcv_msg+0xc40/0xc40 [ 331.322109] ? netlink_ack+0xae0/0xae0 [ 331.326018] ? genl_rcv+0x15/0x40 [ 331.329487] genl_rcv+0x24/0x40 [ 331.332770] netlink_unicast+0x4d5/0x690 [ 331.336844] ? netlink_sendskb+0x110/0x110 [ 331.341090] ? _copy_from_iter_full+0x229/0x7c0 [ 331.345766] ? __phys_addr_symbol+0x2c/0x70 [ 331.350111] ? __check_object_size+0x17b/0x3d1 [ 331.352875] kworker/0:0 D26872 5 2 0x80000000 [ 331.354702] netlink_sendmsg+0x6bb/0xc40 [ 331.354722] ? aa_af_perm+0x230/0x230 [ 331.368254] ? nlmsg_notify+0x1a0/0x1a0 [ 331.372241] ? kernel_recvmsg+0x220/0x220 [ 331.376406] ? nlmsg_notify+0x1a0/0x1a0 [ 331.380398] sock_sendmsg+0xc3/0x120 [ 331.384127] ___sys_sendmsg+0x7bb/0x8e0 [ 331.388110] ? __lock_acquire+0x6de/0x3ff0 [ 331.389149] Workqueue: usb_hub_wq hub_event [ 331.396173] ? copy_msghdr_from_user+0x440/0x440 [ 331.396189] ? __fget+0x32f/0x510 [ 331.396207] ? lock_downgrade+0x720/0x720 [ 331.396223] ? check_preemption_disabled+0x41/0x280 [ 331.396238] ? check_preemption_disabled+0x41/0x280 [ 331.396254] ? __fget+0x356/0x510 [ 331.396271] ? do_dup2+0x450/0x450 [ 331.396295] ? __fdget+0x1d0/0x230 [ 331.434479] Call Trace: [ 331.434496] __x64_sys_sendmsg+0x132/0x220 [ 331.434511] ? __sys_sendmsg+0x1b0/0x1b0 [ 331.443363] __schedule+0x887/0x2040 [ 331.445368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 331.445386] ? trace_hardirqs_off_caller+0x6e/0x210 [ 331.445401] ? do_syscall_64+0x21/0x620 [ 331.445417] do_syscall_64+0xf9/0x620 [ 331.445435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.445447] RIP: 0033:0x45de59 [ 331.445460] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.445468] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:28:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f9", 0x47c, r0) keyctl$read(0x6, r1, 0x0, 0x0) 20:28:05 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00006c22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:05 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcd", 0x6a}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 331.445481] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 331.445489] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 331.445496] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 331.445504] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 331.445512] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 331.547450] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 331.591846] CPU: 1 PID: 18887 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 331.600459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.609826] Call Trace: [ 331.612457] dump_stack+0x1fc/0x2fe [ 331.616126] sysfs_warn_dup.cold+0x1c/0x2d [ 331.620393] sysfs_do_create_link_sd+0x116/0x130 [ 331.625167] sysfs_create_link+0x5f/0xc0 [ 331.629240] device_add+0x7d1/0x16d0 [ 331.633002] ? device_check_offline+0x280/0x280 [ 331.637681] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 331.642978] wiphy_register+0x1664/0x2130 [ 331.647147] ? bm_init+0x612/0x950 [ 331.650700] ? wiphy_unregister+0xea0/0xea0 [ 331.655040] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 331.660080] ? __kmalloc+0x38e/0x3c0 [ 331.663802] ? ieee80211_cs_list_valid+0x199/0x280 [ 331.668748] ieee80211_register_hw+0x13a7/0x3410 [ 331.673550] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 331.678489] ? memset+0x20/0x40 [ 331.682298] ? __hrtimer_init+0xe9/0x1d0 [ 331.686462] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 331.691605] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 331.697185] ? hwsim_mcast_del_radio+0x230/0x230 [ 331.701950] ? __kmalloc_track_caller+0x389/0x3c0 [ 331.708190] ? hwsim_new_radio_nl+0x273/0x850 [ 331.712695] ? memcpy+0x35/0x50 [ 331.715989] hwsim_new_radio_nl+0x5c3/0x850 [ 331.720322] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 331.726249] ? nla_parse+0x1b2/0x290 [ 331.729979] genl_family_rcv_msg+0x642/0xc40 [ 331.734400] ? genl_rcv+0x40/0x40 [ 331.737889] ? genl_rcv_msg+0x12f/0x160 [ 331.741875] ? __mutex_add_waiter+0x160/0x160 [ 331.748338] ? __radix_tree_lookup+0x216/0x370 [ 331.752942] genl_rcv_msg+0xbf/0x160 [ 331.753894] ? io_schedule_timeout+0x140/0x140 [ 331.756662] netlink_rcv_skb+0x160/0x440 [ 331.756680] ? genl_family_rcv_msg+0xc40/0xc40 [ 331.756695] ? netlink_ack+0xae0/0xae0 [ 331.756711] ? genl_rcv+0x15/0x40 [ 331.756731] genl_rcv+0x24/0x40 [ 331.756748] netlink_unicast+0x4d5/0x690 [ 331.773795] ? prepare_to_wait_exclusive+0x2d0/0x2d0 [ 331.773843] ? netlink_sendskb+0x110/0x110 [ 331.781868] schedule+0x8d/0x1b0 [ 331.785585] ? _copy_from_iter_full+0x229/0x7c0 [ 331.785599] ? __phys_addr_symbol+0x2c/0x70 [ 331.785614] ? __check_object_size+0x17b/0x3d1 [ 331.785632] netlink_sendmsg+0x6bb/0xc40 [ 331.785649] ? aa_af_perm+0x230/0x230 [ 331.799729] usb_kill_urb.part.0+0x197/0x220 [ 331.803030] ? nlmsg_notify+0x1a0/0x1a0 [ 331.803053] ? kernel_recvmsg+0x220/0x220 [ 331.803074] ? nlmsg_notify+0x1a0/0x1a0 [ 331.810969] ? usb_anchor_suspend_wakeups+0x40/0x40 20:28:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f9", 0x47c, r0) keyctl$read(0x7, r1, 0x0, 0x0) [ 331.812764] sock_sendmsg+0xc3/0x120 [ 331.812782] ___sys_sendmsg+0x7bb/0x8e0 [ 331.812799] ? __lock_acquire+0x6de/0x3ff0 [ 331.818983] ? bit_wait_io_timeout+0x100/0x100 [ 331.821088] ? copy_msghdr_from_user+0x440/0x440 [ 331.821106] ? __fget+0x32f/0x510 [ 331.821124] ? lock_downgrade+0x720/0x720 [ 331.827677] ? kasan_kmalloc+0x139/0x160 [ 331.829485] ? check_preemption_disabled+0x41/0x280 [ 331.829504] ? check_preemption_disabled+0x41/0x280 [ 331.829527] ? __fget+0x356/0x510 [ 331.833759] ? wait_woken+0x250/0x250 [ 331.837725] ? do_dup2+0x450/0x450 [ 331.837747] ? __fdget+0x1d0/0x230 [ 331.837766] __x64_sys_sendmsg+0x132/0x220 [ 331.837779] ? __sys_sendmsg+0x1b0/0x1b0 [ 331.837807] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 331.847888] usb_kill_urb+0x7c/0x90 [ 331.850553] ? trace_hardirqs_off_caller+0x6e/0x210 [ 331.850570] ? do_syscall_64+0x21/0x620 [ 331.850589] do_syscall_64+0xf9/0x620 [ 331.854874] usb_start_wait_urb+0x252/0x4c0 [ 331.859394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.859408] RIP: 0033:0x45de59 [ 331.859422] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.859442] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 331.859455] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 331.859464] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 331.859472] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 331.859481] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 331.859488] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c 20:28:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb90c044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0x8, r1, 0x0, 0x0) 20:28:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007422008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) r2 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000080)={'vcan0\x00'}) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x800007, 0x5) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000100)={0x5, 0x1, [0x6, 0xaf26, 0x1c, 0x7, 0x1], 0x1000}) 20:28:06 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcd", 0x6a}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 332.169418] ? setup_fault_attr+0x200/0x200 [ 332.223207] ? usb_api_blocking_completion+0xa0/0xa0 [ 332.244506] ? rcu_read_lock_sched_held+0x16c/0x1d0 