, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000240)=0x7, 0x4) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) accept4$packet(r5, 0x0, &(0x7f00000001c0), 0x80800) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x1c, r2, 0x711, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x45}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4091}, 0x4048045) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) [ 1027.176467][T26149] encrypted_key: insufficient parameters specified [ 1027.308543][T26159] overlayfs: failed to resolve './file0cb G߁ nO}%7= Ӵ#oT{B9v ^L-ֶOv!CX; cp98Z+#zdea1': -2 [ 1027.388090][ T27] audit: type=1804 audit(1583115395.599:294): pid=26157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1095/bus/file0" dev="sda1" ino=16737 res=1 [ 1027.395836][T26149] encrypted_key: insufficient parameters specified [ 1027.425783][T26158] tipc: Failed to obtain node identity [ 1027.441535][T26158] tipc: Enabling of bearer rejected, failed to enable media 02:16:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$KVM_SMI(r0, 0xaeb7) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r2, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) [ 1027.535139][T26162] overlayfs: failed to resolve './file0cb G߁ nO}%7= Ӵ#oT{B9v ^L-ֶOv!CX; cp98Z+#zdea1': -2 02:16:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x7e, 0x400, 0x0, r0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r2}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r2}, 0x38) [ 1027.613967][ T27] audit: type=1804 audit(1583115395.829:295): pid=26157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1095/bus/bus/file0" dev="sda1" ino=16802 res=1 02:16:35 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005444e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000700060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757749c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b9816424708c5194b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x308c014, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:36 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', &(0x7f00000002c0)={0x7d, 0x100, "66bcdc29f53650af655659d5fe756fdd1776dcf003c6fdb84725fceee4df1633bc586eeaa8d28ae0270f4c911b1c40b899bf22aeb6ce8290f76fb170df14a4997ba1457900ab8c73efc1ee33607c647771de60ef7125b771956e041d9f93ff730ed7fee5b2e65151dddef4f9ee1eb5387605ccb498"}, &(0x7f0000000340), 0x600) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x3}}, 0x20) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000100)) chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, 0x0) [ 1027.958058][T26226] overlayfs: unrecognized mount option "lowdir=.bus" or missing value [ 1027.978646][T26175] encrypted_key: insufficient parameters specified [ 1028.033060][ T27] audit: type=1400 audit(1583115396.249:296): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=26210 comm="syz-executor.4" [ 1028.095165][ T27] audit: type=1804 audit(1583115396.259:297): pid=26226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1096/bus/file0" dev="sda1" ino=16850 res=1 02:16:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$KVM_SMI(r0, 0xaeb7) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r2, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:16:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000001c0)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000}, 0x38) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6}, 0x38) [ 1028.225263][T26282] encrypted_key: insufficient parameters specified 02:16:36 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6c6f776572faa3723d2e2f6275732c776f726b6469723d2e2f66836c65312c75707065726469723d2e2f66696c6530204f6522ca242336e59afea4f9a20e3e"]) rmdir(&(0x7f0000000000)='./file0\x00') chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x18) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1028.363666][ T27] audit: type=1400 audit(1583115396.579:298): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=26287 comm="syz-executor.2" [ 1028.405713][T26289] tipc: Failed to obtain node identity [ 1028.420780][T26289] tipc: Enabling of bearer rejected, failed to enable media [ 1028.511940][T26295] overlayfs: unrecognized mount option "lowerr=./bus" or missing value 02:16:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x402000, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000080)) r2 = socket(0x40000000015, 0xa, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000440)) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000003300)='/proc/capi/capi20\x00', 0x200200, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x801, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r6 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8000000, 0x0) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000180)={0x2, @sdr}) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000003380)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000003480)=0xe8) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000034c0)={@dev={0xac, 0x14, 0x14, 0x1c}, @local, r7}, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) recvfrom$packet(r2, &(0x7f0000000640)=""/4096, 0x1000, 0x80, &(0x7f0000000140)={0x11, 0x16, r8, 0x1, 0x7f, 0x6, @random="e1f9caf4f9e2"}, 0x14) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) socket(0x40000000015, 0x5, 0x0) 02:16:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1b8b77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a44f0b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fde"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000040)='./bus\x00', &(0x7f0000001440)='security.evm\x00', &(0x7f0000001480)=@ng={0x4, 0x2, "bd9e875a162f4f119a68f4e78a5e98b97bda2ce1"}, 0x16, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000013c0)=ANY=[@ANYBLOB="9feb0100180000000000000035000a00350000000a000000000000000200000d0000000002000000030000000f000000030400000e00000000000008050000000b001e000000000f01000000c3000000005f5f0030614f300000"], &(0x7f00000003c0)=""/4080, 0x5a, 0xff0}, 0x20) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c653063a962f90b9d1fa0cd47df810d6e4fd97d25373d92c509d3b4f2ade3236f06547f1fb17bc3428fe539a09a760cfdbf5ef71baf4c12e0c3102dd6b64fec7621eaec435894fc5cc63b0c849917c663f6f97039385a2b237a6465f661315c06"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1028.572110][T26297] overlayfs: unrecognized mount option "lowerr=./bus" or missing value 02:16:36 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./bus\x00') mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='loweydir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:16:37 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000700)='./file1\x00', 0x682342, 0x40) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer\x00', 0x109202, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1029.023335][ T27] audit: type=1804 audit(1583115397.239:299): pid=26318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1098/bus/file0" dev="sda1" ino=16948 res=1 [ 1029.134680][T26309] encrypted_key: insufficient parameters specified [ 1029.163735][T26303] overlayfs: failed to resolve './file0cb G߁ nO}%7= Ӵ#oT{B9v ^L-ֶOv!CX; cp98Z+#zdea1': -2 02:16:37 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x58) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:16:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={&(0x7f0000000640)="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", 0x0, &(0x7f00000002c0)="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", &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:16:37 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r8 = socket(0x10, 0x808, 0x8) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r9 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20000, 0x0) r10 = socket(0x100000000011, 0x2, 0x0) bind(r10, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$sock(r10, &(0x7f0000001400)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18, 0x1, 0x24}}], 0x18}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(r12) splice(r11, 0x0, r12, 0x0, 0x4ffe0, 0x0) r13 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r13, 0x29, 0x2d, &(0x7f00000004c0)={0xff, {{0xa, 0x4e20, 0x469, @mcast1, 0xfffffea6}}}, 0x88) setsockopt$inet6_int(r13, 0x29, 0x8, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) getsockopt$inet6_buf(r13, 0x29, 0x6, 0x0, &(0x7f0000000000)) r14 = accept4(r13, &(0x7f0000000140)=@caif=@util, &(0x7f0000000000)=0x80, 0x40800) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r16 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r15, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="1af534bd708ce233aaeff25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b62d2e25f348b729db5ccf8a8c771329c6867a9e6d3616c829a9eb1c09f", @ANYRES16=r16, @ANYBLOB="02002bbd7000ffdbdf250200000c080002"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r14, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x238, r16, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4c}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0xd4}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe4}]}, 0x238}, 0x1, 0x0, 0x0, 0x40040}, 0x2004c010) sendmsg$NLBL_CIPSOV4_C_ADD(r11, &(0x7f0000007bc0)={&(0x7f00000079c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB="44010000", @ANYRES16=r16, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r10, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f00000009c0)=ANY=[@ANYBLOB="90010000", @ANYRES16=r16, @ANYBLOB="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"/528], 0x190}, 0x1, 0x0, 0x0, 0x80}, 0xc000800) sendmsg$NLBL_CIPSOV4_C_LISTALL(r9, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="c6000065", @ANYRES16=r16, @ANYBLOB="000329bd7000fcdbdf2504000000540004800500030005000000050003000500000005000300060000000500030006000000050003000600000005000300000000000500030002000000050003000600000005000300060000000500030000000000"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x84, r16, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x3}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x3e720d54a1fe38b2}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r7, &(0x7f00000001c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xac, r16, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x98, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc8da}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2c599ad4}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9215}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3edf82a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x795c3058}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f3ffb15}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5eed}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc60bc06}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3eaa}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc10e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x696fc144}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf95}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1437}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6224f3ed}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d02d6f1}]}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x40}, 0x8040004) sendmsg$NLBL_CIPSOV4_C_LIST(r6, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x11c, r16, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0xac, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x59e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7fff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x35aad70e}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6729}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa540ce4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x342e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77e3e7a7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe1e0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb087}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc6a7}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5396f1f0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3438e9b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x20484239}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2eb3a80e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcf64}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed98}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f1243c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd0c9}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x44, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf3d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x494f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd262}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc984}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc025}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x261f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59adeab3}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x11c}, 0x1, 0x0, 0x0, 0x95}, 0x4000000) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r16, 0x100, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4065}, 0x20004040) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x1b4, r16, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x12c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dc258b8}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6947ee1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e67dae0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x277e2847}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x84bb1a8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d0cd645}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3eff4ecf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x138aae2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4e17}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f314486}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x72ccbaa3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x44bb9cd5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x935c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x23c003cc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x346d2fd7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x56e9b96e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d56aaed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x50a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xac9c}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x271e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d40ff6e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5d99cc24}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xeb6980e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab3e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30dd8b0d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b52e92}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x256aa888}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x87ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd44e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7448f86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa8d6}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5a5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ff}]}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x810001}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x24c, r16, 0x300, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_TAGLST={0x54, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x164, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ab22dfc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x13de9f3d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x28afaff8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b31c3b5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x71e79036}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cc6cbd7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6c8ecf2d}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11aa0d00}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x72e5b2be}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x78}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5ac2b628}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x27}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45366cf6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x76f9cb90}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2597aa41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1f31db4c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49f89a1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f2fb963}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c978ef9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d295a90}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cea0ce5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x91bd67c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x125ac1e7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ae129ca}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x243593e2}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa29c3be}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0x14}, 0x8000) [ 1029.388243][T26309] encrypted_key: insufficient parameters specified 02:16:37 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0x6, 0x8) [ 1029.582183][T26425] device lo entered promiscuous mode 02:16:37 executing program 2: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockname$l2tp6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x20) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000040)='\x00', 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@loopback, 0xa49, 0x1, 0x0, 0x9}, 0x20) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x1, 0x0) [ 1029.653335][T26426] overlayfs: './file0' not a directory [ 1029.707071][ T27] audit: type=1804 audit(1583115397.919:300): pid=26424 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1099/bus/bus/file0" dev="overlay" ino=16611 res=1 02:16:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x1, 0x80, 0x400}, 0x40) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000040)) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r1, 0x0, 0x8001) ioctl$RTC_AIE_OFF(r1, 0x7002) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) 02:16:38 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="fa055abcc59baebc396092c00201d6e52817ddb93f61ead662021aae1b1883c1f434381cb9cc0b", 0x27, 0x0) keyctl$get_persistent(0x16, r2, r3) [ 1029.982715][T26467] encrypted_key: insufficient parameters specified [ 1030.069004][ T27] audit: type=1400 audit(1583115398.289:301): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=26628 comm="syz-executor.5" 02:16:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x34, r0, 0xe11, 0x0, 0x80000001, {{}, {}, {0x18, 0x17, {0x3, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x0) [ 1030.195423][T26492] encrypted_key: insufficient parameters specified [ 1030.330454][T26646] overlayfs: './file0' not a directory 02:16:38 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x200}, 0x4) r1 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000000c0)={0xb, 0x6, 0xffffffff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1010, r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) 02:16:38 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x28, 0xa, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1030.385243][ T27] audit: type=1804 audit(1583115398.599:302): pid=26645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1100/bus/bus/file0" dev="overlay" ino=16723 res=1 [ 1030.440571][T26653] tipc: Enabling of bearer rejected, failed to enable media 02:16:38 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000040)='overlay\x00', 0x1008080, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:16:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x3, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x4c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x5]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x800) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="2948dad357a03e8ab31e6f18c89fd8eea3711a3c89aa18df28002a095039c15ea94cea996e02070dc664647c4737686a83199534c95f58ae3704cbfef1e3d7d305093829f8a44e6d", @ANYRES16=r4, @ANYBLOB="000128bd7000fbdbdf251f0000000400cc000800010000000000"], 0x20}, 0x1, 0x0, 0x0, 0x24000080}, 0x24000044) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="0100000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, r6, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "572c9ea3fd7e6515b1efef38e4"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x1}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "8fea701a17"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7d55f0796e985707218d780875"}, @NL80211_ATTR_KEY={0x8, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "f10eef7639"}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x2) [ 1030.556322][ T27] audit: type=1400 audit(1583115398.769:303): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=26655 comm="syz-executor.1" 02:16:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x28, &(0x7f0000000140)}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000200)="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", 0x0, &(0x7f0000000040)="f3e7a87c86c57f1f664ab370d653f672571789bab2034709a28cd33cae4481d8f4781d2b8a0a6aa152e99cd8c7c5b8f387a9651ca75276f791262bf29345db3ae68d0d217c8d2cb827b780b507235be224a36a957553ea69a3f2710783341590f0bc3857d594d9f89d2db0998285e38214c34b1e6ca752e12aa757b58ffcaea908a3cd1bb1f1a32e58f726d3", &(0x7f00000014c0), 0xffffffc0, r0, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:16:39 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) r1 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f00000001c0)={@empty, @empty, 0x0}, &(0x7f0000000200)=0xc) recvfrom$packet(r4, &(0x7f0000000300)=""/4096, 0x1000, 0x40000040, &(0x7f0000000240)={0x11, 0x16, r6, 0x1, 0x6, 0x6, @broadcast}, 0x14) [ 1030.749100][T26762] tipc: Failed to obtain node identity [ 1030.775302][T26762] tipc: Enabling of bearer rejected, failed to enable media 02:16:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x3211c0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x58, 0x3, 0x1, 0x401, 0x0, 0x0, {0x1}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x2}, @CTA_NAT_DST={0x34, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast2}, @CTA_NAT_V6_MINIP={0x14, 0x4, @ipv4={[], [], @local}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @empty}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x5c}]}, 0x58}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 02:16:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x3, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x4c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x5]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x800) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="2948dad357a03e8ab31e6f18c89fd8eea3711a3c89aa18df28002a095039c15ea94cea996e02070dc664647c4737686a83199534c95f58ae3704cbfef1e3d7d305093829f8a44e6d", @ANYRES16=r4, @ANYBLOB="000128bd7000fbdbdf251f0000000400cc000800010000000000"], 0x20}, 0x1, 0x0, 0x0, 0x24000080}, 0x24000044) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="0100000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, r6, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "572c9ea3fd7e6515b1efef38e4"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x1}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "8fea701a17"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7d55f0796e985707218d780875"}, @NL80211_ATTR_KEY={0x8, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "f10eef7639"}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x2) 02:16:39 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000040), 0x4) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x7fd, 0x1}, 0x20) [ 1031.107596][T26977] tipc: Failed to obtain node identity [ 1031.129081][T26977] tipc: Enabling of bearer rejected, failed to enable media 02:16:39 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x6964, @loopback, 0xfffffff7}, {0xa, 0x4e22, 0x3, @loopback, 0x54}, 0x8, [0xc4e6, 0x7, 0x401, 0x800, 0x9, 0x10001, 0x1f, 0x108]}, 0x5c) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) 02:16:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x3, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x4c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x5]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x800) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="2948dad357a03e8ab31e6f18c89fd8eea3711a3c89aa18df28002a095039c15ea94cea996e02070dc664647c4737686a83199534c95f58ae3704cbfef1e3d7d305093829f8a44e6d", @ANYRES16=r4, @ANYBLOB="000128bd7000fbdbdf251f0000000400cc000800010000000000"], 0x20}, 0x1, 0x0, 0x0, 0x24000080}, 0x24000044) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="0100000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, r6, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "572c9ea3fd7e6515b1efef38e4"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x1}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "8fea701a17"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7d55f0796e985707218d780875"}, @NL80211_ATTR_KEY={0x8, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "f10eef7639"}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x2) [ 1031.376373][T27187] encrypted_key: insufficient parameters specified 02:16:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x80000, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) dup(r2) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f00000001c0)) [ 1031.529127][T27195] tipc: Failed to obtain node identity [ 1031.606046][T27195] tipc: Enabling of bearer rejected, failed to enable media [ 1031.711396][T27322] encrypted_key: insufficient parameters specified 02:16:40 executing program 2: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd10008000940000000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d8462155e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132783105e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec2325c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000070b54da495f57575facb9ede8f21cff9ea8237501bfedc96dce55e45c31162bf387aa73b4be8b4e9ac7105e4b6027e6feab1cf273c1c5992e93cec95de219b87b3e7c6489678f0691db621c60fc3cba3387f3838f9a6a64036b9efc8ac71cafd8447764724571be4ee21578cfcf6fe9fd42e32a31e6001f3854845f0d08fb5db6aba48100637d6761ba9f11b80f806b90ee474bf20f01ce89e588137513c07a28af00"/813], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:40 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"/649], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:40 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r5, 0x0, 0x8001) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f0000000100)=""/181) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4400, 0x0) ioctl$CAPI_NCCI_GETUNIT(r6, 0x80044327, &(0x7f00000001c0)=0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) [ 1032.272897][T27421] encrypted_key: insufficient parameters specified 02:16:40 executing program 