20:28:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x310) [ 332.272195] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 332.283964] ? memset+0x20/0x40 [ 332.309183] CPU: 0 PID: 18952 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 332.317310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.326682] Call Trace: [ 332.329180] usb_control_msg+0x31c/0x4a0 [ 332.329299] dump_stack+0x1fc/0x2fe [ 332.337439] sysfs_warn_dup.cold+0x1c/0x2d [ 332.341692] sysfs_do_create_link_sd+0x116/0x130 [ 332.346544] sysfs_create_link+0x5f/0xc0 [ 332.350639] device_add+0x7d1/0x16d0 [ 332.354367] ? device_check_offline+0x280/0x280 [ 332.355098] ? usb_start_wait_urb+0x4c0/0x4c0 [ 332.359578] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 332.359600] wiphy_register+0x1664/0x2130 [ 332.359621] ? bm_init+0x612/0x950 [ 332.359638] ? wiphy_unregister+0xea0/0xea0 [ 332.359659] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 332.359672] ? __kmalloc+0x38e/0x3c0 [ 332.359686] ? ieee80211_cs_list_valid+0x199/0x280 [ 332.359705] ieee80211_register_hw+0x13a7/0x3410 [ 332.359727] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 332.394694] ? hub_port_init+0x125e/0x2fa0 [ 332.396939] ? memset+0x20/0x40 [ 332.396954] ? __hrtimer_init+0xe9/0x1d0 [ 332.396969] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 332.396986] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 332.397013] ? hwsim_mcast_del_radio+0x230/0x230 [ 332.397025] ? __kmalloc_track_caller+0x389/0x3c0 [ 332.397036] ? hwsim_new_radio_nl+0x273/0x850 [ 332.397049] ? memcpy+0x35/0x50 [ 332.397065] hwsim_new_radio_nl+0x5c3/0x850 [ 332.397080] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 332.397106] ? nla_parse+0x1b2/0x290 [ 332.416066] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 332.418372] genl_family_rcv_msg+0x642/0xc40 [ 332.418393] ? genl_rcv+0x40/0x40 [ 332.418410] ? genl_rcv_msg+0x12f/0x160 [ 332.434595] hub_port_init+0x12d9/0x2fa0 [ 332.438366] ? __mutex_add_waiter+0x160/0x160 [ 332.438393] ? __radix_tree_lookup+0x216/0x370 [ 332.438414] genl_rcv_msg+0xbf/0x160 [ 332.438431] netlink_rcv_skb+0x160/0x440 [ 332.438445] ? genl_family_rcv_msg+0xc40/0xc40 [ 332.438459] ? netlink_ack+0xae0/0xae0 [ 332.438475] ? genl_rcv+0x15/0x40 [ 332.438495] genl_rcv+0x24/0x40 [ 332.438512] netlink_unicast+0x4d5/0x690 [ 332.471287] hub_event+0x1cf8/0x43f0 [ 332.472689] ? netlink_sendskb+0x110/0x110 [ 332.472708] ? _copy_from_iter_full+0x229/0x7c0 [ 332.472725] ? __phys_addr_symbol+0x2c/0x70 [ 332.492219] ? hub_port_debounce+0x3b0/0x3b0 [ 332.493613] ? __check_object_size+0x17b/0x3d1 [ 332.493635] netlink_sendmsg+0x6bb/0xc40 [ 332.493653] ? aa_af_perm+0x230/0x230 [ 332.511710] ? check_preemption_disabled+0x41/0x280 [ 332.512959] ? nlmsg_notify+0x1a0/0x1a0 [ 332.512981] ? kernel_recvmsg+0x220/0x220 [ 332.513000] ? nlmsg_notify+0x1a0/0x1a0 [ 332.530742] process_one_work+0x864/0x1570 [ 332.534098] sock_sendmsg+0xc3/0x120 [ 332.534118] ___sys_sendmsg+0x7bb/0x8e0 [ 332.534133] ? __lock_acquire+0x6de/0x3ff0 [ 332.534155] ? copy_msghdr_from_user+0x440/0x440 [ 332.553955] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 332.556061] ? __fget+0x32f/0x510 [ 332.556082] ? lock_downgrade+0x720/0x720 [ 332.556098] ? check_preemption_disabled+0x41/0x280 [ 332.556114] ? check_preemption_disabled+0x41/0x280 [ 332.556130] ? __fget+0x356/0x510 [ 332.556146] ? do_dup2+0x450/0x450 [ 332.556167] ? __fdget+0x1d0/0x230 [ 332.556185] __x64_sys_sendmsg+0x132/0x220 [ 332.556200] ? __sys_sendmsg+0x1b0/0x1b0 [ 332.573431] worker_thread+0x64c/0x1130 [ 332.576210] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 332.576227] ? trace_hardirqs_off_caller+0x6e/0x210 [ 332.576243] ? do_syscall_64+0x21/0x620 [ 332.576259] do_syscall_64+0xf9/0x620 [ 332.576277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.576288] RIP: 0033:0x45de59 [ 332.576302] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.576314] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 332.585174] ? process_one_work+0x1570/0x1570 [ 332.589257] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 332.589266] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 332.589274] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 332.589281] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c 20:28:06 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcda62f1cda741201a6887dd477f4d16425045c", 0x7c}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00007a22008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0x9, r1, 0x0, 0x0) 20:28:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003f008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0xa, r1, 0x0, 0x0) 20:28:06 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x800007, 0x5) write$apparmor_current(r2, &(0x7f0000000080)=@profile={'changeprofile ', 'keyring\x00'}, 0x16) keyctl$read(0xb, r1, &(0x7f0000001480)=""/4104, 0x1008) [ 332.589289] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 332.858879] kthread+0x33f/0x460 [ 332.874106] ? kthread_park+0x180/0x180 [ 332.879272] ret_from_fork+0x24/0x30 [ 332.883130] [ 332.883130] Showing all locks held in the system: [ 332.909540] 5 locks held by kworker/0:0/5: [ 332.924019] #0: 0000000023e7ab4c ((wq_completion)"usb_hub_wq"){+.+.}, at: process_one_work+0x767/0x1570 [ 332.964426] #1: 00000000ea7b4d04 ((work_completion)(&hub->events)){+.+.}, at: process_one_work+0x79c/0x1570 [ 332.982348] #2: 00000000cda3af66 (&dev->mutex){....}, at: hub_event+0x11b/0x43f0 [ 332.995533] #3: 0000000079261312 (&port_dev->status_lock){+.+.}, at: hub_event+0x1ce3/0x43f0 [ 333.005905] #4: 00000000a953a94d (hcd->address0_mutex){+.+.}, at: hub_port_init+0x1b6/0x2fa0 [ 333.026134] 2 locks held by kworker/1:0/19: [ 333.037033] #0: 0000000098d12a65 ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 [ 333.066217] #1: 0000000084c60f47 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 [ 333.083098] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 333.096168] CPU: 1 PID: 18998 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 333.104066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.113432] Call Trace: [ 333.116040] dump_stack+0x1fc/0x2fe [ 333.119679] sysfs_warn_dup.cold+0x1c/0x2d [ 333.123924] sysfs_do_create_link_sd+0x116/0x130 [ 333.128688] sysfs_create_link+0x5f/0xc0 [ 333.132759] device_add+0x7d1/0x16d0 [ 333.136486] ? device_check_offline+0x280/0x280 [ 333.141161] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 333.146633] wiphy_register+0x1664/0x2130 [ 333.150820] ? bm_init+0x612/0x950 [ 333.154372] ? wiphy_unregister+0xea0/0xea0 [ 333.158706] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 333.163727] ? __kmalloc+0x38e/0x3c0 [ 333.167449] ? ieee80211_cs_list_valid+0x199/0x280 [ 333.172418] ieee80211_register_hw+0x13a7/0x3410 [ 333.177193] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 333.182173] ? memset+0x20/0x40 [ 333.185463] ? __hrtimer_init+0xe9/0x1d0 [ 333.189535] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 333.194657] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 333.199697] ? hwsim_mcast_del_radio+0x230/0x230 [ 333.204457] ? __kmalloc_track_caller+0x389/0x3c0 [ 333.209302] ? hwsim_new_radio_nl+0x273/0x850 [ 333.213812] ? memcpy+0x35/0x50 [ 333.217105] hwsim_new_radio_nl+0x5c3/0x850 [ 333.221441] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 333.226645] ? nla_parse+0x1b2/0x290 [ 