2: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd10008000940000000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d8462155e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132783105e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec2325c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000070b54da495f57575facb9ede8f21cff9ea8237501bfedc96dce55e45c31162bf387aa73b4be8b4e9ac7105e4b6027e6feab1cf273c1c5992e93cec95de219b87b3e7c6489678f0691db621c60fc3cba3387f3838f9a6a64036b9efc8ac71cafd8447764724571be4ee21578cfcf6fe9fd42e32a31e6001f3854845f0d08fb5db6aba48100637d6761ba9f11b80f806b90ee474bf20f01ce89e588137513c07a28af00"/813], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x8000}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000000c0)={&(0x7f0000000040)="ac92bf2c078ee678dd7196cbe4150bd827595e0685bbf6d47682", &(0x7f0000000080)=""/22, &(0x7f00000001c0)="d63ccf17c6e8fa692e2742336269eadc91ab6a988c141355f9aa42e867b28904b6d6ccca445186e3abf3e7805208a2cf01d1aca2ebc7863c5ec1506b7307c97cca3a3e688a97f80673ce866df7a99154f0ac8f747db6f6a03bcc0f337f71b07e09b3a9cf14039472f43ddd63ea", &(0x7f0000000240)="6bca232d3423e5f9b72d13a95a6558f9dee43187091fdd5667f3b673c58af3cc12e1283a6f36c0bdef947f65a23ab97dbdbd22bd6d6fd92d87e88e1041577a5035d64794d15d78e6ab55d1a9de0632f9e9dda6dd9b2e55ba2cf99c79d17ca22e97330d383610b816152a001650f2816c6d620309622a74d3036a6c4694c8c845606f66166e0c214f3bfe2696654ca7039712f636f6493a2dcc488089d398bd59190250d9e3823b9f8f9db41cf72a32c53121fff53f73e063d7ef645e11abba6d4075b4316dea5c6b96090cd01ca91acc3b72a578f74f221ba79b83f3059d1cd3656d34", 0x1ff, r1, 0x4}, 0x38) syslog(0x3, 0x0, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e22, @remote}, 0x81) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000140)={@any, 0x8}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)="b5715b2a", 0x0, 0x6, r0}, 0x38) [ 1032.442068][T27421] encrypted_key: insufficient parameters specified [ 1032.552955][ T27] audit: type=1400 audit(1583115400.769:304): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=27629 comm="syz-executor.5" 02:16:40 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/144, 0x90) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1c) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:40 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b646972b2de83ab8a8021512c75707065726469723d2e2f66696c6530d40d8fc31cb20fa666455bd641005299120e6f6dd42e18f3762a1bd01138b74e140c0b507f0611cf331678e3cf700191ecdb8d6ccbc7f3c2abcaa759f4d9b65ad77bc54207ed2e29db43e048d48affefd9bc2f86aa787c05662323ae03b4"]) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) inotify_add_watch(r1, &(0x7f0000000100)='./bus\x00', 0x2000008) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x50, r3, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x3, 0x3}}, @NL80211_ATTR_STA_FLAGS={0x28, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_ASSOCIATED={0x4}, @NL80211_STA_FLAG_WME={0x4}, @NL80211_STA_FLAG_WME={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_WME={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_AUTHORIZED={0x4}]}, @NL80211_ATTR_REASON_CODE={0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x5000}, 0x40000) ioctl$RTC_WIE_ON(r0, 0x700f) [ 1032.766958][T27628] encrypted_key: insufficient parameters specified 02:16:41 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0xfa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r6, &(0x7f0000000300)={0x2, 0x4e24, @multicast2}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$SIOCPNENABLEPIPE(r4, 0x89ed, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1, 0x0, 0x0, 0xfffd}, 0x20) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f0000000040)) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r9 = dup3(r8, 0xffffffffffffffff, 0x80000) shutdown(r9, 0x1) [ 1032.807387][T27636] encrypted_key: insufficient parameters specified 02:16:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000140)={0x980000, 0x3, 0x7, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x99096e, 0x10000, [], @p_u16=&(0x7f0000000080)=0xaa}}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x42) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r4, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x34, 0xf, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000780)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000340)=0xfffffffffffffdc5) r7 = socket(0x40000000015, 0x5, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$PNPIPE_IFINDEX(r7, 0x113, 0x2, &(0x7f0000005ec0)=0x0, &(0x7f0000005f00)=0x4) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000006000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000005fc0)={&(0x7f0000000200)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000328bd7000fbdbdf25310000000c0099001287ffffffffffff08000100000000000c00990000020000030000000800db00", @ANYRES32=r2, @ANYBLOB="0c009900354a777f0000000008000100010000000800db00", @ANYRES32=r3, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="080003002279997c349823e93214c6bcff991e7549b7a97d0b5a46e658499e44ba75a1749449195d25cd2bde7843b9", @ANYRES32=r8, @ANYBLOB], 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 1032.952512][T27640] overlayfs: unrecognized mount option "workdirރ!Q" or missing value 02:16:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0, @ANYRES16=r1, @ANYBLOB="110e0000fedbdf250100000000000000014100000020001700000000000000006574683a6261746164765f736c6176655f300000"], 0x3}}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) rt_sigaction(0xc, &(0x7f0000000300)={&(0x7f0000000240)="c46230f58c0e0b0000006545dd52fd66450f3809823ca9bc99f20faef43e410fed0410c4e3495dbeed41bba74c66420fdeff66400f3a414cd250008f29e89b6f04450f1a8600100000", 0x4, &(0x7f0000000100)="c403b16d0907c441e571e60045f73640c8000000c4e245b89fbb1c0000af26f30f01de650fe2511e363e460f5dc3c12a00", {[0xffffffffffffff5d]}}, 0x0, 0x8, &(0x7f0000000340)) r4 = dup3(r0, r3, 0x0) socket$kcm(0x29, 0x6, 0x0) recvfrom$x25(r4, &(0x7f00000000c0)=""/32, 0x20, 0x0, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000040)={0x50000001}) 02:16:41 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) [ 1033.052922][ T27] audit: type=1804 audit(1583115401.269:305): pid=27640 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1102/bus/file0" dev="sda1" ino=16914 res=1 02:16:41 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4a041) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r3 = syz_open_dev$vcsu(&(0x7f0000000440)='/dev/vcsu#\x00', 0x8000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000480)=0x72ef) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b000d2ab", @ANYRES16=r2, @ANYBLOB="00082dbd7000ffdbdf250b000000540003801400060000000000000000000000000000000001060007004e210000080001000000000014000600fe80000000000000000000000000000f0600040003000000060007004e2400000500080080000000080006000100000008000400ffffffff3800038014000600ff020000000000000000000000000001080001000100000008000500e00000010800010000000000060004009b000000"], 0xb0}, 0x1, 0x0, 0x0, 0x40000}, 0x10) [ 1033.282620][ T27] audit: type=1400 audit(1583115401.499:306): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=27749 comm="syz-executor.1" [ 1033.285941][T27634] encrypted_key: insufficient parameters specified 02:16:41 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40305828, 0x0) 02:16:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x20, &(0x7f00000001c0)="e1a9a8da00d6e3b5e74b1cd5ffd8d505d3d46ee22b09ae1b3454ab5e623b296165186b1129c1d8dea6a10ce1959bb61c9452a4372d698f0477c0c3398f4d737b9177f40411f332f17610b6097f6d950661bbd568643fba567c41244d4e556e4ede93e2a4ae0b2035d4399cab92ea67b412d701bf40e180bd4f6738627890bdcca921d0bb7e680ae3cf1dbf28920453592b2b683ec669f6", 0x97) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x1, 0x8, 0x4, 0x0, 0x8, {r2, r3/1000+10000}, {0x4, 0x8, 0xc8, 0x40, 0x0, 0x2, "f4a67474"}, 0x8, 0x3, @offset=0x87d, 0x1c0c, 0x0, 0xffffffffffffffff}) ioctl$SNDCTL_DSP_GETISPACE(r4, 0x8010500d, &(0x7f0000000140)) 02:16:41 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYRESOCT=r2], 0x1}}, 0x4044) perf_event_open(&(0x7f00000004c0)={0x1, 0xfffffffffffffe1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r4 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r5 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r5, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r7) keyctl$chown(0x4, r6, r7, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:41 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x1}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000040)=',bdevmime_type\x00', 0x0, r2) [ 1033.682319][ T27] audit: type=1804 audit(1583115401.899:307): pid=27873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1103/bus/file0" dev="sda1" ino=16875 res=1 [ 1033.748406][T27874] encrypted_key: insufficient parameters specified [ 1033.786291][ T27] audit: type=1400 audit(1583115401.959:308): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=27871 comm="syz-executor.1" 02:16:42 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r3 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) [ 1033.890199][T27874] encrypted_key: insufficient parameters specified [ 1033.894001][T27873] overlayfs: './file0' not a directory 02:16:42 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40305828, 0x0) 02:16:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f0000000040), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:16:42 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a00110001c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed34992bbeedcd163466089fd7e1816751caae139c11c835f294e695d3fb779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0x1}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:42 executing program 4: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:16:42 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) [ 1034.410694][T28196] overlayfs: failed to resolve './file1': -2 [ 1034.430804][ T27] audit: type=1804 audit(1583115402.649:309): pid=28199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1104/bus/file0" dev="sda1" ino=16705 res=1 [ 1034.481952][T28190] encrypted_key: insufficient parameters specified [ 1034.506137][T28199] overlayfs: './file0' not a directory 02:16:42 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c582f, 0x0) 02:16:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000040)={0x3, 0x5, 0x3}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=ir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, 0x0) 02:16:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x1, 0x81, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) ioctl$USBDEVFS_RELEASEINTERFACE(r2, 0x80045510, &(0x7f00000000c0)=0x1) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x401}) 02:16:43 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L+', 0x5}, 0x16, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000180)={'veth1_vlan\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}}) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000001c0), &(0x7f0000000200)=0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0xa00000, 0x2b8, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0xa00902, 0xffff0001, [], @string=&(0x7f0000000040)=0x1f}}) ioctl$TCSETSF2(r4, 0x402c542d, &(0x7f0000000140)={0xffff0000, 0x5, 0x1, 0x7, 0x1, "be08f3ec55e2e5ff299d5b66e3a845989ec1ea", 0x4000}) [ 1034.962962][ T27] audit: type=1400 audit(1583115403.179:310): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=28309 comm="syz-executor.4" [ 1035.007244][T28186] encrypted_key: insufficient parameters specified [ 1035.022755][T28313] overlayfs: option "workdir=ir=./file0" is useless in a non-upper mount, ignore [ 1035.035648][ T27] audit: type=1400 audit(1583115403.199:311): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=28310 comm="syz-executor.5" [ 1035.086778][T28313] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 1035.112071][ T27] audit: type=1400 audit(1583115403.249:312): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=28310 comm="syz-executor.5" 02:16:43 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = gettid() r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10c00, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f00000000c0), 0xa}, 0x2000, 0x80000000, 0x5, 0x9, 0x81, 0x10000, 0x8}, r2, 0x7, r3, 0x0) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r1, 0x0, 0x8001) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) write$capi20(r5, &(0x7f0000000080)={0x10, 0x3, 0x3, 0x82, 0x9c6, 0x8}, 0x10) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000040)) 02:16:43 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0xf02d, 0x1, 0x3, 0x3, 0x1}, 0x20) [ 1035.213769][ T27] audit: type=1804 audit(1583115403.349:313): pid=28359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1105/bus/file0" dev="sda1" ino=16883 res=1 02:16:43 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0xc1) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:16:43 executing program 2 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1035.405606][ T27] audit: type=1804 audit(1583115403.399:314): pid=28359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1105/bus/bus/file0" dev="sda1" ino=16546 res=1 [ 1035.566870][T28426] encrypted_key: insufficient parameters specified [ 1035.663136][T28522] FAULT_INJECTION: forcing a failure. [ 1035.663136][T28522] name failslab, interval 1, probability 0, space 0, times 0 [ 1035.723266][T28522] CPU: 1 PID: 28522 Comm: syz-executor.2 Not tainted 5.6.0-rc3-syzkaller #0 [ 1035.732003][T28522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1035.742113][T28522] Call Trace: [ 1035.745437][T28522] dump_stack+0x197/0x210 [ 1035.749837][T28522] should_fail.cold+0x5/0xd [ 1035.754385][T28522] ? fault_create_debugfs_attr+0x140/0x140 [ 1035.760352][T28522] ? ___might_sleep+0x163/0x2c0 [ 1035.766247][T28522] __should_failslab+0xb7/0x100 [ 1035.771146][T28522] should_failslab+0x9/0x14 [ 1035.775675][T28522] __kmalloc+0x2e0/0x770 [ 1035.779966][T28522] ? __kasan_check_read+0x11/0x20 [ 1035.785088][T28522] ? rw_copy_check_uvector+0x31a/0x390 [ 1035.790601][T28522] rw_copy_check_uvector+0x31a/0x390 [ 1035.796256][T28522] ? __lock_acquire+0x8a0/0x4a00 [ 1035.801239][T28522] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1035.806991][T28522] ? kstrtouint+0x142/0x1a0 [ 1035.808754][T28540] overlayfs: './file0' not a directory [ 1035.811578][T28522] import_iovec+0xc9/0x410 [ 1035.811602][T28522] ? dup_iter+0x260/0x260 [ 1035.825796][T28522] ? __fget_files+0x337/0x520 [ 1035.830517][T28522] vfs_readv+0xc6/0x160 [ 1035.834687][T28522] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 1035.840793][T28522] ? __kasan_check_read+0x11/0x20 [ 1035.845853][T28522] ? __fget_files+0x359/0x520 [ 1035.850696][T28522] ? ksys_dup3+0x3e0/0x3e0 [ 1035.855234][T28522] ? wait_for_completion+0x440/0x440 [ 1035.860658][T28522] ? __fget_light+0x1ad/0x270 [ 1035.865373][T28522] do_preadv+0x1c4/0x280 [ 1035.869652][T28522] ? do_readv+0x330/0x330 [ 1035.874010][T28522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1035.879529][T28522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1035.879741][T28426] encrypted_key: insufficient parameters specified [ 1035.885010][T28522] ? do_syscall_64+0x26/0x790 [ 1035.885027][T28522] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1035.885040][T28522] ? do_syscall_64+0x26/0x790 [ 1035.885063][T28522] __x64_sys_preadv+0x9a/0xf0 [ 1035.885085][T28522] do_syscall_64+0xfa/0x790 [ 1035.916212][T28522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1035.922122][T28522] RIP: 0033:0x45c479 [ 1035.926046][T28522] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1035.945887][T28522] RSP: 002b:00007facc6507c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1035.954331][T28522] RAX: ffffffffffffffda RBX: 00007facc65086d4 RCX: 000000000045c479 [ 1035.962892][T28522] RDX: 00000000000002a2 RSI: 00000000200017c0 RDI: 0000000000000006 02:16:44 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x26) mkdir(&(0x7f0000000000)='./file1\x00', 0x11c) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000180)='./bus/file0\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1035.970890][T28522] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1035.979014][T28522] R10: 0000000000800000 R11: 0000000000000246 R12: 0000000000000007 [ 1035.987013][T28522] R13: 0000000000000857 R14: 00000000004cad8a R15: 0000000000000000 02:16:44 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@rand_addr="e155f9022d7b87000000000500", 0x800, 0x1}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r4 = accept(r3, &(0x7f0000000100), &(0x7f0000000080)=0x80) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r4, 0x10f, 0x84, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 02:16:44 executing program 2 (fault-call:5 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x1, 0x80, 0x400}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) prctl$PR_GET_TIMERSLACK(0x1e) 02:16:44 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() tkill(r2, 0x26) ptrace(0x10, r2) r3 = getpid() tkill(r3, 0x26) ptrace(0x10, r3) r4 = syz_open_procfs(r3, &(0x7f00000006c0)='syscall\x00') r5 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r6 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) r7 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r7, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r6, 0x5c, 0x3, r7) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r8) keyctl$chown(0x4, r7, r8, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r9, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r10, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1036.257809][T28631] FAULT_INJECTION: forcing a failure. [ 1036.257809][T28631] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1036.271080][T28631] CPU: 1 PID: 28631 Comm: syz-executor.2 Not tainted 5.6.0-rc3-syzkaller #0 [ 1036.279761][T28631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.289829][T28631] Call Trace: [ 1036.293180][T28631] dump_stack+0x197/0x210 [ 1036.297554][T28631] should_fail.cold+0x5/0xd [ 1036.302681][T28631] ? fault_create_debugfs_attr+0x140/0x140 [ 1036.308743][T28631] ? __kasan_check_read+0x11/0x20 [ 1036.313806][T28631] ? __lock_acquire+0x16f2/0x4a00 [ 1036.318852][T28631] ? mark_lock+0xc2/0x1220 [ 1036.323389][T28631] should_fail_alloc_page+0x50/0x60 [ 1036.328796][T28631] __alloc_pages_nodemask+0x1a1/0x910 [ 1036.334219][T28631] ? fs_reclaim_release+0xf/0x30 [ 1036.339281][T28631] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1036.345142][T28631] ? fs_reclaim_release+0xf/0x30 [ 1036.350247][T28631] cache_grow_begin+0x90/0xc60 [ 1036.355130][T28631] ? trace_hardirqs_off+0x62/0x240 [ 1036.360369][T28631] __kmalloc+0x6b2/0x770 [ 1036.365146][T28631] ? rw_copy_check_uvector+0x31a/0x390 [ 1036.371037][T28631] rw_copy_check_uvector+0x31a/0x390 [ 1036.376448][T28631] ? __lock_acquire+0x8a0/0x4a00 [ 1036.381506][T28631] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1036.387689][T28631] ? kstrtouint+0x142/0x1a0 [ 1036.392408][T28631] import_iovec+0xc9/0x410 [ 1036.397219][T28631] ? dup_iter+0x260/0x260 [ 1036.401694][T28631] ? __fget_files+0x337/0x520 [ 1036.406419][T28631] vfs_readv+0xc6/0x160 [ 1036.410614][T28631] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 1036.417444][T28631] ? __kasan_check_read+0x11/0x20 [ 1036.422507][T28631] ? __fget_files+0x359/0x520 [ 1036.427245][T28631] ? ksys_dup3+0x3e0/0x3e0 [ 1036.432054][T28631] ? wait_for_completion+0x440/0x440 [ 1036.437708][T28631] ? __fget_light+0x1ad/0x270 [ 1036.443834][T28631] do_preadv+0x1c4/0x280 [ 1036.448325][T28631] ? do_readv+0x330/0x330 [ 1036.453414][T28631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1036.459174][T28631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1036.464971][T28631] ? do_syscall_64+0x26/0x790 [ 1036.469850][T28631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1036.475948][T28631] ? do_syscall_64+0x26/0x790 [ 1036.481157][T28631] __x64_sys_preadv+0x9a/0xf0 [ 1036.486183][T28631] do_syscall_64+0xfa/0x790 [ 1036.490727][T28631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1036.496797][T28631] RIP: 0033:0x45c479 [ 1036.500711][T28631] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1036.520332][T28631] RSP: 002b:00007facc6507c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1036.528767][T28631] RAX: ffffffffffffffda RBX: 00007facc65086d4 RCX: 000000000045c479 [ 1036.537027][T28631] RDX: 00000000000002a2 RSI: 00000000200017c0 RDI: 0000000000000006 [ 1036.545656][T28631] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 02:16:44 executing program 1: fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000040)='trusted\x00', &(0x7f0000000080)=']\xc1[vmnet0\x00', 0x0) r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) 02:16:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x8, 0x8000, 0x80, 0x7, 0x80, 0x9, 0x5}, &(0x7f00000000c0)=0x9c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x7ff}, 0xc) 02:16:44 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r4, 0x8983, &(0x7f0000000140)={0x1, 'veth0_to_hsr\x00', {}, 0xfe00}) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x82, &(0x7f00000001c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={r5, 0x80000001, 0x8b}, &(0x7f0000000040)=0x10) [ 1036.553956][T28631] R10: 0000000000800000 R11: 0000000000000246 R12: 0000000000000007 [ 1036.562303][T28631] R13: 0000000000000857 R14: 00000000004cad8a R15: 0000000000000001 02:16:44 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, 0x0, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x8, 0x1, 0x100, 0x1, "74fed36f9ff0f9eb1965ac6ee69512a9af2aa4d37d41154cbba199240c2f5d29"}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) connect$netrom(r1, &(0x7f0000000240)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x8}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast]}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r2}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r2}, 0x38) [ 1036.982384][T28773] encrypted_key: insufficient parameters specified 02:16:45 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x84, r2, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7ff, 0x1}}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x2}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x4b, 0x81}}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x1}, @NL80211_ATTR_SCAN_SUPP_RATES={0x48, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x44, 0x2, "be5226a14bec3fdff21287a0c44e3dbd41d38f973bf70feb8211b19f6ea72f31ca99fb47e1033b85d4bb36ae1504074816d9b7fe2da9184e427a2e1636f5a502"}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x20000841) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000)=0xf701, 0x4) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, 0x0) 02:16:45 executing program 2 (fault-call:5 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:45 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = add_key(0x0, &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000001480)="670e8ddd4d1041f23b8f6dd2475196214b81af42f98bdb2e0c0c14e4dc8650c71ffecf970eee4e9d4b57e44ca990cd0c53de6bf5f14bca6759c92dece1601e1a48ac172800e569cae6e945c9dd2d66fcaae614df58a05ad49c407e75d819cb1fab8ecd916021da119d68a2", 0x6b, 0xfffffffffffffff8) keyctl$revoke(0x3, r3) r4 = request_key(&(0x7f0000000380)='id_legacy\x00', &(0x7f0000000800)={'syz', 0x1}, &(0x7f0000000400)='cifs.idmap\x00', 0xfffffffffffffffc) keyctl$clear(0x7, r4) r5 = add_key(0x0, &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000001480)="670e8ddd4d1041f23b8f6dd2475196214b81af42f98bdb2e0c0c14e4dc8650c71ffecf970eee4e9d4b57e44ca990cd0c53de6bf5f14bca6759c92dece1601e1a48ac172800e569cae6e945c9dd2d66fcaae614df58a05ad49c407e75d819cb1fab8ecd916021da119d68a2", 0x6b, 0xfffffffffffffff8) keyctl$revoke(0x3, r5) r6 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r6, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000780)=""/70) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c40)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r9, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="380100001200020027bd7000fcdbdf25000900074e234e2306000000090000000700000008000000d2bb00000200000009000000040000002311b235a2e212b8feb931c54dcd781b2f85b5c2acaac7d555bdd1088eff5b6f422ebc614858b5530ccd7c62c84166a71df0d21951ec29c70ef567bb8ddc4f9e19b4d77d78d234c2ade2ffe5193ff0ce44a9079eca994cc1b162670a130b8390a5a476696265f013715a6e15b1ac0a6d0a8c3ff2a2ca57e3f606b670f5acbf92a24ab53c7b41d5135586fa089c0981a05be4d3fb826ed9306a28336c0dcbaa3bdad44dd071e9f7ebef90358aca6db020666b218d5e08bd0c0f106e2dfae849e90a9231c2e58d46f0fbe458ff6d5a61bfe0939c484cbd0b753de82385ef7e14e469d641250c16000000", @ANYRES32=r9, @ANYBLOB="04000000ad0a0000fbffffff810000004d0001008ca70b29f46ff845c4ea71a00c5b861a640d48cbd0ef4f67c8ee2b00fdb5b4006cfec5a1116e8fa6245d9f9b8af4e707a191e4e3ca353f63fc776fc7bf4077c802b51dfda7caf8593400000020000100643c9530fa353c9eb4c3b64a4e881c726ba77a6b13798e34eb2dbbc67a0001005e9264cb8e400ea6f0e201b171cec37a0b6211dc46ef15a43983046c27bd454eb9b87a5e51b9a8ad0e123a64920cdf77a18e52ce12e49a0bf3b6c2b64fc2ecf93cd3b67953ff6f080d203766f41294ce63e7c1bfb15faa692a539a33257eb8792312a712711d612e6f587400f42e5fff11cc65a416250000"], 0x138}, 0x1, 0x0, 0x0, 0x90}, 0x0) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000100)={0x5, @pix={0x7ff, 0x10, 0x0, 0x8, 0x800, 0x2, 0x9, 0xfff, 0x0, 0x2, 0x2, 0x6}}) 02:16:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 1037.379701][T28777] encrypted_key: insufficient parameters specified [ 1037.394922][T28792] overlayfs: failed to resolve './file0': -2 02:16:45 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './bus\x00'}, 0x6e) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:16:45 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000140)={0x980000, 0x3, 0x2, r1, 0x0, &(0x7f0000000100)={0x9b0951, 0x20, [], @p_u16=&(0x7f0000000080)=0x2}}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x541c, &(0x7f0000000280)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x4e20, @multicast2}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x82, &(0x7f00000001c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r7, @ANYBLOB="9f00000095fecdb15f298e5dea0d2b6e8857220182d057351f1accc1425d57c8dc06701f2886c73edb68b7332238d6f6ec3bee7e43295a20e53c5c28061b57d185fd0458e29fd46261b6065794eecf86f3a6175fd789b66c371dfd874c4f8fc82e3077e4bd183f5957cdd10f17e8f863732a87d099a44807633b85cd05e5453a9c3150d9798f541b3ecec78cc2d26be9f9c5be78480e6d67317d6ab7ac3d8e16a13b37"], &(0x7f0000000240)=0xa7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) modify_ldt$write2(0x11, &(0x7f0000000040)={0x5, 0x20000000, 0x2000, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1}, 0x10) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) 02:16:46 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$IPSET_CMD_DEL(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001e80)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666f96eda7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f0000", @ANYRES32=r1, @ANYPTR=&(0x7f0000002140)=ANY=[@ANYRES16=r3, @ANYRESHEX, @ANYPTR, @ANYRESOCT=r2, @ANYBLOB="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", @ANYRES64=r0]], 0x3}, 0x1, 0x0, 0x0, 0x50}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/sco\x00') r5 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r6 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) r7 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r7, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r6, 0x5c, 0x3, r7) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r8) stat(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) keyctl$chown(0x4, r7, r8, r9) sendmsg$nl_generic(r4, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r10, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r11 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r11, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 1037.858015][T29011] encrypted_key: insufficient parameters specified 02:16:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) modify_ldt$write(0x1, &(0x7f0000000200)={0xffffffff, 0x20000800, 