333.230397] genl_family_rcv_msg+0x642/0xc40 [ 333.234877] ? genl_rcv+0x40/0x40 [ 333.238335] ? genl_rcv_msg+0x12f/0x160 [ 333.242320] ? __mutex_add_waiter+0x160/0x160 [ 333.246845] ? __radix_tree_lookup+0x216/0x370 [ 333.251439] genl_rcv_msg+0xbf/0x160 [ 333.255163] netlink_rcv_skb+0x160/0x440 [ 333.259235] ? genl_family_rcv_msg+0xc40/0xc40 [ 333.263827] ? netlink_ack+0xae0/0xae0 [ 333.267729] ? genl_rcv+0x15/0x40 [ 333.271215] genl_rcv+0x24/0x40 [ 333.274506] netlink_unicast+0x4d5/0x690 [ 333.278579] ? netlink_sendskb+0x110/0x110 [ 333.282843] ? _copy_from_iter_full+0x229/0x7c0 [ 333.287519] ? __phys_addr_symbol+0x2c/0x70 [ 333.291847] ? __check_object_size+0x17b/0x3d1 [ 333.296440] netlink_sendmsg+0x6bb/0xc40 [ 333.300515] ? aa_af_perm+0x230/0x230 [ 333.305277] ? nlmsg_notify+0x1a0/0x1a0 [ 333.309254] ? kernel_recvmsg+0x220/0x220 [ 333.313415] ? nlmsg_notify+0x1a0/0x1a0 [ 333.317394] sock_sendmsg+0xc3/0x120 [ 333.321117] ___sys_sendmsg+0x7bb/0x8e0 [ 333.325100] ? __lock_acquire+0x6de/0x3ff0 [ 333.329342] ? copy_msghdr_from_user+0x440/0x440 [ 333.334115] ? __fget+0x32f/0x510 [ 333.337583] ? lock_downgrade+0x720/0x720 [ 333.341741] ? check_preemption_disabled+0x41/0x280 [ 333.346766] ? check_preemption_disabled+0x41/0x280 [ 333.351815] ? __fget+0x356/0x510 [ 333.355283] ? do_dup2+0x450/0x450 [ 333.358836] ? __fdget+0x1d0/0x230 [ 333.362388] __x64_sys_sendmsg+0x132/0x220 [ 333.366628] ? __sys_sendmsg+0x1b0/0x1b0 [ 333.370705] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 333.376076] ? trace_hardirqs_off_caller+0x6e/0x210 [ 333.381104] ? do_syscall_64+0x21/0x620 [ 333.385112] do_syscall_64+0xf9/0x620 [ 333.388929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.394126] RIP: 0033:0x45de59 [ 333.397338] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.416256] RSP: 002b:00007f14740bdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 333.423978] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 333.431256] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 333.438542] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 333.445842] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 333.453122] R13: 00007ffd1e5faf1f R14: 00007f14740be9c0 R15: 000000000118bfd4 [ 333.471984] 1 lock held by khungtaskd/1566: 20:28:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb90e044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:07 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000055008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) 20:28:07 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="94b882c58e65c3263485312c9d8990284990d5d21509335071678ecd1ea6817a94004764cfdf48fa70fecbd5d0bbaeb85de4ae97bddb9d17b62013f6cc699f233a1b6d766f4462b11f9e7ecbbcd7680abafa2740ecaff7593bf1708cbe8cccd0ddabad0826a15605efcda62f1cda741201a6887dd477f4d16425045c", 0x7c}], 0x1, 0x5) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:28:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x47c, r0) keyctl$read(0xc, r1, 0x0, 0x0) 20:28:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f00000024c0)={0xc86, 0x7f, [[], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], []]}) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67", 0x8c, r1) keyctl$read(0xb, r2, &(0x7f0000001480)=""/4104, 0x1008) [ 333.480861] #0: 00000000f22d3d60 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 333.494712] 1 lock held by khugepaged/1573: [ 333.500380] 1 lock held by in:imklog/7793: [ 333.513962] #0: 000000000bbca5aa (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 [ 333.571999] 3 locks held by kworker/1:3/9232: [ 333.595551] #0: 000000000438775f ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 [ 333.623690] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' [ 333.660135] #1: 000000000103cea7 (key_gc_work){+.