0x1000, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000640)="f58e94cabd1da39051ebcaf104a99700f805c95c6ba91ee2d45a6407491512ddb1b68a3c0d277a8a3e7431f7f3a6353e73a04ed6f932cdd6892dcaf948f5200c464a469552a2e82bfe58e55d878068c0a1097679e86c9a96818608bbc723ad9ea33e59ab882392c49bd2929576b7b173e4005beebf84efed4ea0f87bf4330bad7f25d8d8d712ee9e5b16de5867baf70aa2c249dce4e1769b05eeb4f9137c212e408ce6a2eb9f336d82f43ee23f6d647355df65900aebdbcdf6e9fd42a012fe4dc649ffb12a190a6b039397d192c005e188c67655ad9aed255f264095300b58d3bc1b1be25a88511bf4f43303d1ca70b2b3f03097ce9cce8eab0813e44fa983bc056d9581bad8757f96357628d3fc92a7b10b24927105aab6357a20a6a635368534dcca5eb0e1be0bc16368fdeefb69bc3783503c2b1ca94d3265888cc7382fbbc5d43f180e8c073f6cfb50acbb194effd50a8566ff23b5996e07f708e8f75997cf61013761c1b6175ef22374841d236f39123b710a3446a395d6109c47d497c1447c5e41e53acd58d8fe579f0cd365f946cfc74a059ea2e1b507260f85606f2038b9d5d42d7c293df283d8df07d90555cde78cf2806eb286b4bc1a78516065a36a553331fc5660d9a16688ee3c8c2c64fa343094c3d3c83410d610d8e6de7ca77bacd3a6b3d7e15ced1d33140e295c7fbf8ab8817dc4e2175a8f90449907323f88aca8f2c775cf70a09b2359198df79922fe2d8fd083c43cc3c93e56a0328d6595dbc5813ba27c2f956a9383bca47ff2329d675e1a6e07766c16de4a3ecb5db677a80ac4b260aae609e939852b44e12ec90184ba9e88a82c178037546eb7bd448e6ad54383a2b4068439f8fbb180f7519d99bd6de17fa38b72c2fa6d8a96fbd426c34e499885be8418c7ce03437c130b6293535874b3105686a2f7a0942cdfab448d651aededcaa13a9b64ae8fed201029af32be41c813abc4fb3f9f03b478a9942793151612334d594751912f02d34aa4c644f2b6ec43ae7999e17c224839ab89d20c07a6b271244aef2f7792dee81f69c489b8882972e74aa217469130589c0ba52ca321b132650b9972d0b1fe7a871fed3cb2dda243c55a9edec46c17dabee321af57a8daefc7cf5a9ad117a514162b0b31721c28c7db56d600c38e15783c0d4d80c1e66b89fb6a9f1ab014ae7e11a7a740d86180ee56ef1cce892fae00e69b5e833f9214073e618da90b51005f6f50b2fc46482e59e981a5e09e31e8062c2e68f86e4ea08b65eedac0e869f453325876ff7a6542d3f0eaa053953c7238d8e0a1ab61e47cf37d52d64fb2bae32cb5b6c9f3643da28739a831a44da6e984f0712ae69380f8df719de86fc4bd2724b1bcd0989e495db6c82469e49966c7c417c603072a2d83451cacd138ee5087417f7b511d12a64894272b71feb4d702ff21d83f99b635b167656b23821e20978525849897ac12d337e6212511c33017a1e4dd521f39083d7be42ce38c1b50987bd5f213b5732b700e009ee03381b0934c8fc3ffb2e449fd84b5f989ea0feceb9437c6c5cefd85c982e48bfbe4b3b746ee06bd4f99074d30f18ef21276e816274823e4c8ee53c35650cb07a0e4493ddf65f44a153437e9c45dee5414289c43b1da38ca95c612dd5616f77bcd25feb4c6aacadb623bb2da1028dcda24257fda1da002da655c4ae98ca80afe892bbd6a7727ba1f8b0d7706f1a80c72a02d56ce9e3a228a2f98c713238352349855fa5bb8fb4b750a19302307e2ce90f26d271579d226ab1a5b7cdd3ddacbbfa471cd1b3032860de06c0a0071eacec390208ea2f81328d00afedb7e485c2b60aac385d398401a4c18adaebf4521912d73b740c6046245ab2145d6254cecf57d0d60ae648a4305a7ff1b5c259d9559efcd58c66098b2b6544cb83a0ebce4cf5710cf7c3f4487a0dcf269f0aeb72e8e7dfdcc96b231ce0df4fa0277aa91f64c2cd0d6e2fff1e52b44931f962db21e2025a271fbee52f591007c885060b0a0b3c454d7b7b2bbede8854a56ad7e67528197967d39ad32d752711b3a9c32c96617f9a8ad552edb033c615da4ee5ff1ca0a98a7957dbdcae7786d1cd155a560db2ab1523f5e3ed4ca688a829ee7689e89722cf580beeeaeea53c174847f73f6f8cc6fe388aa9a4e52b2c8577b3ff8d0bb2da20e562bb047e5e84f0045aaad87aa92ff67ddc67726e98553b79e7ed35ebafa14cf6f80adf74afdeae5b6f70c760e45fb110c1d078b1c2848b24b72596b6999c6b6fbb036a60abf57c511c2a5b9c4c0cbed8230c860ba8af6ed03edeb75214ff3da2ef013c56a0c39749f7bc3e69e50b48ec0fcae5316ab5f13330bb52675222fb9ec277a7bc6d83ffa074a073cb2bc015824218f3be2b890b260d24ee566993daf64c3a247f2b3ae5448dc76014bdd7c7b4a34809b3995a20b2388cc2458582a6f90c47c76fee8044fb06745afbcd2aa7cf0d25c23be318da254ba1a034f2f3ed9ef820f180c95fe51957b3e7e96053f51f335859978c6b6fd265f909bd3d2f1956362c73b502c1724a165cba1dbbab7ceccc1a3d80205745d774c9b56931d332dbeab65b24873b4eb7fb2a256b0ee926acaca38a842bf070415d9ffee449e3868392297dab2c742a32f28b03437293d388316e0692c17a0c3d011338f888850eb7c2429dc888b95f4c8813547a181fab760028954dfb724e6225fc1e578ccc46bcf87011099c1cda5e95958a11bf32f906850b1be816ed75a572ce79c96a18a591e85ba42f1360548ec6e8e33b5beaa0d2ca3082ae7cfa61745f694a58fc8da4912fc664fa82d8fa483ce19c3708529005290b661a1437c24e6de1963d0e2751b78df2552b4bfae15f2b56bbab713841590a13dfc0192df55fe13e290ff2d9bbd8ba1675debeae2f09a5928f6b3cd7b9eea913dcb77b189bb13005696ab73614c4b898b8a50702145b21dac7780456f738bfc80301bd3f653d3e7502bc9dde31329b87923fc04348c8389d0f7bbb482c112d370e98c7a1ebee328f96c62d9379463345ec6517c17e56d7d99dd2288f02eb2f44b1261db4333739ce0f041b55169370df9d351c99cdbde2ed5cf2b73ded189d7121d39e274181743c4c13be2a92b419ef6bb7dd834e91cfce6ac5d618f0c8ae7e575cde7240836d8e4af83a998d9fd3f6873362043469308dd33f543579b45c0507cfb0841c2af38f48fe5a03e1628cc0c7d39e03d836fee1acc20d13a9a3d081a070a44710ee7419ad254f4c3e8d933e930b0afe7273274142d6d7ca9e5f10c3ca1f28ef60579677e804fdd3d0b6366083cb47c003a2359b0136955f0521fa7ac4abcde127600cc21fba7bf1f5ff59b158dc519248bce1165e730082fd748ae52f2eab2025bec1424a3c9ac49e523da0ec116a49fc023aec9d42619a70355070d61cbc5d98f3109d42cfa55b5aeda17a6948516c7c2e615f290ded41f1b3470b53c9259cdb2b4dd1d1a6d63dc17f320b1c4e47c86a341c878fbea781a2d42210722d31d9b04fa508c6e34ae4c0b31b3c36e0063dced8a6c2085317d60f8db8694482a5b0766a554ee55ffbaae272247d1e93dc8ad2a1c07da10821531a766d98a8deb113b95af568bb06eaa2b5820f74b0b3e108d5e7d76755090fe01ef8ce25dd0ff57c72c1ec619a4f648c5bbe1575be5ce813279d3922aef0678de8f9c19c8a97f30a0e7183dbd80f5df71693144f9600a6af3052b6c87d80f2cd4b0013398161fa56e229eb0a16514cbc5ba78b00b3edccca39cb4150ad870454b337761a68572a060b3c17a4574488865f38de1915ed1ed0b8bacdd8054726ac841aa5a48c1677c699aa93641bb6ec2e749d4ad94b240c6e6513b84d5d8ceef25efeb64093e3f033a69cb3b34dad5220c7e61a0e8599fea020982932eaef624dcffff7dc5244943974f896b5c613b83e79705d55ae511c736e6957a2419c8dd8b38fe35640accb1e1c56ee1c915f22c4172455d95076620fa58919603e811fdb7b53f056c19f36219c4376226f8f928d8ff2ff45694f1439d5a35fcfa0fe74ee40b7c31d356ee0f44e2b1c8221090448e075ba896028abdb30fd53309dd513079ae724c4c04a57b79db47c53edbcdd315aee3ea6448c507cda197b3de0fe2bdb1b7c7b551feccd2d21c03339659b6ad50ae9a7f9d5a0173da830c718eaeca39da849a3a2c4e3ce4630c58cdd9281391cabedcc0e70ddb8c0737ac0f1e71c49d9a2ff7269f7e654322d26560279f8517d448caf92520e2dfc35e1894105af37d2662856f01b31f787a341256c02804acd3b617a6114b3a11067d657cfc3b355b9f1b08ba11ec3fdf7aebc4b294917da5f57f58aff949865254238de7dcb48e0d5a83944d8068250124f5a81e0438965e09e86802736d7cd050a43057e857765920b385c33d80eff9a942af2351f9ca967506534d1b101f9c3a60ea8cd8a525c1ebf5e1e6358213c652636660e477877c8899a5bd578a1533daf751bc15cedacec2a19140bb639f8d33eb67b157d457a879930f229b1f7fff4ca6af2e229cd2943dedc862291c8aa25af3c0caf2838d3ba30cc8949b36b930e98e78e0a6e854e841cbf174d707b24aafa6e84d75323d8a5813df03657c4b08dfd6e8703898e4d04a4caa707f98c0429284d85d0959e35970b34417cdd3a02b03271293ab3393cded7e115f6879c7a3acb0b3a6386afe1da473c99d6d52b32531b56f998b6380a294e0e462ed384cc0bc205ec2c1b2d69a8bbc247ca61f53280ba788d6cdfb5d735e09662d27bdb11320da0f8db823da5df12589dfa94e4826e03fbdd33c1ad655ce733cb757e7c20061a841b3a1cbd26633315376ed9ca20e1ee4f96949f6753e32c89f12d64bed2ef8115977b40ef7b3cef296e7d4ada73de869e762c03e223cb4f6c5e279892ec4e1fe6ed13eb3e0619c98955f65b3d93eb12f27caa744b307ea1658149941b2320b3054b7bb73bb699724b555bd9c0e7feb4659c65d58f0ef421fc93001314f1d25e30a7ecaee46357fe5cb48ca810b9ac59ff6660cd493bddd0bed706509b704375cf5ebbcbfc45d8bca3ef96d4406cfdb58c0d118fd08984c9c9a691cd295d5f897159738117a55eb5ed90a82d017101fd4b46f1db52ffcfd102b262fc598ce5c1efd49ffd1a7302975b0777961ceb79085560bc8ee7f7979f9e09acce82ec211a4f25265b9bfccd527233500de3a1623ef901e672fd82ceac77ed4df139ec703c702fea2e0547f279acb127f531b3dd3296841cf2b68176754b6d368c4a65180988c395b8ad598430744e0f398256924cb8a47766474cc577d7ecbe279792ca118900b412fc03ca090d4b09fae748c2a5ded6a8696427e0a286471b95d2a426b53f7b19bb5016a825142645081309bc3d5112d1a9c8383224848f4655524658e8669e8ea9a1036caa6a088a61e3aa192b03c9bd410a705287d3f15001f8eb575c3a63604568760ac2c9fffe567db74ace0074e301de2c5a195ce59a24212aa95f732bec8000ea0b04128f8f9d0f09bf56eb1a97c939e95ae3bd518f140057a68442c8e76c70b23ed43964dec800e5f78813e7db5e55c54acb98a116e4d9ff63682b252d13eca64e80e4324f4333ba96e8b9dcffaff53b3888dc8f2d031663c17e2b62165aa88593df0335f22b0ea86903d6bc95332e0a40c7fbf9bc8b5998712667f2c1249caa7fdabf36c67858798109b82da01b76ef3053fa2abfb8cdd6d9e83d5a1797d491071a10f391e609a12ac52b5b8f0bef1b6604734bced7f4512", &(0x7f0000000040)=""/166, 0x4}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f0000000240), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f00000001c0)=0x5) [ 1037.939372][T29011] encrypted_key: insufficient parameters specified 02:16:46 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x9, 0x3ff}) mount$overlay(0x400000, &(0x7f0000000140)='./file1\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0]) chdir(&(0x7f0000000380)='./bus\x00') r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, 0x0) 02:16:46 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x29, 0x0, 0x1, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:46 executing program 1: recvfrom$rose(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000, 0x1, &(0x7f0000000040)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, 0x1, @bcast}, 0x1c) r0 = socket$inet6(0xa, 0x20000000080002, 0x0) socketpair(0x25, 0x2, 0x0, &(0x7f0000000100)) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000180)={@default, @default}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = eventfd(0x8add) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, &(0x7f0000000140)={{0x1, 0x0, @identifier="2abdee9e011f82fef8909db7b3f842d6"}}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r6, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r5, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000001300)=ANY=[@ANYBLOB="b000000092871fb35605cd3b606ad4b4b3ba9da70610ea0f842ca2cb5c0e96b31cd70e347ed0041ea700008042fffe337e45f16704c8f364a3", @ANYRES16=r8, @ANYBLOB="000126bd7000fcdbdf25140000009300ac005decd2a866225d8c82d84e15226bf12ddb32fa28d24f083775c9428bc6748951e6dcd978b764029369781a427d1882e78bbe577471371733d258e07d02264c8e4b58049fc0acbab6e38afba75eac50ed37161ab3385a726ba1c5ef876c2c467c7c4687fc41f83ea7865094603cb8e37b3f57f0fdc72f564b9f784200e5b90769fb508676f8460051a4a72c3327eb3b000600120093000000"], 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) 02:16:46 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x6, 0x100, 0xba}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) preadv(r3, &(0x7f00000000c0), 0x0, 0x9e80000000000000) [ 1038.299652][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 1038.299664][ T27] audit: type=1400 audit(1583115406.519:320): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=29226 comm="syz-executor.1" [ 1038.437766][ T27] audit: type=1400 audit(1583115406.649:321): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=29232 comm="syz-executor.4" [ 1038.443983][T29228] encrypted_key: insufficient parameters specified [ 1038.464630][T29251] overlayfs: unrecognized mount option "0x0000000000000004" or missing value 02:16:46 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8000004001ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) [ 1038.504518][ T27] audit: type=1804 audit(1583115406.699:322): pid=29251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1111/bus/file0" dev="sda1" ino=16707 res=1 02:16:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000180)=0x7, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f0000001640)=[{&(0x7f0000000080)=""/245, 0xf5}, {&(0x7f0000001700)=""/219, 0xdb}, {&(0x7f0000000300)=""/195, 0xc3}, {&(0x7f0000000000)=""/44, 0x2c}, {&(0x7f0000000280)=""/11, 0xb}, {&(0x7f0000000400)=""/19, 0x13}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/35, 0x23}, {&(0x7f0000001480)=""/239, 0xef}, {&(0x7f0000001580)=""/142, 0x8e}], 0xa, 0x800000) [ 1038.571946][T29388] overlayfs: unrecognized mount option "0x0000000000000004" or missing value 02:16:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800180}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x6, 0x1, 0x801, 0x0, 0x0, {0xc, 0x0, 0x4}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x8055) [ 1038.699900][ T27] audit: type=1804 audit(1583115406.889:323): pid=29440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1111/bus/bus/file0" dev="sda1" ino=16770 res=1 02:16:47 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66691f788d844c60a36c6530"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1038.791667][T29228] encrypted_key: insufficient parameters specified [ 1038.942178][T29603] overlayfs: failed to resolve './fixL`le0': -2 02:16:47 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000003c0)="ec4435c19a3e857643b25a65da59d23bd1d6d28ebac9baed6438c690cd413e6a7b8f68961f239f1d9864d5b6923e9d4c4da17f3794a448a3ece3e8df96b80e118a51315012366ec086552981326bd3b06a3891c005113e6fcd9bd73461f9078d4b5c1f555d8cbc333e06092b9e4d1c3fa3ac16f03002d67ebc9413c7f7405e77810d3ed12445d11978ead3a23c4f3d9ebdee9c28cf90e3b509af602f7dd73b1ebd984028d47fe9ac0133e76a25ade19f103d47d1d7434d7c8d88e5518cf23efbfb8ff48956a8791594b7907ae0638ab02aa3f3", 0xd3}, {&(0x7f00000004c0)="2f020046e60ecf062beae2300ff4ab80d4147b6de7f9457670ff558cd18fb7f3ebb9a1c536b031cad2fc6999937c4ff58f52515a1059f61d7b260404d4a11f19354bbe42198f85f91b6617c5ee7d6f0365f72da280d6d636f1e6cb1101f4110e157a34b8869976226383517170adfacb056b888c75ea3bac4b69d5a4ed282b9a3d460e18cee846b61955ca68e6a304c6aaf640c7a5158857e968cd094a12ba90927d35c8b8806b64b738c54a766c8138b0d14ee591d1e4e156bf9bfbce4d89d1603f7a082641ea36b15c8464c2e46b782e31325881b3c3c3cdd4609bf9998f3c738e083f010b26f3b51e6c30341cc3c54e", 0xf1}, {&(0x7f00000005c0)="9540bc1ad6b35549a45a7776298b24c14bc9472195bf95297c417d28a96710900f858c278c019a05b1b9d90dda7092da62bae44ff7cc0169d3c59d9dd8dc690336", 0xff68}, {&(0x7f0000000640)="61400bacfeacf749b31069c3fcc4f2c7fbd0fec22016313a4b5957518d319e6fcef083197190a6be374b59c1e6d3507e638ebd08bd788d65ca2fbc74a6b2c5ba06f5e53e23f30f96fa12e5a735e366028038ae0a668866b11180f9687ea84219f1", 0x61}, {&(0x7f0000000780)="f7a06dbfb30e2e06587256c6c165f7359f6a355aae2be20a7f4abf08b104d945810a11cadc9cb536c5288af2f2e110cc4be083f792e794a38959adbde61c951525c7f6aae7fbcc0a8ce3adcb5118307ff156264c6fb194116a9f59433259ca8321651f99430a3a3e088d811a9257c0941ac89f4990a275f863871884c053ad31524bd160deb21671bf8c5dc746499ada2e8639c2b9dba479448768c5ef", 0x9d}, {&(0x7f00000006c0)="3aab09eb1a65644f54c380f05d5cd0ff365555705f47c7f93edc287d772674f21f3408613d4b9f3e5f5c37c959b120930d1c117ad2b2b941ba2b49c07db81b8f97746b781f6cf5f324", 0x49}], 0x6, 0x0, 0x0, 0x40000d1}, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=@ipv6_getroute={0x3c, 0x1a, 0x10, 0x70bd25, 0x25dfdbfb, {0xa, 0x14, 0x10, 0x4, 0x0, 0x0, 0x0, 0xa, 0x1200}, [@RTA_MARK={0x8, 0x10, 0x4}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_PREF={0x5, 0x14, 0x2}, @RTA_IIF={0x8, 0x3, r5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40814}, 0x20040000) r6 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) 02:16:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x2a2, 0x800000) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x20100, 0x0) [ 1038.974377][ T27] audit: type=1804 audit(1583115407.189:324): pid=29603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1112/bus/file0" dev="sda1" ino=16945 res=1 02:16:47 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1039.040840][T29659] overlayfs: failed to resolve './fixL`le0': -2 02:16:47 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x10002, 0x0) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000340)=0x5) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000000)='dirsync\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f00000002c0)=@sha1={0x1, "80b8d65714413c7755e9286e9baf85f373896c18"}, 0x15, 0x5) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:16:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x14000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000080)={0xb5}) 02:16:47 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1, 0x0, 0xc}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r7, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000300)={0x6c, @empty, 0x4, 0x3, 'lblc\x00', 0x28, 0xb2e3, 0x3d}, 0x2c) r8 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x200080, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x1) r9 = socket(0x40000000015, 0x5, 0x0) connect$inet(r9, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r9, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="01e1c00802"], &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r8, 0x84, 0x6c, &(0x7f0000000240)={r10}, &(0x7f0000000280)=0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vxcan1\x00', r7}) 02:16:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x260) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1039.450556][T29683] encrypted_key: insufficient parameters specified [ 1039.544994][ T27] audit: type=1400 audit(1583115407.759:325): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=29798 comm="syz-executor.5" [ 1039.566893][T29880] overlayfs: './file0' not a directory [ 1039.644077][ T27] audit: type=1400 audit(1583115407.859:326): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=29798 comm="syz-executor.5" [ 1039.718541][ T27] audit: type=1804 audit(1583115407.879:327): pid=29880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1113/bus/bus/file0" dev="overlay" ino=16974 res=1 [ 1039.779859][T30024] encrypted_key: insufficient parameters specified 02:16:48 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key(0x0, &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000001480)="670e8ddd4d1041f23b8f6dd2475196214b81af42f98bdb2e0c0c14e4dc8650c71ffecf970eee4e9d4b57e44ca990cd0c53de6bf5f14bca6759c92dece1601e1a48ac172800e569cae6e945c9dd2d66fcaae614df58a05ad49c407e75d819cb1fab8ecd916021da119d68a2", 0x6b, 0xfffffffffffffff8) keyctl$revoke(0x3, r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r3) r5 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000540)='o\x99a\'\xad\xf6\xd1\xf2h*\x87\xb2>\"\x0eVq\x81\xf2\xe8\x03K\xde?\xb1B\xe8\xe7\xbb\xcf\xf8\xb2\xb5B\xdd[\x91\xc7\xdf\x8a\xac\xf2^\x9e\x11\x18\xa0DX\xc4\x9b7\x11\xb4`\xae\xbcsK{nk$X\x9d\xe8\v\x10H\x9du8\xc2\fu\xcfq\xd8<\xf7\x8e\x9a\xc1\x0e\x010\xe0\xea\x10\xe0\xc9\xbfm\xde\xc9\xee\xbc\xd9 \xff.\x7fS\x8a\xdck\x98g\xa6\x83\xcb\xff\xa0\xbdc\x05\xc1\xc1\xa7\xd9a!L\xc0\x9aN\xeblR\x90\xbc\v#\x98z\x00\xfa+\xf7\xbau\xa8\x1c\xd6\x9fd@\xdd\xf7\xc1\xde\x8f_\xed\x03it_\xd2\xda_\xea\xc7U\xb7(\xeb\x8d\xf0a@\xc1\xc5\x11H\x7fQ\x7f}\xb0\xea\xae\xe4\x19\xe8\x89\x16\xab\xd2\x942)\xc3Z\xcey\xea\xf6\xf7v\x15l\x11\x0f\xc1\x1e\xf2\xff\xbc\x98\xbb\x87\xd3\'\xda\xa1\x89\xc3f\xfeX\xca\xea\xe3\xed\xb8lC\xe2#\xa5\x95\xd1tzYdl\xa6\x055\x1a\xfd\xb1\xd6\xf8\xf2T\x8e\xf3\xc1\fo\xae82\xdc\x1c\xa1\xe1\xf5\xc7\xde\xef6\xbf\x9b\xc9z5a\xf7\x9a\'\x99}\\$\xf7A`\x82\x892R\xd7\x92\xbb\xddX+\xdbe\xff\xe9a\xb6J\x97\xd6\xd37\x1f\xed\xdb\x8e\x99\xda\x8d8+O\xd0\xf0\xed\xdbB\xfe\xc22\x17H\x92\xa9\xa60x0}, &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000400)={r8, 0xec1}, &(0x7f0000000440)=0x8) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000200)=0x100000000) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$phonet_pipe(r6, &(0x7f00000001c0)={0x23, 0x14, 0x0, 0x3}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) 02:16:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x8, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8010) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x82000, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000180)={0x8, 0x2b, 0x15, 0x3, 0x3, 0x0, 0x0, 0xd1, 0x1}) shutdown(0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') write$P9_RREMOVE(r3, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x20}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1040.061414][T30197] Unknown ioctl 1076129802 02:16:48 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x112) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = dup(0xffffffffffffffff) r3 = socket$alg(0x26, 0x5, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r2, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r6}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) sendfile(r1, r0, 0x0, 0x8001) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c6530b9fcab2c62b64bc693015540354f8fe841245f90af1657f9fb95df5ba476bee8f5d7f57b116433ea7f2bee32632e3be0a9991b71bfcedac1821057a6c6a8fc9eb152841cf1c73cd8c7f81a906a695594efebc8d6cf7ab0fc5ad6fe9cbbeaa91c724abfe2abd5b7e25f4f821f6d05afa17c7625bf"]) chdir(&(0x7f0000000380)='./bus\x00') r7 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x401c5820, 0x0) 02:16:48 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) [ 1040.257494][ T27] audit: type=1400 audit(1583115408.469:328): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=30208 comm="syz-executor.4" 02:16:48 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(r2, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000680)={0x0}}, 0x4008144) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f0000000700)={&(0x7f00000001c0)=@phonet, 0x2e, &(0x7f00000006c0)}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1040.317481][T30238] overlayfs: unrecognized mount option "bKƓU@5OA$_W[v{d3+2c.;ਖ਼qWƨR<jiUzZrJշ_Om|v%" or missing value [ 1040.420794][ T27] audit: type=1804 audit(1583115408.639:329): pid=30238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1114/bus/file0" dev="sda1" ino=16546 res=1 [ 1040.470971][T30412] overlayfs: unrecognized mount option "bKƓU@5OA$_W[v{d3+2c.;ਖ਼qWƨR<jiUzZrJշ_Om|v%" or missing value 02:16:48 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x68, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7ff}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xf6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xfffffffa}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) [ 1040.599522][T30413] encrypted_key: insufficient parameters specified 02:16:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0}, &(0x7f0000001480)=0x14, 0x80000) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000000000000000"], 0x48}}, 0x0) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000006b80)={0x0, @can={0x1d, r6}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @vsock={0x28, 0x0, 0x2710, @my=0x1}, 0xb22, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80000001, 0x5, 0x5c6}) sendmmsg$inet6(r1, &(0x7f0000006c80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x4, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000001c0)="0d9b1d1ff81721d837555124b12022e5ecf2efecb919fd6be249c167c310fe70bf9cff352cdfd16309e80710a1c40ed35c4de7be6bb7932fdc4b8248aa1f40730976e95983d4c136e87e1ef2c656a41e6ddf7ac2442423cbcd9a5514180bc49c82c6b8bdb407ed559dbb344b7575fe0a88918206aa26ab5d1252fd4d84b1d37d11023504c122c7319eb5b1d31a6345fb37b0d3eddb7d3f4bfbca5a57abb8997bb3a62160", 0xa4}, {&(0x7f0000000080)="b6", 0x1}, {&(0x7f0000000280)="9845bfeec1e7e04d5516814e9b96dd378b8b9b216c11f32ab02f37aa847d8af6613fd568d7c1bc559fead8b0fefdff5e0d0673e60532d7762666fdc7b75eef3adac986d68ce5207a5a7f6598435562a479f49d699f39eed1f0f23d950b140f84b9aebe2e16979bfe858786fa8635663eacbf761da877e70e0b20d55dd67dac3b6c2c5b9ad6c4ea3ea3de0eb67e5ae56fd57e9a0287f60d49782034d7cd792e1c22788222469b59ff3b5cd60e", 0xac}, {&(0x7f0000000640)="8dfff9ea9cdd47597e45bf5e0d753d0aaa516d92981c9985edddc4a4571ee6b25a3fc98bf4aba4058a34a1610c2ad8010e770595362765743cdd787d4703e14907a9f3b35864b60299efb6d1972fb63d2469ad956d81ebe2fabff6ae5215c49b08803e3379d067aefe604bbab8daf556c174eea03592866ebb91a28fca02f678c4e555d6193902f14f11b42f9ca5b0838dae653f1cc716ecc87e7e5c1f78d449eff115305f9768d942b4c1fe6075da2f409eb096afcde00d6c8b2eb163a706f10250f8195e343d9235ad3b1f7aff283a48ec84c43e", 0xd5}, {&(0x7f0000000740)="c938e0dc81a4ea1c1dfab3050f15aae0587e9891444f6e4568035c03cb5ef67401a813d151ff2ef3f8b67117272fe2b978f8527eaf45bd09fa3f201ccf89d03646375fbcc9f0beff716e616c0358b898ba1abd95086107edc2fb04d75e50f98cc3f6ec3490e8765a4ab9974608409d4ecec0b23ab32f81ff3ccdff98d1c54431c4de14da9d65ca0b513c757131f048a3a0aec7e404f0d0f8e77df63d3d0162eab5a887f718cb2cf2a34625c21d4794bc737db46ac168b7a84bde489bd150ead5df2b8ef37a986f0bda3866febbcf6e384d43907f12", 0xd5}, {&(0x7f0000000340)="e234b104f14777b62e59350f99f65312bacb39d103c0c00bbd9bc2d836e032fd53412660f11ff093311f86ec1d77ff86484e5f6bca716348fb3036a893df9324f6e7808991f536253bd8e330d59ab213be5da0c5a2044cc865f4e5a9dd660fb3aca775a02ebecbe03eff7e4d05e4acfbb5b9b63ec44770de42660cbd92479cfa6c", 0x81}], 0x6, &(0x7f0000000840)=[@rthdrdstopts={{0x70, 0x29, 0x37, {0x0, 0xa, [], [@generic={0x7f, 0x40, "95075f545e4304e42ac3020a16927dc23cb98ca49a9d8a2b96c0a26b050fff35b89c75181fc277843c2150da6f755cbfcf0d8eca75358164531e03eaa22a38b0"}, @generic={0xff, 0x9, "9322f0cd3b6aa9db5c"}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x70}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000008c0)="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", 0xfb}], 0x1, &(0x7f00000009c0)=[@rthdr={{0x88, 0x29, 0x39, {0x3c, 0xe, 0x0, 0x81, 0x0, [@dev={0xfe, 0x80, [], 0x1c}, @mcast2, @loopback, @rand_addr="d96f9a8aee3c26d0e9faffc5c74a5217", @mcast2, @loopback, @mcast2]}}}], 0x88}}, {{&(0x7f0000000140)={0xa, 0x9, 0x0, @mcast1, 0x87}, 0x1c, &(0x7f0000000e80)=[{&(0x7f0000000a80)="caecf592d5a4d42a44e99084caf06c32dacaba01d9d5c69cac4a4ba118ab6f56f9a060ede80cb7c610082798b0fdd20f0b703af8c183beeb40f70f538ecf54166cdd2982e0ac532a05b2f3c4fe82211367", 0x51}, {&(0x7f0000000b00)="b3674347a548662dde186b4dcbd66ef6a15aa175a834cf4812e3735905fe077696660c1ae5e666b21e2e54d0c193e2d2e4aab6be8f0823b54e9c13142aae2ab25a29b9045e16cf962492cc0693", 0x4d}, {&(0x7f0000000b80)="09457dadba6e99a83ea0c878b30dbdc7819ba5bc43e7bc9a2573af0dce8da4922ac9da31ba7b8937255cb5280cc81931fea22445ee4c7c8606309c9ffbc074f96399e59ff689ca3bfdcbb66ade2be07590073e5be34787342461002732931d8751ec9a3709550d72cae08ff44d378fa75127e366cb4471e3088f866958fefb8f964d5e94712bf1fd0910ef62398e7706c2ea2d1ef1e5611c0ec777e6fdf400880d472c2b5aa4813ed02b2f7fa246", 0xae}, {&(0x7f0000000c40)="c2556b6a9fa60405a3697036f90b6adae916d1c3d828c459a492f9a3ec3e9779b666b856c92e9dc1ebdf4a9daaaed06947d5006a786a776b71c2fb1912763ae3e94e7792637474b6dc16320c77db49a6436337f929acebd03cb60f95f651b268fe642087cc5b4243b474f1e577906576fbbbe91da93e85fb10", 0x79}, {&(0x7f0000000cc0)="91bea2a273b8b496a4e9e64abb395f6e13278d314dc276cd1392cceb0007dda60dcf4dda465711725cd12e6b4d0bb0c55e35b9dab644c6c21f29f6ff076c8bc2ae2b699e46ed891ca6dddffc5b2cb5a378273296df79baca32882afa6b69f603e3ed38b66637599437f33b5021cf18580cf4479315e28cc41e1ca4c72c66e812b70a827969f397b5109d", 0x8a}, {&(0x7f0000000d80)="7cf96c98d9e0264eed9954fa2371f571d5443bf1fbe440a186c21b0f794170c9fb8c9903da27a4307d76c07d62df9b93fbebbbd8a36f53283316f879ccf947bf882ed8429557e73613542a852873f7d7f07d6f7cc58fb1ea8a087f60568a033c8a81e503ecf20c09740d5456146d25b70d79f0eced26cc8315a0d0835b5cb350e14df96c64a34c593147bdb95938835dcf640e98c582b7ea52218c9caab75fb7079bb1f5bbd89358f4117f0c0410ce33c6bebd8326b754807388ae7eba4e6aae153b18664155327978a8", 0xca}], 0x6, &(0x7f0000006c00)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback, r2}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r7}}}, @dstopts={{0x30, 0x29, 0x37, {0x0, 0x2, [], [@hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x3f}]}}}], 0x80}}], 0x3, 0x4000000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:16:49 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0xcd40, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44000800030801ff7f0000000000000005000007050003000600000062000480080001400000000606000240600300000600024000f900000900010073797a3000000000d71e2c3ed5be5b3c0e4d48d438b3c926c3e76711d1d80efa11"], 0x44}, 0x1, 0x0, 0x0, 0x44044}, 0x200488c0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x80000001, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r4, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c0000000002864d0000000000000000070000080f000600736e6d705f747261700000000800084000000001"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40010) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) accept$nfc_llcp(r5, &(0x7f0000000240), &(0x7f0000000300)=0x60) recvmmsg(r4, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x400101c1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) [ 1040.896338][T30413] encrypted_key: insufficient parameters specified 02:16:49 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000700)="4b4b3249b277dbc14215c069be06a5d78074c1d37e35d25628170c5d8e36e0e64956cdae787a844395b7f98b956f8fdbd9aeb339069270c8f93be7eafc2e38f632cf3f589bda40794f", 0x49, r4) keyctl$read(0xb, r5, &(0x7f0000000680)=""/106, 0xffffffffffffff7b) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:49 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="3588af57f6e1707c6a6824e23aca964c606f3011f8da9c2d4cd57b38edc67455b4737417ae736627d8de255678108cc23c463a8e4a54e07bb53fd0877b27a38d67144703a323e3374978ea2e0cd45ce874cc29cd12c5a88c298c5bf1fe69df2c2331cbc58bb2de663f992191b2e57497796d9baea92ad687ff", @ANYBLOB="b5a2850f9089dac81a47d6aba5334c0e77b73a0a0e61fffcfb718e66062224d764b0220ae1bb76b592bd8d3d910eb11f5db8095becb533d3f9a44819db3de8b76b2e3dff417bde6c8db7dc862582845c4ec62496c1454be835ab081618e9ea0ba507589e99ad654cf88e98b22138e63b5bddbf78fd111cfcdea07c96c6583b16f97d00b27eedd185c7c3bacfefb6d85aa9f30671ab10e84ef7840991b64fb5eb0864453ae246918350f6fc3e3e205f65b039f2ad488de98eb8035fed8c37e84de7083ab21c1e17652af67ffead654673ece90332", @ANYRESHEX, @ANYRESDEC=r0], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000540)=ANY=[@ANYRESDEC=r0, @ANYRESHEX, @ANYPTR64, @ANYPTR, @ANYBLOB="f84b126cb9214069d08c1ef3f773056497ca35b63685bf21725e064330f40c6e34284f52b63aa18aad3a18da153cfe7d0069ea4dd5f0dd8de21989e907bdc17dad113c7722fb029adc8257b8d8ac81ef63ab38b3afbc462d15d6b4976e7a6b03893008f8346346535a513e69f9c8f0352ea1eb7e8737418a40010cd822c2117115fb811b382255a69740d890f3464e9f97ba74c08e87726787292135", @ANYRESDEC, @ANYRES64=0x0, @ANYPTR], @ANYRESDEC=r1, @ANYPTR64, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR, @ANYRESOCT], @ANYRES16=r2, @ANYPTR64, @ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="c0de362a2a920a93e30698494b5063151d0b00a0ee7cdef7997753fa3bbed78d659f0f0b67f1d2561606456dc0c4c06eaa4a254eeaa914a6efc47ead815ed4a2a7354c94a4a909a3dfb1e94dea86245fb994a3b67da0b6db9bc55026deac4cac90269549fe87facfa283bc2e4f48cfd4ff35cd4870bfbc471d4e3065d19551b8003547f55e9a306da758a66dd7db2149066a782767dbcacab188b99d23bf71c71c00f8a6b3bf4eb0517b97651e430ea8f604d9e89c065da1f0dce51a93cce866523673c75193cc1c5ce124246ed8498c46970963da9b94884a5cf1", @ANYPTR, @ANYPTR64, @ANYRES16=r0, @ANYPTR64, @ANYRES64=r3], @ANYRESDEC=r4, @ANYRESOCT=0x0], @ANYRESHEX=0x0, @ANYRES32=r5, @ANYRES32]) chdir(&(0x7f0000000380)='./bus\x00') r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x401c5820, 0x0) 02:16:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r10, 0x0) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r12 = clone3(0x0, 0x0) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, 0x0, r6, r9, r10}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r11, r12, 0x5}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) setsockopt$inet_sctp_SCTP_CONTEXT(r13, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r15, r14, 0x0) write$P9_RSTATu(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r15], 0xa8) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) r16 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r17 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r18 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) syz_open_procfs(r19, &(0x7f0000000240)='net/udplite\x00') sendmsg$IPVS_CMD_GET_SERVICE(r17, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x8c, r18, 0x200, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x2}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000010) r20 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x80, 0x2000) preadv(r20, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:49 executing program 1: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x408081, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000240)) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x800, 0x1}, 0x20) [ 1041.282491][T30577] overlayfs: failed to resolve './file0': -2 02:16:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x4}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x441, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000140)=0x8) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x3f) [ 1041.401100][T30699] overlayfs: failed to resolve './file0': -2 02:16:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000100)=""/121, 0x79}, {}, {&(0x7f0000000180)=""/223, 0xdf}, {&(0x7f0000000280)=""/53, 0x35}, {0xffffffffffffffff}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/30, 0x1e}], 0x8, &(0x7f00000005c0)=""/218, 0xda}, 0xffff}, {{&(0x7f00000006c0)=@un=@abs, 0x80, &(0x7f0000000940)=[{&(0x7f0000000740)=""/128, 0x80}, {&(0x7f00000007c0)=""/83, 0x53}, {&(0x7f0000000840)=""/65, 0x41}, {&(0x7f00000008c0)=""/94, 0x5e}], 0x4, &(0x7f0000000980)=""/22, 0x16}, 0x9}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000009c0)=""/167, 0xa7}, {&(0x7f0000000a80)=""/20, 0x14}, {&(0x7f0000000ac0)=""/193, 0xc1}], 0x2, &(0x7f0000000c00)=""/211, 0xd3}, 0x4}, {{&(0x7f0000000d00)=@rc={0x1f, @none}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000d80)=""/123, 0x7b}, {&(0x7f0000000e00)=""/87, 0x57}, {&(0x7f0000000e80)=""/31, 0x1f}, {&(0x7f0000000ec0)=""/70, 0x46}, {&(0x7f0000000f40)=""/55, 0x37}, {&(0x7f0000000f80)=""/104, 0x68}], 0x6, &(0x7f0000001080)=""/107, 0x6b}, 0x6ac0}, {{&(0x7f0000001100)=@caif=@dbg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000001180)=""/164, 0xa4}, {&(0x7f0000001240)=""/205, 0xcd}], 0x3, &(0x7f0000001380)=""/233, 0xe9}, 0x6}, {{&(0x7f0000001480)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000001500)=""/105, 0x69}, {&(0x7f0000001580)=""/178, 0xb2}, {&(0x7f0000001640)=""/239, 0xef}, {&(0x7f0000001740)=""/140, 0x8c}, {&(0x7f0000002840)=""/118, 0x76}], 0x5, &(0x7f0000002940)=""/26, 0x1a}, 0x9}, {{&(0x7f0000002980)=@phonet, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002a00)=""/75, 0x4b}, {&(0x7f0000002a80)=""/176, 0xb0}, {&(0x7f0000002b40)=""/220, 0xdc}], 0x3, &(0x7f0000002d00)=""/113, 0x71}, 0xfffffffd}], 0x7, 0x40000030, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:49 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x198) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:16:50 executing program 1 (fault-call:7 fault-nth:0): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:16:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r2 = accept4$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'ip6erspan0\x00', @ifru_settings={0x1, 0x8a2d, @raw_hdlc=&(0x7f00000000c0)={0xfffa, 0x3ff}}}}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r5, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r7 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r7, r6, 0x0, 0x8001) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x19, 0x6, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x1d}, @func, @exit]}, &(0x7f0000000200)='GPL\x00', 0x5, 0x78, &(0x7f0000000240)=""/120, 0x41000, 0xc, [], r5, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x4, 0x401, 0xef}, 0x10, 0xffffffffffffffff, r6}, 0x78) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000440)={0x0, 0x2, 0x9, 0x20}) r9 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r10, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1041.969577][T30876] overlayfs: './file0' not a directory 02:16:50 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:50 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:16:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[0x5, 0x4, 0x6]}) 02:16:50 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:16:50 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x400}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}]}, 0x44}}, 0x8050) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f0000000040)="499985ae0b6a35a9fad96e3513ec3272c98258d6faafdad58f20c173d30269e1644fd6db5c82b51e90d0a72aa428ca235751e7b8b21484970cb964eb18df13fa7b88dce75bcb84c37cd8c45c7d9d435fcd2690a8903a1e2b6608cfb230a5d91855f210ef410082f486799bdac1ea13a1f090853e03985035c1478f119d2e203848819021d701a95588a5de7b025b965c69aa1e01963d5893717dbd2e338b1b76", 0x1000, r1, 0x42fbe2a9fb06418e}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) [ 1042.552481][T31034] encrypted_key: insufficient parameters specified [ 1042.583809][T31082] overlayfs: failed to resolve './bus': -2 02:16:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000040)=@hat={'changehat ', 0x1, 0x5e, ['/--md5sum\x00', 'em1\x00']}, 0x2b) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:16:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:51 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = getpid() tkill(r0, 0x26) ptrace(0x10, r0) ptrace$setregset(0x4205, r0, 0x4, &(0x7f0000000200)={&(0x7f0000000500)="d8b30ee5f02950025a1dd64c6d678e8ff232980030bf3ed124f62737937d8d236899815e471e5b8ff955c39ba0f637e0bc50b696f02283a574af5fa0f059b1f4c1b70ad7841c32486434db92cef39d6e94b818ba794f71481a02a9243ccb411b6782ef4e39ef56bbaa20db58106dd3c23327d297525363f15847f390bed64ba04830dcf256e694eda419324d69e66a1ef4d3d67794d6676c1ff402701dd80ae047e643c11fd66590c6c452184a7d7676e0dd2b1e3a574778969795a5a6c4f8d08519c1c28075aca7751f3df844e9f75165df666bca01d1266b3fb3768dceb1dda1b6e73678369243c4a3e2c68de9191c8a", 0xf1}) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f776572000000132e2f6275732c776f726b2469726469723d2e2f66696c6530"]) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}}, 0x108) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000140)='./bus/file0\x00', 0x40c0, 0x34) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) [ 1042.792535][T31034] encrypted_key: insufficient parameters specified 02:16:51 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:51 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x2, &(0x7f0000000000)=0x8) 02:16:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x69) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x3, 'ip6gre0\x00', {0x3}, 0x20}) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1043.238527][T31303] encrypted_key: insufficient parameters specified [ 1043.323530][T31303] encrypted_key: insufficient parameters specified 02:16:51 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001e80)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000680)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8983, &(0x7f0000000340)={0x8, 'bridge_slave_1\x00', {'veth1_to_hsr\x00'}, 0x1}) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getpeername$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000140)={0xf9c1, 0x30454d54, 0x1, @stepwise={0x10001, 0x2, 0x6384, 0x9, 0xe3, 0x74}}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000680)={&(0x7f00000003c0), 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x24, r6, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x40000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1004, r1}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) pread64(r0, &(0x7f00000001c0)=""/251, 0xfb, 0x9c) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x42000, 0x0) [ 1043.645371][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 1043.645383][ T27] audit: type=1400 audit(1583115411.859:336): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=31444 comm="syz-executor.5" 02:16:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) recvmsg$can_j1939(r1, &(0x7f0000000140)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)=""/5, 0x5}], 0x1}, 0x40000001) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') 02:16:52 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x10, &(0x7f0000000000)=0x8) [ 1043.793017][T31474] encrypted_key: insufficient parameters specified 02:16:52 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101140, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f00000001c0)={'vcan0\x00', 0x8000, 0xb}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) [ 1044.066652][T31474] encrypted_key: insufficient parameters specified 02:16:52 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x1c8800, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r2, 0x4140, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xb4, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x7, @empty, 0x3}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0x2, @remote}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000001c0)={r5, 0x4}, &(0x7f0000000200)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r6, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:52 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x2403, &(0x7f0000000000)=0x8) 02:16:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) socket$inet6(0xa, 0x80000, 0xbc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000001c0)="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", 0x0, &(0x7f0000000040), &(0x7f0000000040)="77f1b6b31568d83adbf069b9def6abf7", 0x80001000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x130, 0xb, 0x6, 0x3, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x20}}, {0x14, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x10, 0x1a, 'md5sumGPL),\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}]}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_ADT={0x54, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xdc}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x7}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0xff}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x200}}]}, @IPSET_ATTR_DATA={0x40, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_bond\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local}, @IPSET_ATTR_CIDR2={0x5}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x100}}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0x130}}, 0x44) preadv(r1, &(0x7f0000000300), 0x0, 0x4) [ 1044.626924][T31740] encrypted_key: insufficient parameters specified 02:16:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl(r0, 0xa1, &(0x7f0000000080)="defc22e21f80ab26e653017b32cd43d615122b8b5fd09fa58d1d03ed63c19aec9e4dd7ffc57b6e8a74d3f2a95694c597889136a76406e3e1678d1242d29350a53c1d6746f7296215d266620215e70b3950afd0cf7009a0264279013739d9660814f660cc0a4e9b00b7fae2b2961fd354371563270987fd8860f3b1e99ebb98fb8ea136ef085421f08e8bd3b5602c3c5bc4aa205c400c8b8ca8b4ec27c34e05787b2ffd216ed46d1ccd3dd8ae9a63fd91dfe24f863b7dcba25d22a796973156c45a022e2414d041ca1d") r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x0, 0x800000) 02:16:53 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4c01, &(0x7f0000000000)=0x8) [ 1044.920115][T31740] encrypted_key: insufficient parameters specified 02:16:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x7fff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xd, 0x800, 0x1}, &(0x7f0000000100)=0x1ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x3b0}}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:53 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x541b, &(0x7f0000000000)=0x8) 02:16:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f00000000c0)={0x9, @capture={0x0, 0x0, {0x6, 0x9}, 0x3, 0xb1}}) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) 02:16:53 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100000000000000001797a30000000000c00078005000300205e9df88a037778ecd900150000000000180007801400170000797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c92080000007949c90f30abb2a4da6325f218b7f9e1606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa2310300000000000012f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466299fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd0008000000000000067801e9867ea3c310fab3e28be5c63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000a6648b98b21f7350e47e0a9aeb2943a7fe069b"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0x0, 0xb5c899c886ee27aa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1045.661213][T32277] encrypted_key: insufficient parameters specified 02:16:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) read$usbfs(r2, &(0x7f0000000080)=""/126, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0xa54, 0x200500) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x44810) r6 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x80000000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000240)={0x0, r6, 0x7ff, 0xed51, 0x1, 0x52f}) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x41, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) 02:16:54 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5421, &(0x7f0000000000)=0x8) [ 1045.985664][T32277] encrypted_key: insufficient parameters specified 02:16:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:54 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r5 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r6 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) r7 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r7, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r6, 0x5c, 0x3, r7) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r8) keyctl$chown(0x4, r7, r8, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r9, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r10, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1046.315402][ T27] audit: type=1400 audit(1583115414.529:337): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=32561 comm="syz-executor.3" 02:16:54 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5450, &(0x7f0000000000)=0x8) [ 1046.380398][T32641] encrypted_key: insufficient parameters specified [ 1046.500700][ T27] audit: type=1400 audit(1583115414.719:338): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=32561 comm="syz-executor.3" [ 1046.540649][T32641] encrypted_key: insufficient parameters specified 02:16:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000a00)=0x14) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0x40000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)={0x8, 0x1, 0x1f, 0x80, 0x258, 0x1, 0xffff, [], r1, r2, 0x2, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:16:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x1407, 0x100, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x1) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x3}, 0x4) 02:16:57 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:16:57 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5451, &(0x7f0000000000)=0x8) 02:16:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_MAP(r4, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x0, 0x3, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x40}) [ 1049.449903][ T349] tipc: Enabling of bearer rejected, already enabled 02:16:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:16:58 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5452, &(0x7f0000000000)=0x8) [ 1049.885955][ T352] encrypted_key: insufficient parameters specified 02:16:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x208, 0xffffffffffffffff, 0xfffffffc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:16:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x200) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x4, 0x70, 0x0, 0x3, 0x5, 0x8c, 0x0, 0x2, 0x1080, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0x100000000, 0x800}, 0x2400, 0x100000001, 0x7fffffff, 0x7, 0xe6, 0x4, 0xff01}) preadv(r4, &(0x7f00000017c0), 0x2a2, 0x800000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[], 0x5, 0xfffffffb, 0x0, 0x40, 0x1, r7}) [ 1050.207114][ T352] encrypted_key: insufficient parameters specified [ 1050.310925][ T27] audit: type=1400 audit(1583115418.529:339): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=791 comm="syz-executor.2" 02:16:58 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x18}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) syz_mount_image$cifs(&(0x7f0000000040)='cifs\x00', &(0x7f00000008c0)='./file0\x00', 0x10002, 0x2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="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", 0xfc, 0x6}, {&(0x7f0000000b80)="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", 0x135, 0xab7}], 0x0, &(0x7f0000000cc0)=' D\x83\xfe\xec\x81\xcc\x93#\'\x1e\x16k\xdb\xbb\xa5\x16M\x83\xb5\xd3\x95\xdf\xbb\xaa\xd0\x1f\xff\n|j\xdc\x14XnC\xea\xe9z\t\xd7p:\xb0\xea\xa8k\x96\xdf\x12\xa0\x1a\xec>\fp_@\xe2\xd7\x1c\xbb\xc0\x19\x80\v\xab8\xc9dE\xe7\xccq*\xe8\x80\x16de\xf3\xef\xc9\x9a]\xccSZ\x81\xd1\x02Y\xc0\xce\xaae^\xea\x03me3\xa3Q\xda\xc8\xcc?#F\x97GS\xa1\xf4\xb1\aF\x92\xc4\x88z\xfb\x99\x04\x93\xa2') listxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)=""/116, 0x74) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x800) sendfile(r4, r3, 0x0, 0xffc) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f00000002c0)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x6, r1}, 0x38) gettid() bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r5 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000900)='/proc/thread-self\x00', 0x8000, 0x0) r6 = socket(0x40000000015, 0x4, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_dccp_buf(r6, 0x21, 0x80, &(0x7f0000000a80)=""/179, &(0x7f0000000b40)=0xb3) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000a00)={0x9e0000, 0x0, 0x800003, r5, 0x0, &(0x7f0000000980)={0x990af8, 0x5, [], @ptr=0x20}}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000740)='/dev/snapshot\x00', 0x820c1, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r7, 0x5) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000940)='cgroup.threads\x00', 0x2, 0x0) sync_file_range(r8, 0x8, 0xfff, 0xc) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x8081, 0x0) getpeername$netrom(r3, &(0x7f0000000300)={{0x3, @null}, [@netrom, @rose, @null, @default, @default, @null, @null, @bcast]}, &(0x7f0000000380)=0x48) write$P9_RSYMLINK(r9, &(0x7f0000000680)={0x14, 0x11, 0x1, {0x10, 0x4, 0x3}}, 0x14) r10 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r11 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r11, r10, 0x0, 0x8001) ioctl$KVM_IRQ_LINE_STATUS(r10, 0xc008ae67, &(0x7f00000009c0)={0x8, 0x9}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 02:16:58 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5460, &(0x7f0000000000)=0x8) 02:16:58 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001fc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) setsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r8, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) setsockopt$inet_sctp_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r12, r11, 0x0) r13 = geteuid() setreuid(r13, 0xffffffffffffffff) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r14, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r15 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r15, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1050.411699][ T877] CIFS: Attempting to mount /dev/loop5 [ 1050.449821][ T877] CIFS VFS: Malformed UNC in devname. [ 1050.524527][ T27] audit: type=1400 audit(1583115418.739:340): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=876 comm="syz-executor.5" [ 1050.653073][ T27] audit: type=1400 audit(1583115418.869:341): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=876 comm="syz-executor.5" [ 1050.700393][ T944] CIFS: Attempting to mount /dev/loop5 02:16:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}, 0xfffffffe}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000000)='cpuset\x00', 0x0, r4) [ 1050.780408][ T944] CIFS VFS: Malformed UNC in devname. 02:16:59 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6364, &(0x7f0000000000)=0x8) [ 1050.828203][ T27] audit: type=1400 audit(1583115419.039:342): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=1091 comm="syz-executor.2" [ 1050.922438][ T947] encrypted_key: insufficient parameters specified 02:16:59 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x48000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x1, 0x80, 0x41, 0x0, r0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="d3d8ed5000", 0x0, 0x6, r1}, 0x38) 02:16:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r0, 0xc06c4124, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1051.219576][ T27] audit: type=1400 audit(1583115419.439:343): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=1212 comm="syz-executor.2" [ 1051.301853][ T947] encrypted_key: insufficient parameters specified 02:16:59 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x1) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x10}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000001c0)="f8dce9b09e10e558f6b2792fcba90711d45d480810b8d19f88fe373b05a4c4af9e73a36634bd8cc293d4a48e95e5737faa2ed5c7866c2a081073f91211d908ff86", 0x1000}, 0x38) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) bind$unix(r3, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)="5eff1fa2401d965ef2006755be2138261cc49a79a63ea54ca2903777da523ac6bc4dd41f7c4c46e2bb0caf92a781d0deadf2af5f2b6fd50bae58ae7a8f5bf07fc5857e5c3f50b3279ed7eb5ce9c70d68080000006b91950000000000", 0x0, 0x4, r2}, 0x38) 02:16:59 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x8912, &(0x7f0000000000)=0x8) 02:16:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x30, r3, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="375927bd7000fcdbdf25010000000000000008410000004c001800000006696200"/98], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x1) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0xc002, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)={0x84, r5, 0x108, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x70, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_vlan\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004094}, 0x8000) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}, 0x1, 0x0, 0x0, 0xc801}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x40000000015, 0x5, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') r10 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r11 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r11, r10, 0x0, 0x8001) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f00000008c0)={0x2, &(0x7f0000000880)=[{}, {}]}) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r12, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x28, r13, 0x800, 0x0, 0x0, {0x6}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'erspan0\x00'}]}, 0x28}}, 0x20040001) sendmsg$L2TP_CMD_SESSION_GET(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000840)={0x28, r13, 0x100, 0x0, 0x80000000, {0x6}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x28}}, 0xc890) sendmsg$L2TP_CMD_SESSION_GET(r7, &(0x7f0000000800)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x2c, r9, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xd3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x8080) setsockopt$inet6_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) r14 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r14, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r15 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000f00)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r14, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xfe0b30f6f140e346}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r15, 0x10, 0x0, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c804}, 0x24008010) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, r15, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bridge\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000400) [ 1051.550563][ T1427] tipc: Enabling of bearer rejected, already enabled 02:16:59 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1051.708848][ T27] audit: type=1400 audit(1583115419.919:344): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=1426 comm="syz-executor.0" 02:17:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x5, &(0x7f0000001440)=[{&(0x7f00000000c0)="ab2dd25d99007d22a33381cd86593cf114a6204d594629c6337cfd00d1e0ecfc4769cf89a892b205911126e1d8fe1e769095bb32d706e437bfac3fceb4a4dae8be1242cd7815ace4f525067cc2d1f42527a67ed897b3d0235ddd19fec5bd7730df1743fcb299a68a19aeb051b99b0478f67f0e1fcc089fb1d564ef449b8913cc6d1f705df5e36585b9ae41b4791e0454f38ac1a314a2591b8e35ef17afd7294acfcff68e61d5938d", 0xa8}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000180)="8e959ce193647d9fee98f9fe30bf327515bfc97fd6a83f917fc8ce72c99368443da3dc2d1409888685457bf578bf15a6b7d97b8e2943e8e065f104355baf76fbb8512f61548f4664c6156a74bf85a8718584fd68c220aa44462e4cd4e958cddde311865fc105c958bb2362cc2cd19307d221ace8629fd2bfed7d1546370142e939fd78d75a5ee44b5d4474881f71e2c8e1158cabb66f75983f0b8a0d6693b00b3aa73963355ffd61075f0989ab440b2b795707d845aa63dda16344fee5e9f39e189e13f7a09c3da6bf2bfd8813979f6e496213ef6b73ff34f101d26ca634e34ce8021aa39f9fdbfc50d0ff9bfdf7c7a6f93b7466", 0xf4}, {&(0x7f0000001300)="9ce768aa0f5802922adc9e52c324b8ddcf1c4cc543ccea497287a63c8d444c4e6867883fe114ade6a2aaa973508c3d6a7a3ec813c6c6945c17ec3d853db888d5afd93314392150d8cfe4672b90fed0dd68615cf5a053111fa7f4b5aaf7f5e6f0ecce07da6eca037eae1411deb4846b0e488f1021569e0670c40d20376422e331f5f3aeee842169be0c538bbad21cbb3797623e13c00072200ad7ca479826536d570394617700b69e5c3a0c2e9347b5426f7ed6e3f06ffa380f95a5dc5058fb", 0xbf, 0x9}, {&(0x7f00000013c0)="ba6b89b056e65abac1560ee7aaf8f5f1f95141a2d298d4e13bff53ad0672088e8f00f869a4e5566383012506c402cb270415ca4fecb42190b3eef19556069d734210b401604eb892e6bedaeadc", 0x4d, 0x2}], 0x10000, &(0x7f00000014c0)={[{@huge_never={'huge=never'}}, {@mode={'mode', 0x3d, 0x3f}}, {@huge_never={'huge=never', 0x3d, 'cgroupvboxnet0!