+.}, at: process_one_work+0x79c/0x1570 [ 333.672006] CPU: 1 PID: 19011 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 333.679913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.689276] Call Trace: [ 333.690091] #2: 00000000215f3d7f (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 [ 333.691877] dump_stack+0x1fc/0x2fe [ 333.691903] sysfs_warn_dup.cold+0x1c/0x2d [ 333.710557] sysfs_do_create_link_sd+0x116/0x130 [ 333.713934] 6 locks held by syz-executor.4/19011: [ 333.715428] sysfs_create_link+0x5f/0xc0 [ 333.715444] device_add+0x7d1/0x16d0 [ 333.715461] ? device_check_offline+0x280/0x280 [ 333.723361] [ 333.724793] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 333.724815] wiphy_register+0x1664/0x2130 [ 333.731432] ============================================= [ 333.731432] [ 333.734047] ? bm_init+0x612/0x950 [ 333.734066] ? wiphy_unregister+0xea0/0xea0 [ 333.735712] NMI backtrace for cpu 0 [ 333.740973] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 333.740987] ? __kmalloc+0x38e/0x3c0 [ 333.741000] ? ieee80211_cs_list_valid+0x199/0x280 [ 333.741020] ieee80211_register_hw+0x13a7/0x3410 [ 333.741043] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 333.741056] ? memset+0x20/0x40 [ 333.741069] ? __hrtimer_init+0xe9/0x1d0 [ 333.741082] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 333.741100] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 333.741133] ? hwsim_mcast_del_radio+0x230/0x230 [ 333.741146] ? __kmalloc_track_caller+0x389/0x3c0 [ 333.741159] ? hwsim_new_radio_nl+0x273/0x850 [ 333.741173] ? memcpy+0x35/0x50 [ 333.741190] hwsim_new_radio_nl+0x5c3/0x850 [ 333.741207] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 333.741230] ? nla_parse+0x1b2/0x290 [ 333.741252] genl_family_rcv_msg+0x642/0xc40 [ 333.741272] ? genl_rcv+0x40/0x40 [ 333.741285] ? genl_rcv_msg+0x12f/0x160 [ 333.741301] ? __mutex_add_waiter+0x160/0x160 [ 333.741329] ? __radix_tree_lookup+0x216/0x370 [ 333.741352] genl_rcv_msg+0xbf/0x160 [ 333.741369] netlink_rcv_skb+0x160/0x440 [ 333.741384] ? genl_family_rcv_msg+0xc40/0xc40 [ 333.741400] ? netlink_ack+0xae0/0xae0 [ 333.872698] ? genl_rcv+0x15/0x40 [ 333.876192] genl_rcv+0x24/0x40 [ 333.879491] netlink_unicast+0x4d5/0x690 [ 333.883560] ? netlink_sendskb+0x110/0x110 [ 333.887815] ? _copy_from_iter_full+0x229/0x7c0 [ 333.892485] ? __phys_addr_symbol+0x2c/0x70 [ 333.896809] ? __check_object_size+0x17b/0x3d1 [ 333.901398] netlink_sendmsg+0x6bb/0xc40 [ 333.905470] ? aa_af_perm+0x230/0x230 [ 333.909275] ? nlmsg_notify+0x1a0/0x1a0 [ 333.913251] ? kernel_recvmsg+0x220/0x220 [ 333.917428] ? nlmsg_notify+0x1a0/0x1a0 [ 333.921404] sock_sendmsg+0xc3/0x120 [ 333.925124] ___sys_sendmsg+0x7bb/0x8e0 [ 333.929117] ? __lock_acquire+0x6de/0x3ff0 [ 333.933351] ? copy_msghdr_from_user+0x440/0x440 [ 333.938125] ? __fget+0x32f/0x510 [ 333.941598] ? lock_downgrade+0x720/0x720 [ 333.945844] ? check_preemption_disabled+0x41/0x280 [ 333.950866] ? check_preemption_disabled+0x41/0x280 [ 333.955887] ? __fget+0x356/0x510 [ 333.959360] ? do_dup2+0x450/0x450 [ 333.962936] ? __fdget+0x1d0/0x230 [ 333.966487] __x64_sys_sendmsg+0x132/0x220 [ 333.970720] ? __sys_sendmsg+0x1b0/0x1b0 [ 333.974801] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 333.980167] ? trace_hardirqs_off_caller+0x6e/0x210 [ 333.985186] ? do_syscall_64+0x21/0x620 [ 333.989164] do_syscall_64+0xf9/0x620 [ 333.992974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.998164] RIP: 0033:0x45de59 [ 334.001356] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.020260] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 