%'}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@mode={'mode', 0x3d, 0x3}}, {@mpol={'mpol', 0x3d, {'default', '', @void}}}, {@huge_advise={'huge=advise', 0x3d, 'net/arp\x00'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x0, 0x34, 0x35, 0x64, 0x34, 0x33], 0x2d, [0x34, 0x34, 0x37, 0x39], 0x2d, [0x35, 0x37, 0x0, 0x33], 0x2d, [0x31, 0x39, 0x64, 0x63], 0x2d, [0x65, 0x35, 0x33, 0x62, 0x35, 0x65, 0x61, 0x38]}}}, {@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef', 0x3d, 'procproc\\+vboxnet1'}}, {@appraise_type='appraise_type=imasig'}, {@permit_directio='permit_directio'}]}) preadv(r1, &(0x7f00000017c0), 0x2a2, 0x800000) newfstatat(0xffffffffffffff9c, &(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2400) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) r5 = getpid() tkill(r5, 0x26) ptrace(0x10, r5) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f00000017c0)={0xffffffff, 0x4, {r5}, {0xee00}, 0x1f, 0x5}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) setsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000001940)={'IDLETIMER\x00'}, &(0x7f0000001980)=0x1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r8, 0x0) syz_mount_image$iso9660(&(0x7f0000000280)='iso9660\x00', &(0x7f0000001600)='./file0\x00', 0x8001, 0x1, &(0x7f00000016c0)=[{&(0x7f0000001640)="674b294d4dbb80993d9a35a1817ff57b1a565e653def1cd6e5a4c4de7be6fab42bc3de71b1e49bbc9554459d98adab78666e828edc91605240a1892fe585c2e0f0f73f30e5c4f2e84a220eb989e430f9f3a6bc290489bbe0d71e6536504c59da", 0x60, 0x4}], 0x202001, &(0x7f0000001840)={[{@map_normal='map=normal'}, {@cruft='cruft'}, {@nojoliet='nojoliet'}, {@nocompress='nocompress'}, {@block={'block', 0x3d, 0x800}}, {@gid={'gid', 0x3d, r2}}], [{@permit_directio='permit_directio'}, {@subj_role={'subj_role', 0x3d, '+*\\!\\[}posix_acl_accessvmnet0vboxnet0&)vmnet0wlan1vboxnet0'}}, {@dont_hash='dont_hash'}, {@fowner_eq={'fowner', 0x3d, r6}}, {@fowner_lt={'fowner<', r9}}]}) 02:17:00 executing program 0: ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x1, 0x3, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:17:00 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x8914, &(0x7f0000000000)=0x8) [ 1051.989987][ T1435] encrypted_key: insufficient parameters specified [ 1052.004312][ T1650] tmpfs: Bad value for 'huge' [ 1052.141352][ T1654] tipc: Enabling of bearer rejected, already enabled 02:17:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1052.461868][ T1435] encrypted_key: insufficient parameters specified 02:17:00 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x8933, &(0x7f0000000000)=0x8) 02:17:00 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = getpgrp(0x0) r3 = getpid() tkill(r3, 0x26) ptrace(0x10, r3) r4 = syz_open_procfs(r2, &(0x7f0000000180)='clear_refs\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000080)={0x40000, 0x0, [0x7, 0xfffffffffffffff7, 0x400, 0x8000, 0x7fffffff, 0x5, 0x5, 0x91]}) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x1000, 0x2, 0x4, 0x80000, 0x3, {0x0, 0x2710}, {0x2, 0x8, 0x0, 0xde, 0xf7, 0x4, "f92093ac"}, 0x2, 0x4, @userptr=0x5, 0x1ff, 0x0, r6}) ioctl$VHOST_SET_VRING_ERR(r7, 0x4008af22, &(0x7f0000000000)={0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x400040, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r8, 0x4010ae68, &(0x7f0000000300)={0x4000, 0x24000}) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x400a80, 0x0) setsockopt$inet6_dccp_int(r10, 0x21, 0xa, &(0x7f0000000200)=0x2, 0x4) preadv(r9, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:01 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x12a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x1, 0x0, 0x0, 0x0, 0x107}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x30, r3, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r3, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x2, 0xd084, 0x7fffffff, 0xffff}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x2824}, 0x8000) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa1}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x80) [ 1052.937179][ T2094] encrypted_key: insufficient parameters specified [ 1052.957806][ T2122] tipc: Enabling of bearer rejected, already enabled 02:17:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000240)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES16=r1, @ANYRES32=r5, @ANYPTR64, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB="68c17d54c47281491fa26577c6c83213403d69631f335cbb0e81040a7107c89bf204c344ed07296593b471fa193c19c3520f26e48cdaf295efa77d5d7d7d1bd12d632056b79282e0fef7a7ce7b97804c8bc1f3d71afca8eecbc982b766956a7f966cbc"], @ANYBLOB="737ee66a988a6d0f8526dc4ac0c206a169e92866f63d776f868ca50e22fcf45641a3c9d962b2893e4892262cf85bff46a29780ad590b09ede1d6bf20d0a3bd87eff20c3ae5c4c4a9", @ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESHEX], @ANYRESOCT=r0], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r6, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:01 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x400454ca, &(0x7f0000000000)=0x8) [ 1053.125562][ T2270] encrypted_key: insufficient parameters specified 02:17:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e00000000000000000100000000000000014100000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) 02:17:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x3d, &(0x7f0000000740)=[{&(0x7f0000000780)="fe198997b3baae25f94ec71f19ed6cc24e9d10d19dee8c663f0b7cd5672cb011faa74931d3d6f7a86f0fbecf38e9dd25b7563a0db6232e1ff171cf5e50d1489bd0a1f625a8c470e9c9063dd114750aca04f0bb9d9d48a9f7140b8cd9ae9f67f23490557962bbb6517141dcecf962045b6f8c98df4fad4a0647fcb339ba69438836f846e6c15b41c29d4dcb73696ebefed85e3431f147d51e77be0c54807eaaa7f3a8079f7d308a5080dc61305413060e93fbc3ead009ed879f5bd069eb37d0491968debeb6e86f4789141c06b60a7225f0c5aa4bda95a3dde02d8a4d4ef6b1fbd218ac1ffb965311e3c0c909f28620b1b22221818bd48cba72f5e33c69f54ce4806612c62a55b0144767a3205f159ca22bc987af2a08aac11dec95b9cb00"/302, 0x1a000}], 0x1, 0x0, 0x0, 0x44041}, 0x8000) connect$netrom(r1, &(0x7f0000000240)={{0x3, @bcast, 0x4}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfffffffffffffff7, 0x80000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') r5 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r5, 0x40086424, &(0x7f0000000300)={r6, 0x3}) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r4, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x5c}}, 0x4004040) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r4, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40811}, 0x4000) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000040)=0xf000) 02:17:01 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000780)=""/135, 0xffffffffffffffcc) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = getpid() tkill(r2, 0x26) ptrace(0x10, r2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000140)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000100)='net/ip6_tables_matches\x00') preadv(r5, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:02 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x400454cd, &(0x7f0000000000)=0x8) 02:17:02 executing program 2: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x80000, 0x0) read$midi(r0, &(0x7f0000000080)=""/169, 0xa9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1054.020816][ T2631] encrypted_key: insufficient parameters specified 02:17:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="fc10c74dff2a8c0f6989", @ANYRES16=r0, @ANYBLOB="110e000d0000000010000800000000000000ebe0e3af39196c904cf3c0c7000001410000002000e4c0a3964a2090894cd40c329a775b78a6429638c770d3c7e6890e897573445b075ef7f71362410fcbdde4826ad9f1a0cdc5aed79b11ca5d9de312a4f46b574789b34bf412aeb754fd0071696c46a939ae4fc68f6673cf8b84bbf3"], 0x3c}}, 0x0) 02:17:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x1, 0x80, 0x3fc, 0x48, r0}, 0x40) connect$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10000, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r2}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r2}, 0x38) 02:17:02 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40049409, &(0x7f0000000000)=0x8) 02:17:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b43a53e04540a10d503b9a3cf74fb90e74947046cdb56f33df8c3b6f93c307d03951c8e048b0b58b3371098413aee696137ae4849de8b115eac005f91501e0edceccb1628c89e6920adf90603ad6d61d97e56d47cb5946b866f7e30acf7f13ae3a79e536325abcf883aabe3efc7a0a591742f90eda1d89cf17377c5a851f4329270676a35d0a4302a4e4909386d67dcb", 0x90}], 0x1}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000300)={"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"}) [ 1054.457021][ T27] audit: type=1400 audit(1583115422.669:345): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=2962 comm="syz-executor.5" 02:17:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0xfff, 0x0, 0x4, 0x8001d000, 0x1f, {0x0, 0x2710}, {0x3, 0xc, 0x7f, 0x4, 0x6, 0x0, 'Ma\'9'}, 0xffffff71, 0x2, @planes=&(0x7f0000000040)={0x1ff, 0x800, @userptr=0x7, 0xffffffff}, 0x1, 0x0, 0xffffffffffffffff}) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) getpid() [ 1054.558988][ T2631] encrypted_key: insufficient parameters specified 02:17:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0xfff, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r1, 0xe11, 0x80000, 0x0, {{}, {}, {0x20, 0x17, {0x1, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 02:17:03 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000006c0)=ANY=[]}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000000)) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000080)="2e0f38f126098866dfa8a1c00f07baf80c66b851f8608666efbafc0cb00dee6467660f3810cf6766c7442400440000006766c74424022ad16bc46766c744240600000000670f011c24f30fc7752266b80000c0fe0f23d0b89b008ee866353000000f0f23f8b83b008ed866b9800000c00f326635010000000f30", 0x7a}], 0x1, 0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = socket$kcm(0x29, 0x7, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r7, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000680)='./file0//ile0\x00', 0x56080, 0x59) r8 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r8, &(0x7f0000000240)=""/112, 0x349b7f55) r9 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r9, &(0x7f0000000240)=""/112, 0x349b7f55) [ 1054.992710][ T3130] tipc: Enabling of bearer rejected, already enabled 02:17:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/168, 0xa8}], 0x1, 0x800000) 02:17:03 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8) 02:17:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) write$P9_RWALK(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="570000006f01000680080000000007000000000000000001000000000000000000000000020300000001000000000000000801000000060000000000000091000000000100000000000000000000000000000000000000c9c87f8337a28159b9e2db59ddde3b4cadebaa5e7d"], 0x57) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1055.516469][ T3182] encrypted_key: insufficient parameters specified 02:17:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x7c, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x59d6d9569d12312d, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x34, 0x4}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x87}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x40) [ 1055.735749][ T3515] encrypted_key: insufficient parameters specified [ 1055.795373][ T3534] tipc: Enabling of bearer rejected, already enabled 02:17:04 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40186366, &(0x7f0000000000)=0x8) 02:17:04 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/654], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f00000001c0)="7a5e4ed4d39adca171036a73f2fa7b40ff4e7e07884e7908c2b0c850af44e2fb4a20bd64ea580533cb777ff23338f93a800392744590f7cabb51240a275335d7eea99c7774527336694da3393fcf87ef516c882a2f82444d5252680ee1191d2ec54e18cc344bd055c1319ca2e527181f2f038e4482ce82a38d384358a7ee5d0e91a2bd788a89a643564f4e0e6c7d53a1d52f8a94a637ea356062d2428df15fac05cf2baf667d3c2c37731f52acf7f766c24a20e3a38c616621d6f933c7", &(0x7f0000000700)="ef13cb514540605d2d49b48e6fe0888c31ca81a9a6fd2a74325f79f18f7a422e6ad0b019fefbe119b116671ded0afce852e0351b2c16abbf23af79f6d09af14dfc2af79882c08d8790965256d8e6c9830af5ebaafbacb4f43d8b785719b6f5a8f700114dfd13bc8df56e54c82ba11c00f764dda2aa4be531bee606b0b3bceea74448458fbdb7d8bc36b98bfe1c1f748fac01e2", 0x8001, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000080)={0x0, 0xc7b, 0x3, 0x7}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000440)=0x1) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x0, 0x2) syz_open_dev$vbi(&(0x7f0000000480)='/dev/vbi#\x00', 0x1, 0x2) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r7 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r7, r6, 0x0, 0x8001) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f00000007c0)={{0x7, 0x7}, 'port0\x00', 0x84, 0x10400, 0xe415, 0xc5, 0xb4c, 0x4, 0x3, 0x0, 0x5, 0x2}) r8 = socket(0x40000000015, 0x5, 0x0) connect$inet(r8, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r8, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r8, 0x894b, &(0x7f0000000180)) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fsetxattr(r9, &(0x7f00000006c0)=@random={'btrfs.', 'vboxnet0posix_acl_accesslo\'\x00'}, &(0x7f0000000640)='n\x00\x00\x00\x00\x00\x00\x00\x00\x00v3Tf\xd4\x8d^J\xa1\xc5:#\x9d\x9e\x9b)\xb3\x80\xd1\xcc\xec\x15\x92q\xfe\x14\t\x8cD\xc6\x12\xef9\x140b\xcaS\xa6:\x1b\'MI\x86\xbc\xd8!\xa3\xbb\xad\xf7 R\xa2\xc5\xf205\xc0to\r\xcc\x9d\x94f\xe8M#J\xf9\xd9\xda\x92N(\xeb\x84\xd5y\x98\xf0/\x80C ', 0x61, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:04 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5807, &(0x7f0000000000)=0x8) 02:17:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x103}, r1, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x5, &(0x7f00000000c0)={0x0, 0x1c9c380}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="110e002000000000000001000000000000000141000000200017000000000000000069623a6261746164765f1f6c6176655f30000000"], 0x3c}}, 0x0) [ 1056.436796][ T3682] encrypted_key: insufficient parameters specified [ 1056.510548][ T27] audit: type=1400 audit(1583115424.729:346): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=3785 comm="syz-executor.5" [ 1056.531885][ T3788] tipc: Bearer : already 2 bearers with priority 0 [ 1056.559417][ T3788] tipc: Enabling of bearer rejected, cannot adjust to lower [ 1056.605751][ T27] audit: type=1400 audit(1583115424.789:347): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=3785 comm="syz-executor.5" [ 1056.702136][ T27] audit: type=1400 audit(1583115424.849:348): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=3785 comm="syz-executor.5" [ 1056.724309][ T3682] encrypted_key: insufficient parameters specified 02:17:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x48, 0x0, 0xfc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x902}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000040)=""/136) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:17:05 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f201870700000000000000905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:05 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5825, &(0x7f0000000000)=0x8) [ 1056.986368][ T4004] tipc: Enabling of bearer rejected, already enabled 02:17:05 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000280)="8ca3b1b96dbd38b426d5733ac69dc852ae427ac4cc49666c352178ffe92e325c7caf8a8e6324f768cb698c9abdb2276f3cab5f7ad75d6f98837fceec0580300000d7c75db497ea6c6fb5e37d193220e926915f0e762163ded1e2", &(0x7f00000001c0)="6f940e8d38f8ce4ddf8042f1e6c76bbe4b0662abe8bea997ca113743493cc821f2f26dee53c15682ebc193d480cd0f5cf234bbf91faa6f373e881f7e2cefa61d404f66104af86a564db0a33d9ccc48f97cb3c08ab5ff228dc1f8ce3d15994275ebde6f477992bb1621400799e91062bceaf4699e772273e426c438bb750e9ddf4a98be2d6eb631e1377e126304791d2f9e8244540f67aff82e6685acacf7915e3249000000001200000000000000000000db6b0000000000000000", 0xffd, 0xffffffffffffffff, 0x4}, 0x38) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x204340) r0 = getpid() tkill(r0, 0x26) ptrace(0x10, r0) r1 = syz_open_procfs(r0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0xa0380, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000640)="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", 0x0, 0xfffffff9, r3}, 0x38) 02:17:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0045a740cebeacb5afb518664ceaaf5a7be9f1fce175ba6f34d6dd4f8763393391b7d56fc571c393389c6f074464bd3258ae23b5db0f3c19d4b7cef5af9449ce86c70e2d9770c75cba024176c7b91e9019f8eb561062a6ff72b263873d3ab7916097dfcca728b35f22698d57ab327ef79456e64a57dd3ee8a1ee36b6ce48808aafc041cf42e1a69ebae0d01defb1d4d42b6b7f545094d0064b59ce5318a4d8fe735b96c901b3531f2bc5a6d12ebc474108f94ea9000000", @ANYRES16=0x0, @ANYBLOB="110e000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 02:17:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)="4500000000a419a97563fe34725b958f1dcb24213c73e0b8d0a2378464f2eb9599c0a7dbc638da4698a92469c902e9b953af7afa97360fc723cf29143637c66775ab7eebeb1903b9689b4ed7bfb3df17e2da05f2bf4f44a31611e1154f468edc31fdd2661c705ea80e7e45c39155f768d3815f6d8dbedb6b60a7f4397e9a2834b3dfb9809f697076", 0x0, 0x6, r0}, 0x38) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "fffb357d320607bf8ce5c6868c9f7ff35bbec69a73ff580d72eebbfaa3e1e416142c391737e84c5c89d4d160bae01d49dc2c0c573eb75e5d86599751"}, 0x40) 02:17:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r4, 0x40046104, &(0x7f0000000000)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/snapshot\x00', 0x10100, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000002940)={0x10, 0x30, 0xfa00, {&(0x7f0000002900)={0xffffffffffffffff}, 0x2, {0xa, 0x4e24, 0x7, @empty, 0x1}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000002980)={0x11, 0x10, 0xfa00, {&(0x7f00000028c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r6}}, 0x18) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r7, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1057.246334][ T4009] encrypted_key: insufficient parameters specified [ 1057.379358][ T27] audit: type=1400 audit(1583115425.599:349): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=4120 comm="syz-executor.2" 02:17:05 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c582f, &(0x7f0000000000)=0x8) 02:17:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 02:17:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000e00000/0x200000)=nil, &(0x7f0000e89000/0x1000)=nil, &(0x7f0000f8d000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000e6e000/0x3000)=nil, &(0x7f0000e39000/0x1000)=nil, &(0x7f0000000000)="1d847086750ec3", 0x7, r0}, 0x68) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') read$fb(r1, &(0x7f0000000100)=""/41, 0x29) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000140)={0x165, 0x100, 0x0, 'queue0\x00', 0x6}) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x10001, 0x80, 0x400}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1057.644029][ T4009] encrypted_key: insufficient parameters specified 02:17:05 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) r7 = socket(0x40000000015, 0x5, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000a00)={&(0x7f0000000640), 0xc, &(0x7f00000009c0)={0x0}}, 0x2004c8c0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1\x00', 0x240340, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000080)={0x6, @sliced={0x2, [0x7, 0x5, 0x4, 0x400, 0x6, 0x0, 0x4, 0x8, 0xbad, 0xfffb, 0x0, 0x81, 0x9, 0xbe, 0x4, 0xfffc, 0x20, 0x100, 0x7fff, 0x401, 0x0, 0x4, 0xfff7, 0x400, 0x7ff, 0xa4, 0x3, 0x7f, 0x9, 0x7f, 0x3, 0xa479, 0x8001, 0x8000, 0x1f, 0x7, 0x20, 0x8001, 0x7, 0x2, 0x3, 0xff, 0x6, 0x4, 0x3, 0x1, 0x9, 0x8], 0x5c}}) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:06 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5849, &(0x7f0000000000)=0x8) 02:17:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) [ 1058.276103][ T4625] encrypted_key: insufficient parameters specified 02:17:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x400080, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') [ 1058.507519][ T4851] tipc: Enabling of bearer rejected, already enabled [ 1058.559699][ T4917] encrypted_key: insufficient parameters specified 02:17:06 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4020940d, &(0x7f0000000000)=0x8) 02:17:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2282, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = fcntl$getown(r0, 0x9) r4 = dup(0xffffffffffffffff) r5 = socket$alg(0x26, 0x5, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r7, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r3, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='net/arp\x00', r8}, 0x30) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r9, &(0x7f0000000280)=[{&(0x7f0000000080)=""/249, 0xf9}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000001c0)=""/163, 0xa3}], 0x3, 0x9) 02:17:07 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r7, 0x40000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x101180, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000080)=0xd23) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:17:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000002cc0), 0x1, 0x40, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000080)=0x1, 0x4) [ 1059.165887][ T5076] encrypted_key: insufficient parameters specified 02:17:07 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40305828, &(0x7f0000000000)=0x8) 02:17:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000140)=[0x80, 0x3f, 0x200, 0x3, 0xb, 0x80, 0x7], 0x7, 0x1001001, 0x1, 0x90000000, 0x4, 0x6b62, 0x5, {0x7fffffff, 0x8000, 0x3, 0x3, 0x400, 0x6, 0x8, 0x766, 0x8, 0x7, 0x5, 0x8d, 0x73441705, 0xd, "97859704f99255230f0000f915293f7978050bb10f26575c3a2f1a29980e7b7d"}}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000780)={0x12c8, 0x12, 0x20, 0x70bd26, 0x25dfdbfc, {0x28, 0x6, 0x7, 0x7, {0x4e20, 0x4e23, [0x40, 0x3, 0x4, 0x4], [0x0, 0x0, 0x7, 0x7], 0x0, [0x198, 0x20]}, 0x1000, 0xbb}, [@INET_DIAG_REQ_BYTECODE={0x6f, 0x1, "398b922fb782b70ca4abc8d931df155256bf687121e2eb541b363a165f6d3493f6962180dc29db5f9f67d023f90033ae6410f3832b0e32b09f072f34db911f1e82a647118dc9ee4e536c1e179dec60f8d5a004c4f8d2876e8259364541821d327a5b44149689b78c977a14"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x37, 0x1, "e7008c2544f8a9c02a9c2678c2aaed0ef3879e4e9cbbf39b04f0ffbca4a2dd8e8deff22c6cd75098792ba5bacab72a9bc135fb"}, @INET_DIAG_REQ_BYTECODE={0x2a, 0x1, "db40ace06ba448c2e5b08edf3f86142c330af86e81e6606a2a7465d43cb7467bdb9a0c47b148"}, @INET_DIAG_REQ_BYTECODE={0xbd, 0x1, "0d0e60a0786052b8f1383573923c96a5f79f4aa67fc995b271a1ec4dbfdd4e857090388908d8def57969807845fa860f2c7935dbc4846ac60e7ca9f5d6a45b3e40fbcd1d4ba2f682af3856532ca692a34066c4e14e8ff3e218a1c96d7040c44ce11f2f6bf7a8711e51e59d99004a57175663aef69080600db09c4359e23fd11ebe8b0fc4841e0c0bea8cce76ef8e3c62b641d18f5db86e1a35f020ada9c02adba43dc2fcb3d96d5726d967c57c25264b3c51445d61d9d6b73f"}, @INET_DIAG_REQ_BYTECODE={0xe2, 0x1, "594d8577d618083a74165c5afb95c70a03a22740eba9f7fced8bb6577f5b4990c94f60077ff195759b58db2750af246138d7b0536730100db4ed66ccc1cae58d430ef0e78a678240213a7b37940e7bd9f0132750cd91d5a2f13f6483bca2fa76040487edc2c06dc931a1c75aaf635d9aa3172e65df002c414f0ab7b7ecdb5285c8682af4f6133b3927222a5c26f3cda935eafc432d675759eadb8c9c36d916cb6ae86a901d5e4891babc68a4a75abbe66a387833b2d95d6b40cd83b53d238a49244ef7ed69c8926e1b10cca611040282272f193e47ad573d406cb29a376d"}]}, 0x12c8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x82, &(0x7f00000001c0)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000002c0)={r6, @in6={{0xa, 0x4e24, 0x6, @empty}}, 0x5, 0x10001, 0x5, 0x8, 0xb299}, &(0x7f0000000040)=0x98) [ 1059.542702][ T5076] encrypted_key: insufficient parameters specified [ 1059.573286][ T27] audit: type=1400 audit(1583115427.789:350): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=5394 comm="syz-executor.5" 02:17:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000000180), 0x1, 0x20022, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:07 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"/649], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000000)={{0x80000001, 0x1f}}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:08 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40305829, &(0x7f0000000000)=0x8) 02:17:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x200, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)="d6d63b2a3aa810dc8e973eeddda97708a1a428247ff2b54092f1a06f69cc8d389ae88c2e3d95a9e4c0b48bc227ddd468b7a1fb59545f19824836aaf4d88a24260000000000000000", 0x0, 0x6, r0}, 0x38) [ 1060.075231][ T5585] encrypted_key: insufficient parameters specified 02:17:08 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendto$l2tp(r0, &(0x7f0000000640)="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", 0x1000, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x9d, 0x1}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) [ 1060.427070][ T5701] encrypted_key: insufficient parameters specified 02:17:08 executing program 2: r0 = shmget(0x1, 0x1000, 0x10, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x80}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e21, 0x7ff, @mcast1, 0x1ff}}, [0xcb, 0x1, 0x6, 0x10001, 0x8, 0x3, 0x6, 0xffff, 0x101, 0x1, 0x851, 0x2f1d, 0x3, 0x3, 0x7fffffff]}, &(0x7f0000000300)=0x100) sendfile(r4, r3, 0x0, 0x8001) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x2, 0xff}, {0x1, 0x200}, {0x0, 0x5}, {0x100, 0x2}]}) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r7, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc02300, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$TIOCNOTTY(r1, 0x5422) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x402000, 0x40) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000cc0)={0x0, 0x0, 0xffffffffffffffff}) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) fstatfs(r5, &(0x7f0000000140)=""/228) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4008641c, &(0x7f0000002c00)={r6, &(0x7f0000001c00)=""/4096}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)={r6}) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000000)={0x4, 0x6, 0x401, 0x5}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000080)={r6, 0xc}) 02:17:08 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1060.701193][ T27] audit: type=1400 audit(1583115428.919:351): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=5917 comm="syz-executor.2" 02:17:08 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4030582a, &(0x7f0000000000)=0x8) 02:17:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000a80)={0x3f, 0xd, 0x4, 0x20, 0x0, {0x0, 0x7530}, {0x4, 0x0, 0x9, 0x5, 0x22, 0x2, "00020300"}, 0x80, 0x2, @userptr=0x8001, 0x8515, 0x0, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000100)={0x2, 'xfrm0\x00', {}, 0x1}) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r3, 0x0, 0x8001) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000000)) sendmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000000900)=[{&(0x7f00000001c0)="3bdc0ad5265968abd8f6c2564f356d50f01e46b66b1c26905b668da7e7955726c192cf97cbdf9da69dc5150923312fde2ca5a1c6355b8b0c5c5c149201931fdfe6b6d05b2531aba45c8bf10ba1ae216add8c37c55c91f7dab9f2312a255a7a451b60ec83fb137fac9c35", 0x6a}, {&(0x7f0000000300)="8b851ca2c739b7320e5cdd0a522f5888575a571cb7eef42504a4fc1957684e8ec5f53d8d65c1bf5ba800f311cca1d4671f36595da48a2c355d00fea92813203e062e84b5aa8fcaefd54d8051f7f0c821359c77c01fd96821a64a66b4e8b14f2d4dee337e6a6e3f9ab5bdaf2e1f35a81e0d66760e91ff5d03e4c629863f15929f0a8b954f7d3648805ba6f6913b69eae6518aeb831cf4d3ae2117395803ccbfa64bca77fea313435c8cf9bf08f6c1ace3e951b06c85c77683a21b423f86ad82bd5c7d8a170c00e1c01d1920b790a599cf82aa954d599f3893aed728605abffb30", 0xe0}, {&(0x7f0000000400)="b6c73a0738859401b2d1153385abd37d73d7c0f2013439900ae3e3ee1a2d97c16d61ec4ea731d046e15ee11a9315907ae3aa375bf64798828e81f3f3ae52866c4186d8e88088a5a69df056a7004f9dc41fd4abe2016be204cb59fb0e90696f05bc5fab899e988d6b6dac080e598c2cd4bd0ba6fd9ff592b87a3149bd77f0a91546ac1422dc58b67ed91f6f5492f19c3e05e0338513695dee3bea5ee95c67397c9f819ef95e0076a9746b93d2a253269eb4691bd1bc25340fdd92657335e0e3bb30d6ab9b23", 0xc5}, {&(0x7f0000000500)="c420502235c7c032335f1c73080eb914cda4119cff5219f6fa6f7b0b49c9e93a57913c26aae5776bd70bc3b68ddf85155d581ba7279e01cd6945114b8d033b81ea39982942f3817ea2c09d6161a1316cf875286569f2fcc39cba8d2b0f28c494f7978acb83725358543cf8b72d44d76e0cf767044bc3f4bc1f84716cb68253f5dea314f486cd326c2312e1fe192b2d02318efcf75621ba7a5157990774f8459cf6fc8321690baf8b65a8e2a69d1e4429a0f744e89adea9cf9cf7c2d90cfbd29d0aa98ad114d248c5cc34a03a278054cfd542", 0xd2}, {&(0x7f0000000600)="872f29a4c79f8e2d135c6fbbddbfc60992c097212aaed4575f", 0x19}, {&(0x7f0000000640)="888bd1d8d0d8db4943330aa70aa58507ce5a87a8d157a4db0a3fcd416ed25eba76707e6f24fb3e9da19fb728c6bee833034c30a965c82787facc7ff010f36f796d23dc30367bc6e90e53441233d61650c74302f8b28984e95d18c06ca53d9385b7f83f740d6b8021b504faed5b603a63b9210b4ebaa36849643011cd2b6a041ba519482800fc6b64551eb9d547658ffeb2903787f6584216bebd041b8daab4509d9e440bc992e8345d191a83ae2cdfd347c282a32a9f2d52114a9b3bad89507fdaeb9e4e00cc1cec51f789d76d6425888212", 0xd2}, {&(0x7f0000000740)="598c7ad352b920a47d611efe9d38249a3f8a4ba51c20c3cc26f1bf2ce96e4db64c4ffe4fa9a1f9101728c8", 0x2b}, {&(0x7f0000000780)="2f79977cf7ccb44c6ce4ca6ccdda96e55e05a596e7ef41d20039c220b7508bd27851e79d51f02d1b25f7ecac7e29ca026f0c62011fd027b22085b4f9d392eca997e3e268a926f42a7f67ba67db0c3fc5", 0x50}, {&(0x7f0000000800)="2f2f04df10694643b4a8b63a78e2dc6eba5a95f83b2c167701b4d6d92d0635409ee03e280d08a76f2ede7555215e67b09dd7c4707adab665c29558cbc42e9f6cd476280cab995a5cc3e81959b8d588c3c18728094b08560f95ede8c6e1388d4834a9d1be7bbbb51b2554fbac2b749fed3ce8e03c59c3004281e80aa56f11a1582159e50924ceafdc711def875e9af2e77811eb40093b749a5b0432f223055607629c2ca3364cf0cf5780bc24409007319da697561d993fad0e254bd8555bde04fc25d973516ab00e6b6411c331c407d4428da9c84d", 0xd5}], 0x9, &(0x7f0000001840)=[{0x1010, 0x100, 0x4, "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"}, {0x10, 0x117, 0x8}, {0x108, 0x119, 0xffff, "e7aaf5335377a55ee7bc0049c346419a84c47923912ce2a54030e3f24d38b1959b83356ca3f9d9aa388dfa5202ded7bbab7a79d84739ef742845e46e080a9926531c7039b0e13f0dcf2aa2284feb76c3cd01d83c1eedc69182bfef693f14e4fd3de37100a962faa7d570fc52d25fac511fe75f5a8c211b0d954e3ada5676d32c96d2947c6ea0c73b83679c3b085253b3e17f7e6ff5712e7b10e2c0397d056bf355c038512ef36b22f5c2e27ef471a244a9d164392519c49eb5944f9d93e4f67cf74925b583c362ffc40d93213832fbade957f0642c3016c630eb469ac45cb115d2364cc3e4741e580247d620aaaac59320a208ea7ccb"}, {0x40, 0x10d, 0x7, "0466a79cc85902f2b8195bb2e93da4dde4089d51263b42e2e31f8458bfc6f9f7bf5574e2e5c2b6d088ba"}, {0x60, 0x0, 0x5, "e5a156973d0aa3bbbb763074ba9d2eedea693774084aecac8a22d25cb1e3611f9120e5d591dde4c6aeedfde98c3b74ba518c6ea2be8dff8496582aa321658a7d4e09a832c523235edaa0dc8e60"}], 0x11c8}, 0x604c0c0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r6, &(0x7f00000017c0), 0x2a2, 0x800000) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r8, r7, 0x0, 0x8001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000a40)={0x3ff, &(0x7f0000000a00)}, 0x0) [ 1061.030837][ T5961] encrypted_key: insufficient parameters specified 02:17:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10c00, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f00000014c0)=ANY=[@ANYBLOB="80000000", @ANYRES16=r4, @ANYBLOB="25010000000000000000030000001400010000000000000000000000ffffe0000001"], 0x28}}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="10002dbd7000fddb5f250300000014000100fe88f7ffffff0000000000bd0000010114000100000000ede6cdf442654ed3fc9e6befa4"], 0x3c}, 0x1, 0x0, 0x0, 0x8020}, 0x4) ioctl$sock_netdev_private(r2, 0x89f4, &(0x7f00000000c0)="46f823963560330471ff6c24") openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet(0x2, 0x3, 0x7) write$P9_RWALK(r7, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) [ 1061.173959][ T27] audit: type=1400 audit(1583115429.389:352): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=6131 comm="syz-executor.2" [ 1061.244231][ T27] audit: type=1400 audit(1583115429.459:353): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=6131 comm="syz-executor.2" [ 1061.360426][ T6152] tipc: Enabling of bearer rejected, already enabled [ 1061.422733][ T5961] encrypted_key: insufficient parameters specified 02:17:09 executing program 5: socketpair(0x27, 0x2, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x18, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x2df) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r2, &(0x7f00000001c0)="d8", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x2df) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r3, &(0x7f0000000180)="d8", 0x1, 0x0, 0x0, 0x0) sendto(r2, &(0x7f00000002c0)='$', 0x1, 0x0, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) 02:17:09 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4030582b, &(0x7f0000000000)=0x8) 02:17:10 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000005580)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/250, 0xfa}, {&(0x7f0000000300)=""/156, 0x9c}, {&(0x7f00000003c0)=""/186, 0xba}], 0x3, &(0x7f0000000480)=""/199, 0xc7}, 0x460002e}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x2, &(0x7f0000001680)=""/214, 0xd6}, 0x1}, {{&(0x7f0000001780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000001800), 0x0, &(0x7f0000001840)}, 0x3e1}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001880)=""/6, 0x6}], 0x1, &(0x7f0000001900)=""/173, 0xad}, 0x100}, {{&(0x7f00000019c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000001a40)=""/200, 0xc8}, {&(0x7f0000001b40)=""/231, 0xe7}, {&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000002c40)=""/74, 0x4a}, {&(0x7f0000002cc0)=""/90, 0x5a}], 0x5, &(0x7f0000002dc0)=""/84, 0xfffffeeb}, 0x67}, {{&(0x7f0000002e40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002ec0)=""/238, 0xee}], 0x1}, 0x4}, {{&(0x7f0000003000)=@pptp, 0x80, &(0x7f0000004140)=[{&(0x7f0000003080)=""/5, 0x5}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)=""/47, 0x2f}, {&(0x7f00000057c0)=""/102400, 0x19000}], 0x4, &(0x7f0000004180)=""/46, 0x2e}, 0x7}, {{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f00000041c0)=""/58, 0x3a}], 0x1}, 0x63d}, {{&(0x7f0000004240)=@nl=@unspec, 0x80, &(0x7f00000054c0)=[{&(0x7f00000042c0)=""/148, 0x94}, {&(0x7f0000004380)=""/136, 0x88}, {&(0x7f0000004440)=""/79, 0x4f}, {&(0x7f00000044c0)=""/4096, 0x1000}], 0x4, &(0x7f0000005500)=""/118, 0x76}}], 0x9, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f000001e7c0)={{0xdf04d9b66356d97e, 0x3000, 0x0, 0x81, 0x7, 0x5, 0x20, 0x0, 0x5, 0x5, 0x0, 0x3}, {0x2000, 0x1, 0x4, 0x21, 0x5c, 0x20, 0x5, 0x0, 0x1a, 0x98, 0x9}, {0x4000, 0x3000, 0xa, 0x0, 0x3, 0x5, 0x1, 0x1, 0xff, 0x7, 0x1f, 0x5}, {0x100000, 0x6000, 0x3, 0x8, 0x20, 0x50, 0x0, 0x3f, 0xff, 0x32, 0x2, 0x3}, {0x2, 0x1000, 0xe, 0x3f, 0x9, 0x0, 0x8, 0x4, 0xc4, 0x3, 0x2}, {0x1, 0x0, 0xb, 0xc, 0x6, 0x4, 0x1, 0x1, 0x7, 0x3f, 0x5, 0x9}, {0x3000, 0x6000, 0xf, 0x80, 0x1, 0x1, 0x2, 0x8, 0x6, 0x45, 0x3f, 0x7}, {0x4, 0x0, 0x4, 0x9, 0xc1, 0x6, 0x1, 0x3f, 0x2, 0x0, 0xee, 0x80}, {0x1, 0x5000}, {0xf000, 0x4000}, 0x24, 0x0, 0x100000, 0x82, 0x1, 0x2000, 0x1, [0x1, 0x2, 0x4, 0x3]}) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f000001e900)=""/207) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x75, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x85) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) dup3(r4, r6, 0x80000) 02:17:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="110e000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) 02:17:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) uselib(&(0x7f0000000080)='./file0\x00') bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001900)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000019c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001980)={&(0x7f0000001940)=@ipv6_deladdr={0x40, 0x15, 0x4, 0x70bd28, 0x25dfdbff, {0xa, 0x8, 0x6d8, 0xfd, r2}, [@IFA_LOCAL={0x14, 0x2, @local}, @IFA_LOCAL={0x14, 0x2, @mcast1}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000800}, 0x14) 02:17:10 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fchdir(r1) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r2 = dup(r1) chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0xffffff8e) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r6, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000300)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x3, @mcast1, 0xfffffff9}, r6}}, 0x30) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x4, 0x65ef, 0xe1b, 0x1f, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000040)={r7}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, 0x0) r8 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000400)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r8, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1062.141851][ T6449] encrypted_key: insufficient parameters specified 02:17:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000080)) r4 = dup(r0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000540)={0x2, 0x3, 0x400, 0x7f}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}, {{&(0x7f00000000c0)=@nl=@proc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/253, 0xfd}, {&(0x7f0000000300)=""/130, 0x82}, {&(0x7f0000000240)=""/29, 0x1d}], 0x3, &(0x7f00000003c0)=""/214, 0xd6}, 0x2}], 0x2, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r5, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:10 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40305839, &(0x7f0000000000)=0x8) 02:17:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x13d, 0xfffffffffffffc01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3cdc0000ad8a24d5c408e8dc49a96f339211e4ad056291e3eedfcd98af23554b4fa38948094dfdc5cce47e84d4d9b232125dcd", @ANYRES16=r0, @ANYBLOB="110e000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000040)="34ce3d9cff0458da686d8fcd7c14c15b64027f6bf0ff7cb60c07e87cf6a30a643760afd25bd442ec09d0841d0b4a0705080280cd5d3b9b55dcaf4f19e4264ede00fe130dc504dcb70bc88fd373e9bbb7b6d4b5b07a6cda2d1af826ec678b8ca877274e8024bd8fae718f65f27fa1fe0ca786b6357eb789e4f052b336df05efbd", 0x80, 0x0) [ 1062.403955][ T27] audit: type=1804 audit(1583115430.619:354): pid=6757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1119/bus/file0" dev="sda1" ino=17006 res=1 [ 1062.530238][ T27] audit: type=1400 audit(1583115430.739:355): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=6760 comm="syz-executor.2" [ 1062.572971][ T6757] overlayfs: './file0' not a directory [ 1062.734655][ T6449] encrypted_key: insufficient parameters specified 02:17:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0xa30000, 0x80000000, 0x9, r3, 0x0, &(0x7f0000000080)={0x990a78, 0x5, [], @p_u16=&(0x7f0000000000)=0xfd53}}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x7c, r5, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x3}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x80}, @NL80211_ATTR_STA_WME={0x24, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x9}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x40}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xa6}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x4}]}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x7}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x4a6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x40}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2400c804}, 0x20000000) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:11 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) accept$inet6(r1, &(0x7f0000000000), &(0x7f0000000040)=0x1c) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x3ff}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000001c0)="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", 0x0, &(0x7f0000000080), &(0x7f0000000040), 0x1004, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000500)={0x85, 0x3, 0x4, 0x400000, 0x2, {}, {0x1, 0xc, 0x9, 0xb0, 0x5, 0x7f, "be85aac5"}, 0x1, 0x3, @offset=0x80000001, 0x20000000, 0x0, r0}) ioctl$SIOCPNADDRESOURCE(r1, 0x89e0, &(0x7f0000000580)=0x9) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x48, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x7f, @empty, 0x280}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x2, @remote, 0x3}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000005c0)={0x0, 0x6, 0x5, [0xc42d, 0x8, 0xf157, 0x30, 0x20]}, &(0x7f0000000600)=0x12) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x7, 0x2}, &(0x7f00000004c0)=0x8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x44200, 0x0) setsockopt$inet_buf(r4, 0x0, 0x2e, &(0x7f0000000340)="af04c17c0360e464946586ca313e6567b2f4fd34bd6ca8879ae563a6025eef2cc5e0b32f0bb993077eef8f954ca2882c897ee537842409c3f2160388034086a31c629a505a7cb97321a1d00ed324da4893cf7c87a0a0bcf1d3d402d29e6e291777728b46e645cf9f3e047890c9c76b4fdc225a513a424b941f6267e62a745b80a1127b4eb7c7c3721676", 0x8a) 02:17:11 executing program 3: r0 = getpid() getpid() r1 = getpid() tkill(r1, 0x26) ptrace(0x10, r1) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) sendfile(r4, r3, 0x0, 0x3) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r5 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r5, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r7) keyctl$chown(0x4, r6, r7, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}, 0x1, 0x0, 0x0, 0x4800}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x490800, 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000400)=""/4096, &(0x7f0000000080)=0x1000) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:17:11 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x80086301, &(0x7f0000000000)=0x8) 02:17:11 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r6, r7) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0xd3}, {&(0x7f0000000a40)=""/256, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x26c2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0x0, 0x4, {0x4, 0x4, 0xb41, 0xe18b}}, 0x20) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0xa, &(0x7f00000000c0)=0x4) [ 1063.391023][ T7193] tipc: Enabling of bearer rejected, already enabled [ 1063.482973][ T7196] overlayfs: './file0' not a directory [ 1063.531763][ T27] audit: type=1804 audit(1583115431.749:356): pid=7225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1120/bus/bus/file0" dev="overlay" ino=16558 res=1 02:17:11 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./bus/file0\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) creat(&(0x7f0000000040)='./bus\x00', 0x8) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0xfffffffa, 0x7, 0x4, 0x40000, 0x0, {0x77359400}, {0x5, 0xc, 0x80, 0x20, 0x1, 0x7, "21a18bd6"}, 0x5ced, 0x1, @planes=&(0x7f0000000040)={0x5, 0x1, @userptr=0x8e09, 0x9}, 0x6643, 0x0, 0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)=r1) [ 1063.835519][ T7224] encrypted_key: insufficient parameters specified 02:17:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) getsockopt$ax25_int(r2, 0x101, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="200028bd70dbdf2506000000010547c60000000000e269728790d4cfee4085fffcb2e28007ec7a87cae2094535594d86c1ff1a6fc39378f40dcac1979f149e4cb7c99bc89753000066fdf28888db5b6643c8e4f5a4a8e356013a0e629bf6777e279755c4af6fbf989016eb7cc4b03f525aa7a1c369a1735b14f6c83ccae95ab7167719b1850623020b54d16cf862e0b2fa952186462bce797cee5e9b845786a519696833345f18e55109cbfd8a5a7b69cc57b38eb664b98416af64fcf58556b77c6b25d239a7ef17199fe79289236591443b1b2a4c82602c026a6705d731b3d4f59cf46d272e8e"], 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4011) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:12 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x80086601, &(0x7f0000000000)=0x8) 02:17:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000001c0)=0x101, &(0x7f0000000200)=0x2) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000000) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='F\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="2000000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) [ 1064.253185][ T7224] encrypted_key: insufficient parameters specified [ 1064.291092][ T7519] overlayfs: './bus' not a directory 02:17:12 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) pipe2(&(0x7f00000000c0), 0x4000) 02:17:12 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r2 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r3 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x70) keyctl$reject(0x13, r3, 0x5c, 0x3, r4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r5) keyctl$chown(0x4, r4, r5, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r6, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r7, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(r1, r1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r3, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="d39369fc89f6d044cc08e0cde60486bfe574c797a55b52723153d45a1ca344a23f5cd1241adffd881dc5cec1e8f7b5a5bd7bb01f2c4f965c87edf4862fa2e4f1d1f16fba6cd94b81e3915802d5476eea3f14fa51dd9714d222983646b28604af52084d38a95bcf0d", 0x68, 0x100000000}, {&(0x7f00000000c0)="dae73cf3320bdad231a73fce9207a47c2b28c0fd1c6bbe1991c88143f55753824b25", 0x22, 0x3ff}, {&(0x7f0000000240)="2006b75f14fd30d68e7cd932f247d4511c09b7715748fe158639cdea283d2525fe88cf651cc2418283be56caddfddd42b7f7e84928129919cee3f9dc9d259a710de4e608f7a7629add4256eb644c061c49042a5faa3d89f3a7e5b6b610385a7f2cfee841ffc1bde596530bcc74b699cdad54b8f41eab8cb3bb0954f8c3d99f1034ba04875313b5a9e6b4837ab5652ec66ef2659ee336ec756d3a84738a1545038dce58748f9aaa8bb1e17bc122dd53b4026c0da72321114e2aaa52c8f78fa5914f33ceba63cff9650ff8dcda1bce52dc77e900c4bc68a8ea167eddfb9da68a4d", 0xe0, 0xffff}, {&(0x7f0000000340)="e8cd6f770c4dc2f84ed982e21109ea3d100f049acd5e4bc74a152b0cab072b5c65a33f4b3e6718c31221e19983630bb5eeece62170538d26e78cf0f8aed28897b5f32410148f134d2a1fcdbac1a423d0d8fe7f522748ff55fb09eb72459cdfed704f", 0x62, 0xfffffffffffffffb}], 0x208000, &(0x7f0000000640)={[{@grpid='grpid'}], [{@euid_gt={'euid>', r1}}, {@obj_type={'obj_type', 0x3d, '\''}}, {@subj_role={'subj_role', 0x3d, '&\\ppp1cgroup'}}, {@smackfsdef={'smackfsdef', 0x3d, '}eth0self)user'}}, {@uid_lt={'uid<', r3}}]}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:13 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000d00)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000580)=@delchain={0xe0, 0x65, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r1, {0xf, 0x1}, {0x1, 0xfff2}, {0xffe0, 0x6}}, [@TCA_CHAIN={0x8, 0xb, 0x8f}, @TCA_RATE={0x6, 0x5, {0xff, 0x80}}, @TCA_CHAIN={0x8, 0xb, 0x3d}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x5c, 0x2, [@TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x5}, @TCA_BPF_OPS={{0x6, 0x4, 0x4}, {0x24, 0x5, [{0x8, 0x5, 0x8}, {0x2, 0x4, 0x1c, 0x9}, {0x6, 0x8, 0x2, 0x7}, {0x9, 0x9, 0x9, 0x78a}]}}, @TCA_BPF_FLAGS={0x8}, @TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0xff, 0x3, 0xe3, 0x3f}, {0xad3, 0xf9, 0x4, 0x401}]}}]}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x80}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x24, 0x2, [@TCA_TCINDEX_MASK={0x6, 0x2, 0x3}, @TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_FALL_THROUGH={0x8}]}}, @TCA_CHAIN={0x8, 0xb, 0x2}]}, 0xe0}, 0x1, 0x0, 0x0, 0x800}, 0x40000) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='./bus\x00') bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x69) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x10040, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$SIOCX25GSUBSCRIP(r3, 0x89e0, &(0x7f00000003c0)={'batadv_slave_0\x00', 0x0, 0x20000000}) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r4, 0x104, 0x7, &(0x7f0000000300)=0x9, 0x4) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x401c5820, 0x0) 02:17:13 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x801c581f, &(0x7f0000000000)=0x8) [ 1065.023704][ T7797] encrypted_key: insufficient parameters specified 02:17:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r2 = socket$bt_bnep(0x1f, 0x3, 0x4) preadv(r2, &(0x7f00000017c0), 0x0, 0x800000) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/88, 0x58) 02:17:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=""/162, 0xa2}, 0x10120) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x24000, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_open_dev$audion(&(0x7f0000001f40)='/dev/audio#\x00', 0x6, 0x410002) write$6lowpan_control(r7, &(0x7f0000001f80)='connect aa:aa:aa:aa:aa:10 0', 0x1b) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r8, 0xe7a035cf4856fee5}, 0x14}}, 0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000001e80)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001e40)={&(0x7f0000001dc0)={0x70, r8, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}]}, 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x8004) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x400100, 0x0) ioctl$VIDIOC_G_TUNER(r9, 0xc054561d, &(0x7f0000001ec0)={0x45, "5dd7df7361f9b46b232c4bad97d94346b5b8f1d6f22d675fb787a538bf6e6451", 0x3, 0x800, 0xffffffc0, 0x80, 0x2, 0x4, 0x4, 0x92d5}) ioctl$KDGKBSENT(r9, 0x4b48, &(0x7f0000001b80)={0x8, "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"}) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r10, &(0x7f0000001a40)={&(0x7f0000000280)=@tipc=@id, 0x80, &(0x7f0000001900)=[{&(0x7f0000001b00)=""/70, 0x46}, {&(0x7f0000000380)}, {&(0x7f0000001400)=""/160, 0xa0}, {&(0x7f00000014c0)=""/73, 0x49}, {&(0x7f0000001540)=""/148, 0x94}, {&(0x7f0000001600)=""/102, 0x66}, {&(0x7f0000001680)=""/235, 0xeb}, {&(0x7f0000001780)=""/64, 0x40}, {&(0x7f00000017c0)=""/56, 0x38}, {&(0x7f0000001800)=""/234, 0xea}], 0xa, &(0x7f00000019c0)=""/115, 0x73}, 0x20) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000001a80)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x8000, 0x815016, 0x20, 0x800, 0x8, 0xb42}}, 0x50) 02:17:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x100) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xe, 0x1, 0x2, 0x8, 0x34d, r0, 0x43a, [], r2, r3, 0x0, 0x0, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1065.405799][ T7797] encrypted_key: insufficient parameters specified 02:17:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0), 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1065.618589][ T8129] overlayfs: './file0' not a directory 02:17:13 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000700)='/dev/uhid\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:13 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0045878, &(0x7f0000000000)=0x8) 02:17:14 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000000)=0x4) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) [ 1065.765110][ T27] audit: type=1400 audit(1583115433.979:357): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=8266 comm="syz-executor.2" 02:17:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x440, 0x268, 0x268, 0x0, 0x0, 0x268, 0x370, 0x370, 0x370, 0x370, 0x370, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0x228, 0x268, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x3f, 0x1, 0x0, [0x2, 0x81, 0x3, 0x4, 0x1f, 0x7, 0xca4, 0x352, 0x9, 0x7, 0x400, 0x1ff, 0x48f, 0x7, 0x800, 0xf0f]}}, @common=@rt={{0x138, 'rt\x00'}, {0x7, [0x0, 0x9], 0x2e623b66, 0x30, 0x0, [@local, @ipv4={[], [], @loopback}, @empty, @loopback, @remote, @loopback, @rand_addr="0a0ee529fcfb029dfce2597535ebcde7", @mcast1, @dev={0xfe, 0x80, [], 0x13}, @loopback, @mcast2, @loopback, @empty, @empty, @rand_addr="aaccf22a3dd872adca12cb1f978ae9e4", @local], 0xd}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe11, 0x95, 0x8, 0x7fff, 0xfffffff8, 0x5, 0xe161, 0x3]}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@rand_addr=0xca, [0x0, 0xff, 0xff000000, 0xffffffff], 0x4e22, 0x4e24, 0x4e22, 0xfff, 0x7fffffff, 0x12, 0x1, 0x9, 0x100}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0)=[{&(0x7f00000018c0)=""/84, 0xfffffffffffffe93}, {&(0x7f0000000100)=""/9, 0x9}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/124, 0x85}], 0x4, 0x20000000800000) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 02:17:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="01f2d900", @ANYRES16=r0, @ANYBLOB="110e000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x4100, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x82, &(0x7f00000001c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={r5, 0xba, "a57bccbff1072d3050c2e92afa826d7353a6988660594db666e6e9d87c0760f8ab705c735c6d764c40ed6b159c3de8444b403ee062be1eb66dbb940c169f38108a5afab2ed873031cc1703fccf84e61855a9e9c94ac7ae4beb3c89ca8cb0f03c68b27486cf9e2c763bf7500c29093494e3f608cffe0fc04629dd991c0e8b71c7161955d6dde8ea8bb9f4833ba17dac8450f9482b9f84182b6959d30f7c233262bde70f3554996fda829cd81012b0608b06c8181e76115d94f328"}, &(0x7f0000000080)=0xc2) 02:17:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x7d, 0x400}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1066.222466][ T8323] encrypted_key: insufficient parameters specified 02:17:14 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000000)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8d9b8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x103, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x7, 'team_slave_0\x00', {0x24f5ed98}, 0xb3}) 02:17:14 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0045878, &(0x7f0000000000)=0x8) [ 1066.505692][ T8323] encrypted_key: insufficient parameters specified [ 1066.531257][ T8694] tipc: Enabling of bearer rejected, already enabled 02:17:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = dup(0xffffffffffffffff) r4 = socket$alg(0x26, 0x5, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, 0x0, 0x10000000000443) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r3, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x1, &(0x7f0000000180)='\x00', r7}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r8}, 0xc) r9 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe57e, 0x602002) setsockopt$inet6_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e22, @rand_addr=0x6}}, 0x0, 0x0, 0x1, 0x0, "c2f95bdfb63a754c58dd1c2a047e8b4dedc8343cd3f64d6d5486d48439e7bbeecc07dcedcf743cd8ebad0527519921b4ed15f2738a4c77380792c19fb72972ae916f8d52bed67d3061e6c19d26c09309"}, 0xd8) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)=""/117, 0x75}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/93, 0x5d}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/60, 