334.027983] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 334.035257] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 334.042539] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 334.049813] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 334.057079] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 334.064371] CPU: 0 PID: 1566 Comm: khungtaskd Not tainted 4.19.152-syzkaller #0 [ 334.071837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.081220] Call Trace: [ 334.083842] dump_stack+0x1fc/0x2fe [ 334.087490] nmi_cpu_backtrace.cold+0x63/0xa2 [ 334.092002] ? lapic_can_unplug_cpu.cold+0x39/0x39 [ 334.096945] nmi_trigger_cpumask_backtrace+0x1a6/0x1eb [ 334.102239] watchdog+0x991/0xe60 [ 334.105710] ? reset_hung_task_detector+0x30/0x30 [ 334.110565] kthread+0x33f/0x460 [ 334.113942] ? kthread_park+0x180/0x180 [ 334.117937] ret_from_fork+0x24/0x30 [ 334.123120] Sending NMI from CPU 0 to CPUs 1: [ 334.128546] NMI backtrace for cpu 1 [ 334.128553] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 4.19.152-syzkaller #0 [ 334.128559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.128563] Workqueue: bat_events batadv_tt_purge [ 334.128571] RIP: 0010:__local_bh_disable_ip+0x97/0x190 [ 334.128582] Code: fd 00 00 00 48 83 3d 57 54 b7 08 00 0f 84 c9 00 00 00 fa 66 0f 1f 44 00 00 65 01 1d 03 b4 c7 7e 65 8b 05 fc b3 c7 7e 48 31 d8 c4 ff 74 4c 48 c7 c0 48 7f f1 89 48 ba 00 00 00 00 00 fc ff df [ 334.128586] RSP: 0018:ffff8880b5a57c98 EFLAGS: 00000006 [ 334.128594] RAX: 0000000080000000 RBX: 0000000000000201 RCX: ffffffff87fc32cb [ 334.128599] RDX: dffffc0000000000 RSI: 0000000000000201 RDI: ffffffff87fc3033 [ 334.128605] RBP: 0000000000000282 R08: 0000000000000001 R09: 0000000000000324 [ 334.128610] R10: 0000000000000004 R11: 0000000000000000 R12: ffffffff87fc3033 [ 334.128615] R13: dffffc0000000000 R14: 0000000000000324 R15: ffff8880a483d000 [ 334.128621] FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 334.128626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 334.128631] CR2: 00007fe307ea7020 CR3: 00000000a11ab000 CR4: 00000000001406e0 [ 334.128637] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 334.128642] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 334.128645] Call Trace: [ 334.128649] _raw_spin_lock_bh+0x13/0x40 [ 334.128653] batadv_tt_purge+0x123/0xa00 [ 334.128657] process_one_work+0x864/0x1570 [ 334.128661] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 334.128665] worker_thread+0x64c/0x1130 [ 334.128669] ? process_one_work+0x1570/0x1570 [ 334.128672] kthread+0x33f/0x460 [ 334.128676] ? kthread_park+0x180/0x180 [ 334.128680] ret_from_fork+0x24/0x30 [ 334.303614] sysfs: cannot create duplicate filename '/class/ieee80211/M!Ü)vÑS´' 20:28:08 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3200, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000058008151e05b80ecdb4cb904044865160b00160002000f00740004140e001100024d2f03dc2976d153b4", 0x235}], 0x1}, 0x0) [ 334.312030] Kernel panic - not syncing: hung_task: blocked tasks [ 334.318203] CPU: 1 PID: 1566 Comm: khungtaskd Not tainted 4.19.152-syzkaller #0 [ 334.325652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.335098] Call Trace: [ 334.337704] dump_stack+0x1fc/0x2fe [ 334.341347] panic+0x26a/0x50e [ 334.344549] ? __warn_printk+0xf3/0xf3 [ 334.348446] ? lapic_can_unplug_cpu.cold+0x39/0x39 [ 334.353384] ? ___preempt_schedule+0x16/0x18 [ 334.357800] ? watchdog+0x991/0xe60 [ 334.361462] ? nmi_trigger_cpumask_backtrace+0x15e/0x1eb [ 334.367010] watchdog+0x9a2/0xe60 [ 334.370476] ? reset_hung_task_detector+0x30/0x30 [ 334.375323] kthread+0x33f/0x460 [ 334.378693] ? kthread_park+0x180/0x180 [ 334.382672] ret_from_fork+0x24/0x30 [ 334.386399] CPU: 0 PID: 19011 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 334.394319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.403676] Call Trace: [ 334.406274] dump_stack+0x1fc/0x2fe [ 334.409923] sysfs_warn_dup.cold+0x1c/0x2d [ 334.414161] sysfs_do_create_link_sd+0x116/0x130 [ 334.418937] sysfs_create_link+0x5f/0xc0 [ 334.423004] device_add+0x7d1/0x16d0 [ 334.426726] ? device_check_offline+0x280/0x280 [ 334.431408] ? ieee80211_set_bitrate_flags+0x132/0x580 [ 334.436707] wiphy_register+0x1664/0x2130 [ 334.440867] ? bm_init+0x612/0x950 [ 334.444409] ? wiphy_unregister+0xea0/0xea0 [ 334.448745] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 334.453760] ? __kmalloc+0x38e/0x3c0 [ 334.457473] ? ieee80211_cs_list_valid+0x199/0x280 [ 334.463373] ieee80211_register_hw+0x13a7/0x3410 [ 334.468141] ? ieee80211_alloc_hw_nm+0x1d40/0x1d40 [ 334.473073] ? memset+0x20/0x40 [ 334.476350] ? __hrtimer_init+0xe9/0x1d0 [ 334.480413] ? mac80211_hwsim_sta_notify+0x140/0x140 [ 334.485536] mac80211_hwsim_new_radio+0x1d3f/0x3c60 [ 334.490666] ? hwsim_mcast_del_radio+0x230/0x230 [ 334.495441] ? __kmalloc_track_caller+0x389/0x3c0 [ 334.500285] ? hwsim_new_radio_nl+0x273/0x850 [ 334.504788] ? memcpy+0x35/0x50 [ 334.508079] hwsim_new_radio_nl+0x5c3/0x850 [ 334.512407] ? mac80211_hwsim_new_radio+0x3c60/0x3c60 [ 334.517614] ? nla_parse+0x1b2/0x290 [ 334.521336] genl_family_rcv_msg+0x642/0xc40 [ 334.525750] ? genl_rcv+0x40/0x40 [ 334.529200] ? genl_rcv_msg+0x12f/0x160 [ 334.533176] ? __mutex_add_waiter+0x160/0x160 [ 334.537683] ? __radix_tree_lookup+0x216/0x370 [ 334.542278] genl_rcv_msg+0xbf/0x160 [ 334.545997] netlink_rcv_skb+0x160/0x440 [ 334.550079] ? genl_family_rcv_msg+0xc40/0xc40 [ 334.554665] ? netlink_ack+0xae0/0xae0 [ 334.558767] ? genl_rcv+0x15/0x40 [ 334.562232] genl_rcv+0x24/0x40 [ 334.565530] netlink_unicast+0x4d5/0x690 [ 334.569610] ? netlink_sendskb+0x110/0x110 [ 334.573848] ? _copy_from_iter_full+0x229/0x7c0 [ 334.578521] ? __phys_addr_symbol+0x2c/0x70 [ 334.582847] ? __check_object_size+0x17b/0x3d1 [ 334.587436] netlink_sendmsg+0x6bb/0xc40 [ 334.591501] ? aa_af_perm+0x230/0x230 [ 334.595302] ? nlmsg_notify+0x1a0/0x1a0 [ 334.599275] ? kernel_recvmsg+0x220/0x220 [ 334.603460] ? nlmsg_notify+0x1a0/0x1a0 [ 334.607533] sock_sendmsg+0xc3/0x120 [ 334.611249] ___sys_sendmsg+0x7bb/0x8e0 [ 334.615228] ? __lock_acquire+0x6de/0x3ff0 [ 334.619481] ? copy_msghdr_from_user+0x440/0x440 [ 334.624246] ? __fget+0x32f/0x510 [ 334.627715] ? lock_downgrade+0x720/0x720 [ 334.631863] ? check_preemption_disabled+0x41/0x280 [ 334.636885] ? check_preemption_disabled+0x41/0x280 [ 334.641927] ? __fget+0x356/0x510 [ 334.645382] ? do_dup2+0x450/0x450 [ 334.648928] ? __fdget+0x1d0/0x230 [ 334.652498] __x64_sys_sendmsg+0x132/0x220 [ 334.656732] ? __sys_sendmsg+0x1b0/0x1b0 [ 334.661335] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 334.666705] ? trace_hardirqs_off_caller+0x6e/0x210 [ 334.671732] ? do_syscall_64+0x21/0x620 [ 334.675728] do_syscall_64+0xf9/0x620 [ 334.679536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.684745] RIP: 0033:0x45de59 [ 334.687943] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.706866] RSP: 002b:00007f14740dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 334.714590] RAX: ffffffffffffffda RBX: 000000000002e400 RCX: 000000000045de59 [ 334.721858] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 334.729126] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 334.736395] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 334.743662] R13: 00007ffd1e5faf1f R14: 00007f14740df9c0 R15: 000000000118bf2c [ 334.751434] Kernel Offset: disabled [ 334.755073] Rebooting in 86400 seconds..