0x3c}], 0x5, &(0x7f0000000440)=""/100, 0x64}, 0x23) 02:17:15 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf4883cf3ce00000000000000a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x70bd26, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) [ 1066.800956][ T8805] overlayfs: './file0' not a directory 02:17:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = getpid() tkill(r2, 0x26) ptrace(0x10, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='pagemap\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1066.985354][ T8879] tipc: Enabling of bearer rejected, already enabled 02:17:15 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000000)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r3, 0x0) syz_mount_image$jfs(&(0x7f0000000640)='jfs\x00', &(0x7f0000000680)='./file0\x00', 0x3, 0x3, &(0x7f0000001840)=[{&(0x7f00000006c0)="99fa6e089001ea430db71129b0e04c78026be4e6b1f428821fac4aaed93db5bae98eed3a6a77c872e10090a7a090e05f112051c8b8db0c0681490731f46bcb2436b7d016718f1c77e7a0a82c1fff5efa112e053255eb9274a1c5dda47459b51fdce9f6f5c3", 0x65, 0x4865fa3a}, {&(0x7f0000000740)="858ad94341071f66453c8dd23b3349c80ffdeaa1dd3fb07ccbe633621a39e9ccd6aa60ea4113e01a964e8d8e1f27806a15d000788996fdd21168387157633c0c432c774d6c6d3ad01eb0cdfd36a070488a45f7f8928d26c2d7e37e641e1429e5c32c24310a57f2bf81705b4073d8bce1a812e260dbd165d4c8366aade2735d76a312881963d4803682a1babb8639d0c460e906dcc0ed49ba8a899ff07c517647242cee4f01de470a3ea7dc507b5110fcebdab1ad4e7c53eaa502352235b8666ade2694c551", 0xc5, 0x6}, {&(0x7f0000000840)="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", 0x1000, 0x80000000}], 0x1000000, &(0x7f00000018c0)={[{@usrquota='usrquota'}, {@noquota='noquota'}, {@nodiscard='nodiscard'}, {@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@integrity='integrity'}], [{@smackfshat={'smackfshat', 0x3d, 'md5sum%'}}, {@uid_lt={'uid<', r3}}, {@dont_appraise='dont_appraise'}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x1}, 0x0) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, r6, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x4840) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nvram\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f0000000580)={0x8001, 0x45ae, 0x1, 'queue1\x00', 0x9}) sendmsg$IPSET_CMD_GET_BYNAME(r5, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x40, 0xe, 0x6, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x844}, 0x110) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r9 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r9, r8, 0x0, 0x8001) ioctl$DRM_IOCTL_MODE_DIRTYFB(r8, 0xc01864b1, &(0x7f0000000500)={0x3332, 0x3, 0x3f, 0x3, &(0x7f00000004c0)=[{0x81, 0x1, 0x7a, 0x200}, {0x1, 0x20b6, 0xffff, 0x44a}, {0x9, 0x4, 0x0, 0x5}]}) chdir(&(0x7f0000000380)='./bus\x00') r10 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r10, 0x401c5820, 0x0) 02:17:15 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0189436, &(0x7f0000000000)=0x8) [ 1067.131836][ T8883] encrypted_key: insufficient parameters specified 02:17:15 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = gettid() sendmsg$AUDIT_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x3e9, 0x400, 0x70bd29, 0x25dfdbfe, {0x0, 0x1, 0x1, r1, 0x0, 0x80000000, 0x81, 0x0, 0x1}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000841}, 0x20000804) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000040)={0x0, 0x7, 0x8000}, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) [ 1067.425023][ T27] audit: type=1400 audit(1583115435.639:358): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9121 comm="syz-executor.4" [ 1067.430122][ T8883] encrypted_key: insufficient parameters specified 02:17:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) bind(r4, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e24, @multicast1}, 0x2, 0x3}}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r9 = socket(0x40000000015, 0x5, 0x0) connect$inet(r9, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r9, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r10, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r10, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r11 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r10, 0x84, 0x82, &(0x7f00000001c0)={r12}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f0000000780)={r12, @in={{0x2, 0x4e20, @multicast2}}, 0xe2, 0x20000, 0xfff, 0x1, 0x1}, &(0x7f0000000440)=0x98) sendfile(r8, r7, 0x0, 0x8001) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) mq_timedsend(r7, &(0x7f0000000640)="0a3cfd07c05e46ba908390ed3a6f83f16c036c50bba6a0e0c1cf44abf45b04aa68bbec02484c31b11a03868f6b9d85f00d4423844de49fe3638f7c0a5ec19a33458048879f8e9a613f16016da1efbc168b1709e92d3c6dc79fe5c231b9b94ff9cec108737531546a34712ca28c923fb6766bf6169d8ec962174e786f4df2461733f656c0a717bf32331da9cc1aca99f84684d3ada3e0dcdc1ddb1787fff461c72935cd9b4120e2117dbfa8b6be0ec3f857fc498e357b7c97e6fccfb4ce9ed2c335df8c5ab961179c", 0xc8, 0x6, &(0x7f0000000300)={r13, r14+10000000}) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d0000148132be6bc45c000000", @ANYRES32=r6, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14, 0x800) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffdf", @ANYRES16=r2, @ANYBLOB="000327bd7000fbdbdf25150000000a001a0064337d4e343b00000c00990004000000ffffffff08000100010000000c009900000000800100000008000300", @ANYRES32=r6, @ANYBLOB="0c00990008000000040000000a001a0070ac2a88b9bf000008000300", @ANYRES32=r15, @ANYBLOB="c0fe1a00aaaaaaaaaaaa0000"], 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x200008c0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1067.494705][ T9123] jfs: Unrecognized mount option "smackfshat=md5sum%" or missing value 02:17:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='dummy0\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x1200000, 0x1, 0x4a, &(0x7f0000ffe000/0x1000)=nil, 0x3}) 02:17:15 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x1, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1067.700036][ T27] audit: type=1400 audit(1583115435.909:359): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9121 comm="syz-executor.4" 02:17:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:16 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc020660b, &(0x7f0000000000)=0x8) [ 1067.786284][ T9442] tipc: Enabling of bearer rejected, already enabled [ 1067.800153][ T9417] overlayfs: './file0' not a directory [ 1067.872142][ T9123] jfs: Unrecognized mount option "smackfshat=md5sum%" or missing value 02:17:16 executing program 2: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x10024) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x18, 0x6, 0x3f) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1067.994021][ T9476] encrypted_key: insufficient parameters specified [ 1068.061981][ T27] audit: type=1400 audit(1583115436.279:360): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9192 comm="syz-executor.5" [ 1068.155713][ T9476] encrypted_key: insufficient parameters specified 02:17:16 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$IPSET_CMD_DEL(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYRES32=r1], 0x1}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r4 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r5 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r5, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r7) keyctl$chown(0x4, r6, r7, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xa, 0x4, 0x70000, 0x8, {0x77359400}, {0x2, 0xc, 0x0, 0xa, 0x5, 0x84, "91433f64"}, 0x0, 0x3, @fd=r1, 0x60d, 0x0, 0xffffffffffffffff}) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f00000000c0), 0x1) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:16 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) getresuid(&(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000300)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = getpid() tkill(r3, 0x26) ptrace(0x10, r3) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000340)={0x2, 0x1ff, {r3}, {0xffffffffffffffff}, 0x9, 0x100000001}) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fstat(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(r7, r7, 0x0) r8 = getgid() r9 = socket$kcm(0x10, 0x2, 0x0) fstat(r9, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000300", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000000", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="040000000000000008000100", @ANYRES32=r8, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="43ec402711717652b047811df8c6cea14d66b781d1a8260300000000000000d505aecf60230d4a7db37391a2a68858c0b4bc72203003135f4b05d23f1fc3f582e32330459a2c2700472790bc", @ANYRES32=r10, @ANYBLOB="08000200", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32=r11, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r12, @ANYBLOB="08000400", @ANYRES32=r13, @ANYBLOB="10000300000000002000050000000000"], 0x7c, 0x2) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r14 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r14, 0x401c5820, 0x0) 02:17:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x6, 0x7}, {0x1f, 0x8001}], r3}, 0x18, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:16 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0c0583b, &(0x7f0000000000)=0x8) 02:17:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'TIPC\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20004884}, 0x20000001) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000e14ae0af9c58e179578c79c9610afb8901e829c7874a29d9f464f9c453a7a2f037a8985d644488b14eab5fa18bc1792f977910629db85c023837b091d0d2ba8382ab614ee66c6fe4bddee727f1701cc386c6d67eeeacd078"], 0x3c}}, 0x0) [ 1068.683132][ T27] audit: type=1400 audit(1583115436.899:361): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9878 comm="syz-executor.5" [ 1068.822949][ T27] audit: type=1400 audit(1583115437.039:362): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9882 comm="syz-executor.2" 02:17:17 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x41) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1068.937423][ T9922] tipc: Enabling of bearer rejected, already enabled [ 1068.973458][ T9851] encrypted_key: insufficient parameters specified 02:17:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) ioctl$RTC_WIE_OFF(r2, 0x7010) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r5, &(0x7f0000000640)=[{&(0x7f0000000080)=""/140, 0x8c}, {&(0x7f0000000140)=""/250, 0xfa}, {&(0x7f0000000000)=""/14, 0xe}, {&(0x7f0000000240)=""/92, 0x5c}, {&(0x7f0000000300)=""/226, 0xe2}, {&(0x7f0000000400)=""/163, 0xa3}, {&(0x7f00000004c0)=""/131, 0x83}, {&(0x7f0000000580)=""/145, 0x91}], 0x8, 0x800000) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x82, &(0x7f00000001c0)={r9}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000800)={r9, @in6={{0xa, 0x4e21, 0x8, @remote, 0x200}}, 0xffffffff, 0x1, 0x5, 0x7, 0x20, 0xd0, 0x7}, 0x9c) fsetxattr$security_evm(r6, &(0x7f00000007c0)='security.evm\x00', &(0x7f0000000800)=ANY=[@ANYBLOB], 0x1, 0x3) 02:17:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) write$P9_RMKDIR(r5, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x8, 0x2, 0x7}}, 0x14) sendfile(r4, r3, 0x0, 0x8001) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000080)={0x0, 0x3f, 0x0, &(0x7f0000000040)=0x4}) ioctl$RTC_WIE_ON(r1, 0x700f) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000140)=0xe8) 02:17:17 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x80) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000500)={0x4, 0x0, [], {0x0, @bt={0x0, 0x1f, 0x0, 0x0, 0x800, 0x3, 0x80000000, 0xe1, 0x8, 0x3, 0x80000000, 0x10000, 0x1, 0x4, 0x7, 0x20, {0x0, 0x2}, 0xf8, 0xfd}}}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000100)={0xffffff8e, 0x282, &(0x7f00000001c0)="a54974c6c74a49d97fa624ec17842a4576247f5d5460f3ed6e1235d7beda3406deb714f4e5ac1f6c98a086d485309533e9153b093c14a8f9b4a0e639b7743b8e9e21450d57a911f5c7ab818f99df1385e4616904abdfafc1452343db1cded95b008071cd8335f0beb10fa45ab08f88a028e092d7343c3752b9c24372bca8fd7a2276f734952f577fbdfe6d91cf991c7fbfbecc13a1e0552741f95ef868dca9243c760a2cb584ecfd21b1a2bd2befa3d176cb968b95974fdcf6ea48431424a51a25dc5a9825de7cd5a65700", &(0x7f00000002c0)="73f0ea8eafb51b9a80c1a53ced8df009b0c16799f59d79adc0efbb0b01b257addaab64cacf4bcee93c94323ea2157a040228cc4b6ce6d17409ef7f67ff1b2858383714c8b4c0d806abfb06ab530d329d9ab00f9de6b81a033de31fc4a032da3ac84e63ea7b04d93f78b9c25252d216eede498262d2ebd112f922171087a493e19fe11b989f85b56a585dc934", 0xcb, 0x8c}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0000006567994b55da63f766af8c6ff81d7ea3bb1f1a448c8e653f9e12ad31210ebfaee3ed168fa0cbb3fee51796b813a53fad4bc5a62fcb01c676ad004d4131abc7c709d1c08f71c216bf3d64ee70a8ebaba78a895afcca3c226a5122796140fc35c41d068c590737c63ddce5afa2dcf1a8286bdc7320626b2d8eba2950d15d1bdbecf26bdba45255e5fc411292ef3b4e158fb4225c93b6816578680481d2996045b016bf063466656e4ba9e8b40b44eb6772be53286b9e81589e", @ANYRES16=r3, @ANYBLOB="110e0000000000000000010000000000000001410000002000170000000000005e0069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) 02:17:17 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x7) [ 1069.214777][ T27] audit: type=1400 audit(1583115437.429:363): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=10278 comm="syz-executor.2" [ 1069.293031][T10285] overlayfs: './file0' not a directory [ 1069.372089][ T27] audit: type=1400 audit(1583115437.589:364): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=10281 comm="syz-executor.5" 02:17:17 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) open_by_handle_at(0xffffffffffffffff, &(0x7f00000003c0)={0xcd, 0x7f, "c96bde9a7eba2e1b395d3178c151342261cdef4ca963bd38b75d84eb517c15fac6a8c98139cb206e4a221c6f342fa9eecdafac23b244327301db87167afa86eab7ac3176c1374c8570c00383f15367e02434dda8a0872951531815b0c265521433c3df8c0c2bc0ae2ae89c40e0cf4244b732d69e9c04b79df454ca7bf5260a564dcb3333fdcf17574f65ebb88d6e5ea0223087d9405fbaf6e47d052933baed1e20cbce9c982c78bc73769b148a296a35ead3f77eaecad4d3f1d299eae859b791c309440202"}, 0x6a8200) chdir(&(0x7f0000000380)='./bus\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f00000004c0)={{0x0, 0x0, 0x80}}) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, 0x0) [ 1069.438409][ T9851] encrypted_key: insufficient parameters specified [ 1069.445810][ T27] audit: type=1400 audit(1583115437.619:365): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=10281 comm="syz-executor.5" 02:17:17 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) openat$cgroup(r1, &(0x7f0000000680)='syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r4 = dup(r3) sendmsg$IPSET_CMD_DEL(r4, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a51455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r6 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r7 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r7, &(0x7f0000000240)=""/112, 0x349b7f55) r8 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r8, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r7, 0x5c, 0x3, r8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r9) keyctl$chown(0x4, r8, r9, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r10, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r11 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r11, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1069.501268][ T27] audit: type=1400 audit(1583115437.619:366): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=10281 comm="syz-executor.5" 02:17:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x204000, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1069.741980][ T27] audit: type=1400 audit(1583115437.959:367): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=10477 comm="syz-executor.3" 02:17:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0xf000000, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9909d7, 0x1, [], @string=&(0x7f0000000040)=0x98}}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x1, [0xffff]}, 0x6) [ 1069.966665][T10490] encrypted_key: insufficient parameters specified 02:17:18 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0xa) 02:17:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') pkey_alloc(0x0, 0x2) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1070.121361][T10667] overlayfs: './file0' not a directory 02:17:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='cifs.idmap\x00', 0xfffffffffffffffc) keyctl$clear(0x7, r2) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040)={r2, 0x46, 0xeb}, &(0x7f0000000080)={'enc=', 'pkcs1', ' hash=', {'vmac64(aes-aesni)\x00'}}, &(0x7f00000001c0)="63c8b44dee8899c472254e36ffa8159a94bd69ac5853b98249fa3bbdd9bc1d7019f4037d15ed60a471a6af46566a0f81d3b739b0adc922f9faf6108e8cd3620dbbca78038a01", &(0x7f0000000240)="3d167f58dbbca7c3d1060d7d09ef386c8fb28c4675989783c466cc4ad76851ef5936c41fc6e223446f2adbb75b5db1ed07b78b4819c98a35b94797d836c81a69b37b7d62f5aad6fdb4d37af8c5f1e2ee5856b8a8d0dcf09d0dc22e3d1ac901817ccdaa8b47e1202661ab676450bd8047e41b913c9178265d744e22b1dd9468b485ec87bcba16716e3be3b3caeabe9fb1a70371ce48f18d99d4c6f0ab7c8c31adca0aac5346a06b95900ca8b6ed765a238d6e207c68e31bfc2b637f82fb5a5645ecd7b6a9398d9a906d16ad09e7e9af58f5fb42644018950438f0200680680f03afd15397bc04f54a25a1a4") sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:17:18 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) accept4$bt_l2cap(r0, &(0x7f0000000040), &(0x7f0000000140)=0xe, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469b6a62e2f66696c6530"]) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) [ 1070.321525][T10755] tipc: Enabling of bearer rejected, already enabled [ 1070.365120][T10490] encrypted_key: insufficient parameters specified 02:17:18 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) r7 = socket(0x40000000015, 0x5, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000a00)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000009c0)={0x0, 0x47}}, 0x4008044) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x200000a, 0x40010, 0xffffffffffffffff, 0x1000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000002cc0), 0x1, 0x42, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) socket$caif_stream(0x25, 0x1, 0x0) preadv(r2, &(0x7f00000017c0), 0x0, 0xfffffffffffffffb) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000000)={0x5, &(0x7f0000000080)=[{}, {@none}, {}, {}, {@none}]}) [ 1070.654426][T11010] overlayfs: unrecognized mount option "upperdi./file0" or missing value 02:17:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x180, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x3000}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:19 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x10) 02:17:19 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r7, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000000000000000"], 0x48}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x38, r1, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x4000804) mkdir(&(0x7f0000000280)='./file0\x00', 0x4) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r11 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r11, 0x401c5820, 0x0) 02:17:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x43) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000080)={0x4a}) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) ioctl$CAPI_GET_MANUFACTURER(r5, 0xc0044306, &(0x7f0000000200)=0x5) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x218900, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r8, @ANYBLOB="0080000000800000f2ff00000800010075333200c0010200bc01010004000200b40105510004d72000000807000000ff03fffffffffffff00100000001010000000000010000000000000001ffb810000000000080000080000000000407000000080000d000000040000000050400000020000000000000620000000007000000400000000000800100000000089f1abf5f01978b467790f81f8178070000009b55b91601000300000000000009ffff800009002f3de672922ca7287d55e227a85e000029000000085408b300fbffffff000000080001000007000000f8f600000000a243000080010400000000000000000000675b0d41d9af33380b545184138e54a0000000080800000000000000000001ff00200eb7070020007f000000800000000000007f01000000ff7f00000000000580000001010017fbbc930000fa000010000c00000004070000000000200000000809000008090020000000000700020fffc359000002000000000004000000000900000000000a0000000000060000081707000000ff03000000000007000001ff1200000002000000000000020002000401019910ec13000000e5000300000006000100000900000000000020000013037f000000ff7f00000000001022bd9d000000000000adf007117909895d0ffdc701d59f03d529d940ca2c02eaaa04a8e080b422265e02ae1817f396d57182598287b386ff8cdad692ef98b45b5f7d302a9c27a7e7e5501a583f3a35e2833cd7ed3c5ecae0148ee8e7b69342c9a20caee6d01df95a395d92aca5a9620062d353429dd782684ed3e695921980b1f20e4ad251e1e08156283a14deb206ed12cc3f684847d788b083d3321d7cbfa07b5e1b8e3fb37ec8c429e2cbbfec27a9660c7026588442f5f9f4557511ec050d7a43ed56192fdb1f50cf3f8d9f1b62f596024f8c496cb2f4ea1ff3cefe5bb7b229ec4b81b626f53eed9ffe419ccf45f6bd19857c8c40ad05c2a8924dd25aafec45"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@mcast2, @in6=@initdev}}, {{@in=@remote}}}, &(0x7f0000000940)=0xe8) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r12 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvme-fabrics\x00', 0x1400, 0x0) getsockname$packet(r12, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r13, @ANYBLOB="0880000004800000f2ff00000800010075333200c0010200bc01010004000200b40105510004d72000000807000000ff03fffffffffffff00100000001010000000000010000000000000001ffb810000000000080000080000000000407000000080000d000000040000000050400000020000000000000620000000007000000400000000000800100000000089f1abf5f01978b467790f81f8178070000009b55b91601000300000000000009ffff800009002f3de672922ca7287d55e227a85e000029000000085408b300fbffffff000000080001000007000000f8f600000000a243000080010400000000000000000000675b0d41d9af33380b545184138e54a0000000080800000000000000000001ff00200eb7070020007f000000800000000000007f01000000ff7f00000000000580000001010017fbbc930000fa000010000c00000004070000000000200000000809000008090020000000000700020fffc359000002000000000004000000000900000000000a0000000000060000081707000000ff03000000000007000001ff1200000002000000000000020002000401019910ec13000000e5000300000006000100000900000000000020000013037f000000ff7f00000000001022bd9d000000000000adf007117909895d0ffdc701d59f03d529d940ca2c02eaaa04a8e080b422265e02ae1817f396d57182598287b386ff8cdad692ef98b45b5f7d302a9c27a7e7e5501a583f3a35e2833cd7ed3c5ecae0148ee8e7b69342c9a20caee6d01df95a395d92aca5a9620062d353429dd782684ed3e695921980b1f20e4ad251e1e08156283a14deb206ed12cc3f684847d788b083d3321d7cbfa07b5e1b8e3fb37ec8c429e2cbbfec27a9660c7026588442f5f9f4557511ec050d7a43ed56192fdb1f50cf3f8d9f1b62f596024f8c496cb2f4ea1ff3cefe5bb7b229ec4b81b626f53eed9ffe419ccf45f6bd19857c8c40ad05c2a8924dd25aafec45"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000002700)={'bond_slave_0\x00', r13}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000a40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f0000002740)={0x70, r3, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x9}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x1004}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5, 0x1d, 0x1}, @NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0x9e}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x54}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x4}}, @NL80211_ATTR_WIPHY={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x4044010}, 0x2000c000) [ 1070.985047][T11076] encrypted_key: insufficient parameters specified [ 1071.010646][T11185] Unknown ioctl -1071076861 02:17:19 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x80000001, 0x531002) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0xfffffffc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000080)) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r2}, 0x38) [ 1071.357703][T11076] encrypted_key: insufficient parameters specified 02:17:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf948) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0xf) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) recvmmsg(0xffffffffffffffff, &(0x7f0000001600)=[{{&(0x7f0000000080)=@caif=@rfm, 0x80, &(0x7f0000001300)=[{&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000000)=""/24, 0x18}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000000180)=""/104, 0x68}, {&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000240)=""/79, 0x4f}], 0x7, &(0x7f0000001380)=""/30, 0x1e}, 0x2}, {{&(0x7f00000013c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001440)=""/33, 0x21}, {&(0x7f0000001480)=""/250, 0xfa}], 0x2, &(0x7f00000015c0)=""/9, 0x9}, 0x1}], 0x2, 0x40, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001740)={0x0, @broadcast}, &(0x7f0000001780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@loopback, 0x0}, &(0x7f0000002880)=0x14) sendmsg$NL80211_CMD_LEAVE_MESH(r3, &(0x7f0000002940)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002900)={&(0x7f00000028c0)={0x3c, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x944, 0xffffffffffffffff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x20}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) 02:17:19 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x49) 02:17:19 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/694], 0x1}}, 0xc041) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1071.575119][T11197] overlayfs: failed to resolve './file0': -2 02:17:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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"/326, 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:17:20 executing program 4: mkdir(&(0x7f0000000000)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) bind(r0, &(0x7f00000002c0)=@vsock={0x28, 0x0, 0x2710, @host}, 0x80) [ 1071.884275][T11590] tipc: Enabling of bearer rejected, already enabled 02:17:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x40000, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x1, 0x7, 0x301, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x7c00000000000}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_PKTS={0xc}]}, 0x50}, 0x1, 0x0, 0x0, 0x50bd86080b377ea1}, 0x4000090) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) accept(r4, &(0x7f0000000080)=@nfc, &(0x7f0000000000)=0x80) [ 1071.993032][T11511] encrypted_key: insufficient parameters specified [ 1072.196998][T11763] overlayfs: failed to resolve './file1': -2 02:17:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000001c0)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000080)="888fa298f7c47de68835c5c0c2e60a067c543a8ecdc4e665319af9964ee7e847c1998cfc7a0c10a78185273a6034894ad592bf9a7f782839e3e5e9ec20b5354e54dd4a511dc98f1e0bf67b8690e51853f1dfdd0d93e7dc", 0x57}, 0x68) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x32d000, 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000300)=0x3, &(0x7f0000000340)=0x4) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000380)={0x2b, @multicast1, 0x4e20, 0x4, 'lc\x00', 0x1, 0x9, 0x5d}, 0x2c) 02:17:20 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x5d) [ 1072.274783][T11511] encrypted_key: insufficient parameters specified [ 1072.300985][T11854] overlayfs: './file0' not a directory 02:17:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:20 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x1) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:17:20 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYRES32=r1], 0x1}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="70a3ee1aa293066f6c99799e0a193036716c4ce7c8ad7bdab1591cac8dce25dc6973cbb213934f219f135405fb2c30bf1d5792060bf982700cc0385d1e0de0a54a7c18d17a9f57ee023ef0842331b54eb77f48ed815912c038955c", @ANYRES16=r0, @ANYBLOB="110e000000000000000001000000000000000141000000200017000000000000000069623a6261746164765f736c6176655f30000000"], 0x3c}}, 0x0) 02:17:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) 02:17:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:21 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x10a) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) futimesat(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={{0x0, 0x2710}}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:21 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f7765726469920bbf723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c6530"]) chdir(&(0x7f0000000380)='./bus\x00') ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) [ 1072.934539][T11948] encrypted_key: insufficient parameters specified 02:17:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000080)={0xfffff7b0, 0x4, 0x4, 0x20000000, 0x9, {}, {0x1, 0x0, 0x7, 0x5, 0x7, 0xe0, "1547ae82"}, 0x7f, 0x2, @planes=&(0x7f0000000040)={0x20, 0x2, @userptr=0x8, 0x2}, 0x81, 0x0, r0}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000001c0)="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", 0x0, &(0x7f0000000080), &(0x7f0000000440), 0x1000, r3, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1073.076270][T12256] tipc: Enabling of bearer rejected, already enabled [ 1073.242659][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 1073.242670][ T27] audit: type=1400 audit(1583115441.459:375): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12259 comm="syz-executor.5" [ 1073.269314][T11948] encrypted_key: insufficient parameters specified 02:17:21 executing program 5: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], r0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) [ 1073.321515][T12391] overlayfs: unrecognized mount option "lowerdi r=./bus" or missing value 02:17:21 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = accept4$unix(r0, &(0x7f00000001c0), &(0x7f0000000240)=0x6e, 0x80800) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000280), &(0x7f0000000300)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x71}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x20) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r5, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) [ 1073.383951][ T27] audit: type=1804 audit(1583115441.599:376): pid=12391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1134/bus/file0" dev="sda1" ino=16627 res=1 [ 1073.444799][T12482] overlayfs: unrecognized mount option "lowerdi r=./bus" or missing value 02:17:21 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f00000007c0)='cifs.idmap\x00', 0x0, &(0x7f0000000680)="671cf841db4b59b6dd6519888fb3320498a36bb5bb099b15db30dfbf2a1c6668e44abaa16530f7e9297d2f2b394f0e21805e7f9f0e6993ef7d800376d1cd480d050897a21b072d90aa1c0c61868b43be2992ccae20bd57dc2101b51b3084831ba5957d88798c779ebc8849396c159da8dc990bb87926e93f70a57a2b19f890eefa3681521540da1d527414b10c291fa855ddcc777e8e8d20c03bcb348f370ab885d2fdd6f0b6bbc5481b210bc4e77ca4b7e18d8ee0b46f39e9faf18a4515b93dd69da5865f514909e02a47129fb2615e439abcccc078c734", 0xd8, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1073.505850][ T27] audit: type=1400 audit(1583115441.599:377): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12373 comm="syz-executor.1" 02:17:21 executing program 4: socketpair(0x1e, 0x2, 0x8, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140)=0x3, 0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r2 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x20) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, 0x0) r4 = open(&(0x7f00000004c0)='./file0\x00', 0x202301, 0x142) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r4, 0xc0305616, &(0x7f0000000000)={0x0, {0x7, 0x2}}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000002c0)={0x9, 0x8, 0x4, 0x1, 0x4, {0x0, 0x7530}, {0x4, 0x1, 0xfd, 0x5d, 0x0, 0xf8, "6fd5d0d2"}, 0x64a21f84, 0x4, @userptr=0x24c323e4, 0x9, 0x0, r2}) getsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, &(0x7f0000000340), &(0x7f00000003c0)=0x4) [ 1073.593124][T12533] tipc: Enabling of bearer rejected, already enabled 02:17:21 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x38) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:21 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x81, 0x60480) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = open(&(0x7f0000000140)='./file0\x00', 0xb00, 0x134) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x1, 0x80, 0x40005, 0x2, r0, 0x1001, [], 0x0, r3, 0x3, 0x0, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r4}, 0x38) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)="1b77e4eb49", 0x0, 0xffff, r5}, 0x38) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x141000, 0x0) ioctl$KVM_GET_CLOCK(r7, 0x8030ae7c, &(0x7f0000000080)) 02:17:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}, 0x4}, {{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)=""/66, 0x42}, {&(0x7f00000000c0)=""/39, 0x27}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x3, &(0x7f0000000480)=""/129, 0x81}, 0x20}], 0x2, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) pidfd_getfd(r1, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000140)={0x3f, 0x7, 0x1, 'queue0\x00', 0x2}) preadv(r3, &(0x7f0000000980)=[{&(0x7f00000005c0)=""/150, 0x96}, {&(0x7f0000000780)=""/239, 0xef}, {&(0x7f0000000a00)=""/31, 0x1f}, {&(0x7f00000006c0)=""/35, 0x23}, {&(0x7f0000000700)=""/43, 0x2b}, {&(0x7f0000000880)=""/193, 0xc1}], 0x6, 0x5b) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$nfc_raw(r4, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x5}, 0x10) [ 1073.847156][ T27] audit: type=1400 audit(1583115442.059:378): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12777 comm="syz-executor.5" 02:17:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0x6, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909e5, 0x7, [], @ptr=0x1}}) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1073.923834][ T27] audit: type=1400 audit(1583115442.129:379): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12777 comm="syz-executor.5" [ 1074.034004][T12609] encrypted_key: insufficient parameters specified [ 1074.057986][T12800] tipc: Bearer : already 2 bearers with priority 0 [ 1074.084506][T12828] overlayfs: './file0' not a directory [ 1074.125490][T12800] tipc: Enabling of bearer rejected, cannot adjust to lower [ 1074.140795][ T27] audit: type=1804 audit(1583115442.359:380): pid=12898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1135/bus/bus/file0" dev="overlay" ino=16818 res=1 02:17:22 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x78) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x8, {0x7, 0x1b}}, 0x50) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000180)='./file1\x00', 0x9, 0x9, &(0x7f0000001700)=[{&(0x7f00000002c0)="6ee987dafa023ce4897f09a8477ea165e4dd068894eb5983744e24e095c616db5c5dd7df627e3362457b35fff59496ed594f9574d0f7041068e91b0700158fbef5b8ceb28721abb76ed99c772b", 0x4d, 0x2}, {&(0x7f00000003c0)="f7d8e5c87451e380355270061390c04c7cf3d0b4ca17ab68a03cf2b63c9c16cfdabc962ff01ccecf42dfc93743b0bcddba133f9be3c3d976e8f05b5492dfa7c0c55e9eec92b841091c1fe63138abe7d87a6aa77b66db5570473b1d993fe65afc346abd49b6bdff1c77b04767608aa928072b71c9288adeeee696d2e4dcca8deb40eedad3581e2f6f878e6b6d28f86b2741106459e7eb375f4a4e55", 0x9b, 0x3ff}, {&(0x7f0000000480)="886c20ea75c50864a5789d731abf0c2e7cee008a9257beb133de1e9f6e73006cf0dafb3a528168a9e8b8d324b827ccbeb97b0c4c3c6a008ecd30d81fd47eb84b2cc1277dd810de4f3685da2971444032d0fb3a4381c3646ef9d877bbc734c7c3306e5bcfcec40994782987f16466d7c20582400c9466872778cb7f9a652f6f5808373b80f731af49e9f721d7882203036aa07fec93bd611aaca47bc40d16a860e7c310c8feef88bb1137cd38a0f47e9ae2547f9139d6c223c5", 0xb9, 0x4}, {&(0x7f0000000340)="1bccf2dd161bfdee6c", 0x9, 0x3f}, {&(0x7f0000000540)="f701a64f2d27ca1738742844e59b0a1a4f1e9fcf7a08bf76b15affcd17da16d4fe41cd363f0318399f5aed331327c411bd7e881c70a8add7e954cce3f93fb2f8eff6b8b4894e844541ad664e3979e2", 0x4f, 0x5}, {&(0x7f00000005c0)="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", 0x1000, 0x1f}, {&(0x7f00000015c0)="116951d90f26c9e4371150e20c915c04b019d7259ae4c4c84bd9c8", 0x1b, 0x8}, {&(0x7f0000001600)="cc93c6145aefe0c800440fb5a87d6e6858c4a6cafde69f982c93ed6495708e8061ad09876ff5e7386cb90cc30fdda18ff0f2acfa5b7f68b04fa464a8e3c5e89dde56ae1afb24f8286757bc505201c2591f6c2139ed9bcccf9a", 0x59, 0x20}, {&(0x7f0000001680)="0de256b100b22a50244293cca86bdc915588011ba1054c8251739e6ba5f6085f6ff854bc42e53ad9b18ae8d125c1df447b4fad4685f1b4af79b299ff5286c40ec2d96c", 0x43, 0x1ff}], 0x20, &(0x7f0000001800)='-\x00') r1 = geteuid() r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) statx(r2, &(0x7f0000004040)='./file0\x00', 0x1000, 0x400, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000003ec0)='./bus\x00', &(0x7f0000003f00)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000001840)='msdos\x00', &(0x7f0000001880)='./bus\x00', 0x1ff, 0x9, &(0x7f0000003c80)=[{&(0x7f00000018c0)="8db99f53798511378c29ab78f022dc81ed137345c431991b741683f2f604cf5ab718be49f4f9f503f6d407faaff39905d19732949bf84a0f455e844bbcef77d6ed3766c702e6c4fe63c4", 0x4a, 0xca}, {&(0x7f0000001940)="3d6df900566acd35bd1e06f093345bb49ba6128610fb6d04d75c9a94d7b776b67c590a20a0", 0x25, 0x800}, {&(0x7f0000001980)="cbaf", 0x2, 0xfffffffffffff26e}, {&(0x7f00000019c0)="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", 0x1000, 0x7}, {&(0x7f00000029c0)="dbb2d47572c87a75f141f05f8778eb29edb9ed242b560d2e65f19c2b9a994585206b6e65ce5156e2a88fc3bd4ae087a8a0981b625036b0f41f4794a01838d1a3fbe88e3c4a03f3dda2bae1536c4a6d6045a874087c2cafbe87035cafacd7fddf877f1c46e3e1813b69340b40cd8111e6f2148efe39e2dbeb28b4fc5d6c2e96daa44d4b257fd8476d923a982edf043ca5b2b8d5160a77fc0e666532148085b96e808ad1e104dd2105f7e1785ed44fb38e4f3dc59a55f9d5ffacdcb8eed0c7ef34382a9ee7b1cf3f234a5c471c5998037ca1491a04623387d64bb887b8eac7bbe59d", 0xe1, 0x4e}, {&(0x7f0000002ac0)="3c904d433e290dc7ce3a39b2d9d62316f600707b42636b483fb01c2a0fede94101da53be74a5e649e260698e56304dd92b992be3fe8b7f5074e4cb2e6d23ec35bf78e8ebfa344f019ba4384cecd756f9e750d5451e8f9583ca6ecec7848afc9e32387f05ccd492f79a01da", 0x6b, 0x2}, {&(0x7f0000002b40)="3700a02c96fcfbb672d988568fb3539adca47bbee4eec876bd53a92fca6d8d8828b61e0f97bcd816d949fc5b34d4735d1f54bf04b464ff10955b9ca2347662631287ffa587076b47b743bf8b3da440f20349e9abbec6bdee769c5f78830f8cb7572ef0b791142ab682e1eb6d574e542086c11c6b3a56d26a9e3c20a6229ce525b2da0f3265d6cd1945e664f64fc82a7018ea6bf975baa5a1d1", 0x99, 0x3f}, {&(0x7f0000002c00)="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", 0x1000, 0xf28}, {&(0x7f0000003c00)="63f9c23df8fbced990acd97672d8ce1ca91a961a2969b1f9391c2d235971253a0e99a0fe33a470e77a25446451c943142dc56ccc9d68e4354d532b83d479d83557acecf1bba8b1c02a525249183faf8904b95aeb32d7fc7d4e04e12ba7397e88a8c56a9d6279d8", 0x67, 0x9}], 0x1100000, &(0x7f0000003f80)={[{@fat=@quiet='quiet'}, {@dots='dots'}], [{@euid_eq={'euid', 0x3d, r1}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp1eth1\x8c&'}}, {@fowner_gt={'fowner>', r4}}, {@subj_type={'subj_type', 0x3d, 'vmnet0%'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}, {@permit_directio='permit_directio'}]}) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:22 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x139) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1}], 0x1}, 0x4000) bind$isdn(0xffffffffffffffff, &(0x7f0000000040)={0x22, 0x20, 0x1, 0x3, 0x3}, 0x6) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)="0000783384837081baad2903a46b2a", 0x0, 0x4, r0}, 0x38) r1 = dup(0xffffffffffffffff) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r5}, 0x30) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)='$,systemwlan1.ð1&\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='net/route\x00', r5}, 0x30) sched_getaffinity(r6, 0x8, &(0x7f00000002c0)) r7 = socket(0x40000000015, 0x6, 0x8) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r9 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r9, r8, 0x0, 0x8001) pidfd_getfd(r8, r7, 0x0) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r10 = socket(0x40000000015, 0x5, 0x0) bind$rds(r10, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r10, 0x0, 0x43, &(0x7f0000000340)={'IDLETIMER\x00'}, &(0x7f00000003c0)=0x1e) connect$tipc(r7, &(0x7f0000000080)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x1}}, 0x10) 02:17:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x6) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e26, @local}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r7, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1074.579277][T12609] encrypted_key: insufficient parameters specified [ 1074.687119][ T27] audit: type=1400 audit(1583115442.899:381): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13088 comm="syz-executor.1" [ 1074.752890][T13121] overlayfs: failed to resolve './bus': -2 02:17:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) read$eventfd(r0, &(0x7f0000000040), 0x8) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r2, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) [ 1074.783649][ T27] audit: type=1804 audit(1583115442.949:382): pid=13151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1136/bus/file0" dev="sda1" ino=16691 res=1 02:17:23 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000002c0)={0x0, @reserved}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f0000000400)={0x9, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, 0x0) 02:17:23 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:23 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000040)='./bus/file0\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=@random={'system.', 'overlay\x00'}, &(0x7f0000000300)=""/195, 0xc3) 02:17:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x9a003, 0x0) fcntl$dupfd(r4, 0x0, r0) [ 1074.960939][ T27] audit: type=1400 audit(1583115443.169:383): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13331 comm="syz-executor.0" [ 1074.962828][T13333] tipc: Enabling of bearer rejected, already enabled 02:17:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x62, 0x84, 0xc}, {0x0, [0x30, 0x61, 0x5f, 0x5f, 0x0, 0x5f, 0x61, 0x61, 0x30, 0x61]}}, &(0x7f00000001c0)=""/75, 0xa8, 0x4b}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x20, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x4, 0x4002}, 0x40) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000024000509d20680648c63940d0524fc60", 0x14}], 0x1}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000140)={0xa00000, 0x0, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x990a7b, 0x3f, [], @value64=0x1ff}}) execveat(r4, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000780)=[&(0x7f0000000440)='/dev/vcsu\x00', &(0x7f0000000480)='/dev/vcsu\x00', &(0x7f0000000640)='cgroup\x00', &(0x7f0000000680)='/dev/vcsu\x00', &(0x7f00000006c0)='/dev/vcsu\x00', &(0x7f0000000700)='/dev/vcsu\x00', &(0x7f0000000740)='wlan1*!/bdevproceth0\x00'], 0x1000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r2}, 0x38) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x10c00, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000007c0)=""/133) ioctl$FS_IOC_GETFSLABEL(r5, 0x81009431, &(0x7f0000000280)) [ 1075.244726][ T27] audit: type=1400 audit(1583115443.459:384): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13346 comm="syz-executor.4" 02:17:23 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x505103, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1, 0xffff}, &(0x7f00000001c0)=0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r2}, 0x38) inotify_init1(0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r2}, 0x38) 02:17:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x240000, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x5, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x3c, r0, 0xe11, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}}}, 0x3c}}, 0x0) [ 1075.452123][T13574] overlayfs: './file0' not a directory 02:17:23 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) ioctl$PPPIOCDISCONN(r0, 0x7439) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:23 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275de7cf7cc6c3598ecf2c34e6c4e094f20732c776f72de6469723d2e2f66696c65312c75707065726469723d2e2f66696c653087f625a3580bc1690a0e84c0fbda62953436a0b156822fe9c55def800cd3033eb167a55fcf5a21db90695633d93cfd9c9aeddc9840313fda3b711eb1f2425421dfba8477c73cd5d6b128aa31b93da53fa154a6d2c310d79f5cfaa06de7a9e2cfeb5f31594f514293a1e9430262c56a3f77100912c8"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+'}, 0x16, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttynull\x00', 0x100, 0x0) 02:17:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = getpid() tkill(r3, 0x26) ptrace(0x10, r3) r4 = dup(0xffffffffffffffff) r5 = socket$alg(0x26, 0x5, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r7, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r3, r1, 0x0, 0x7, &(0x7f0000000080)='vmnet1\x00', r8}, 0x30) r9 = getpid() tkill(r9, 0x26) ptrace(0x10, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r9, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='net/route\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0xfffb) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) pwrite64(r12, &(0x7f0000000300)="3805784e5caf646377b92b7b55c58e91d920afbfdbdd109725d64efe9579a30a90b8996d3246d56e7c78d24c783dc158c4a932d0d2707ea72cee82e77dba30887472b40ff8d911b5f90cb58c140992af8f3d5ea9c3e24be0a38e9253828f8524056a59ba128557d73d4fd9b367f76b5b3b106db069c2c63952260da317b6aae2a5facd0b54a29a38bfbaf3272b443f18c8e65ce72bfc6a2c2679949f074f8e9e99293a165afa82cd5917878144b1d59d99c32da35df9443d", 0xb8, 0xff) r13 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r13, r11, 0x0, 0x8001) write$P9_RGETLOCK(r11, &(0x7f0000000000)={0x26, 0x37, 0x2, {0x0, 0x100000000, 0xffffffffffffff01, 0xffffffffffffffff, 0x8, 'net/arp\x00'}}, 0x26) r14 = syz_open_procfs(0x0, &(0x7f0000000200)='timerslack_ns\x00') preadv(r14, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1075.571350][T13372] encrypted_key: insufficient parameters specified [ 1075.605553][T13660] tipc: Enabling of bearer rejected, already enabled 02:17:24 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x10, 0x800) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000180)={@rand_addr, @broadcast}, &(0x7f00000001c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x34, r0, 0x20, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x100, @udp='udp:syz1\x00'}}}}, 0x34}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x8, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x10, 0x9, 0x7dae}, &(0x7f0000000180)=0x20d, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6}}, 0x10) [ 1075.851603][T13372] encrypted_key: insufficient parameters specified 02:17:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], r2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r3}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r3}, 0x38) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x78, r5, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x7, 0xfffffff9, 0x5]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}]}, 0x78}, 0x1, 0x0, 0x0, 0x4c010}, 0x8040) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) [ 1075.996074][T13771] overlayfs: unrecognized mount option "wordir=./file1" or missing value 02:17:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0x6, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909e5, 0x7, [], @ptr=0x1}}) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:24 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x8c2f8336cd12a52f) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) signalfd4(r2, &(0x7f0000000080)={[0x5]}, 0x8, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000000)) 02:17:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x64280, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x80, 0x2, 0x8, 0x3, 0x0, 0x0, {0x0, 0x0, 0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x4305}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_RETRANS={0x8}, @CTA_TIMEOUT_TCP_SYN_SENT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_TCP_SYN_RECV={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_TCP_SYN_SENT={0x8, 0x1, 0x1, 0x0, 0x80000001}, @CTA_TIMEOUT_TCP_SYN_SENT={0x8, 0x1, 0x1, 0x0, 0xf3f}, @CTA_TIMEOUT_TCP_UNACK={0x8, 0xb, 0x1, 0x0, 0xf0}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x1ff}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000001c0)="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", 0x0, &(0x7f0000000080), &(0x7f0000000040)="ffa159d5183f00000083", 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:24 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x32082, 0x0) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)={{r0, r1/1000+30000}, {r2, r3/1000+10000}}) mkdir(&(0x7f0000000040)='./bus\x00', 0x148) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="580000003100000310001100090001006373755f06000000000000000b00010073616d706c65002d0db68d48d57a7a006373756d000900000000000000ffff0000616d706c65000091de9ffa98373b83c89f8963473e268f417076c43d5c0c2fb114d168b892c8100000bb594a52571cf5dc0531069a30ba3465ce161307000000aeb2fc74e62f4d6e5400000000000000000000000000000000de6240351c22e066b3fdbb7ef04df6b21654387b277b13644adfce2c9b4ee84e0cd8f4b33a31c759eed7615f01"], 0x58}, 0x1, 0x0, 0x0, 0x4c0d0}, 0x1) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:24 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(0x0, &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000001480)="670e8ddd4d1041f23b8f6dd2475196214b81af42f98bdb2e0c0c14e4dc8650c71ffecf970eee4e9d4b57e44ca990cd0c53de6bf5f14bca6759c92dece1601e1a48ac172800e569cae6e945c9dd2d66fcaae614df58a05ad49c407e75d819cb1fab8ecd916021da119d68a2", 0x6b, 0xfffffffffffffff8) keyctl$revoke(0x3, r4) r5 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000a40)="936fb65912065fbc1321e5f4adaa67f9d2d292f1765805cf4f0ff78d8c20beb511478ad2851c289137726116a545889f1d7c64c012b8e550ade1684ac8fed87f12a1eb4037104a067a814f679ef20065a729e021facd864fff462e783f65b14f2b66f2db4394cca8217e183090d8926f9217f3d229908d1be71f7db5934d54aeaa6fd7141cf865771f9eb1f82dd02b6f47bb2d156098788f474f23bd626199cd83931e79d5a628d339c94af3e9e5162c8c722b69819cf4fc3cde6469939eea7df15c4ce9f5a28779bdf034186d840328c6423a68ac87ef49cf92a257fa7646", 0xdf, r4) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r5, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r7) keyctl$chown(0x4, r6, r7, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1076.449531][T14092] tipc: Bearer : already 2 bearers with priority 0 [ 1076.457057][T14092] tipc: Enabling of bearer rejected, cannot adjust to lower [ 1076.529082][T14096] encrypted_key: insufficient parameters specified 02:17:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0x6, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909e5, 0x7, [], @ptr=0x1}}) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000300)={0xc1, {{0xa, 0x4e21, 0xfffff001, @mcast2, 0x81}}, 0x0, 0x6, [{{0xa, 0x4e22, 0x2, @mcast1, 0x3}}, {{0xa, 0x4e22, 0x9, @empty, 0x6}}, {{0xa, 0x4e21, 0x4, @mcast1, 0x178}}, {{0xa, 0x4e20, 0x0, @local, 0x4}}, {{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, {{0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0xdc9}}]}, 0x390) [ 1076.583343][T14199] overlayfs: './file0' not a directory [ 1076.638799][T14096] encrypted_key: insufficient parameters specified 02:17:24 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xffff}, 0x8) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f776572646972422e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c6530df6fa1b7128e11002cda225ddde3c3de1e298e49ed3f62e8a9f4c36f052af49be06351801de56d4fb8a9bdb27ebb3eb844beae28"]) r0 = socket$kcm(0x10, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0/file0\x00', 0xe, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0xa6f}, 0x16, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:17:25 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c65723000000000000006000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a42455b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1076.744694][T14238] tipc: Bearer : already 2 bearers with priority 0 [ 1076.759207][T14238] tipc: Enabling of bearer rejected, cannot adjust to lower 02:17:25 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x101040, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000440)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r3 = dup(r2) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000040)=0xc465, 0x4) 02:17:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0x6, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909e5, 0x7, [], @ptr=0x1}}) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:25 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x10) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000240)=0x6e) syz_init_net_socket$x25(0x9, 0x5, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) openat$fb0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fb0\x00', 0x80, 0x0) chdir(&(0x7f0000000100)='./file0\x00') chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) [ 1076.965366][T14415] overlayfs: unrecognized mount option "lowerdirB./bus" or missing value [ 1077.003252][T14419] tipc: Bearer : already 2 bearers with priority 0 02:17:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) mmap$IORING_OFF_CQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x58db54de2daf59d2, 0x2010, r0, 0x8000000) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x34, r3, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_SEQ={0xe, 0xa, "ed0f5ce059ec3ff99cf1"}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_SEQ={0x7, 0xa, "d54787"}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x200400c0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r6, &(0x7f00000017c0), 0x2a2, 0x800000) sendmmsg$alg(r6, &(0x7f0000000700)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)="be6321d739ce6d8fe0403e9d0b73da5653b7c0fcd1d733b3b1fa014ed0bbff707d5e9fa28ad33820bb796bd6b92a3154abe7eba56585f3b9f1c1f5399bdb825b082344f1f480a80c2e91121252fa5c33d67d373c5bebf6b8851e046d79b780f9e99f413aad228d39b967a2c8a9f882563d42a5779f998f4358e395f1d5cb947a7e5ffa2d8c68b2bc0f933a647452cfbdbb0090bb96b1d87bb24bb9ad41b46462e48abba7892631421f68f78148e335dc70e6261a633926f4e0c654bc0b14a65a7158c0c2adde8e91196e7c8f", 0xcc}, {&(0x7f0000000180)="b838dedc8253f3957f95fb3450874b532560ae5394dbb3df353e26262be07276e4126b43527d8ac2", 0x28}, {&(0x7f0000000300)="d91bfaa1a05427218f305cd25d7c4fad634692edbb6e83a9725c52ac30229f024ed5ef741e5f01b0ccb1ac94f2f3612d44dfbee5b648a6753d7f83502e2cf78686f98ca37f68eb601388ec688d92ef450cd9d44608599f3aa1aee6887daf62dcd5f685fe255e257d6f255d207ef3df62cbf0a07665e68838370ee974333bd6dc85e03a6fcc44fa7330520b4bb4d77859d59c54a78a37c556fed5e68475fded76f0cc62139b8743cae0055b7cbe98242646829a5af1a838ef754946828df4443f18d7fdcaa9ef142db0cc3b97e6bc0376420ba8e3c486975f26a0fefce3f14bb84768568bfc789a2d8ea60192be0f", 0xee}, {&(0x7f00000001c0)="085649ba504aa25e576d37471e017eee1bb4f3bd8bd071031ee09b3ebbe7421984f22f3fbc28ad81ebe5db025f9c87b498b05f75890617c65dd42e6e97f58227f23308abb316d7e70754395b55930b58af4a21be9d7c4e0fe28874b04be9d3c1c399b750566f3b2c483e95c3d41aa7992dd49513c7bdc111db7d53185defa17ae06a5f547816e6", 0x87}], 0x4, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}], 0x30, 0x2c048030}, {0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000480)="057b063cf0523444b72894c03a1b54db487a2a236cd3bb475be708c2d08021e632b9a54f66cadb3e9f986717d73d5e42e5918db309b0b8f385861cbcbb2548b8792be82557da0d715bc77ac8bcbbab9fdb0549e77e9e7a6687f8ff36feeacf2e72f78c665807901e813bff2498998ab114", 0x71}, {&(0x7f0000000500)="ca736c1bcd18169d8ed917ae67e39a195169ae049229d2af3e872e0b616a6cc2bb346e997cb9363821c105d109bf", 0x2e}, {&(0x7f0000000540)="4b86d63ac2efbb64390b7878ff6b881b9c1113817eee2b1a90049670301d6487ad76b7603e766a5488bf5629e29826d5f084355d32c06f8262e88d5983a75d12104e8c743b3b3ee28ad5afd83f6e05fe6591f4eba54767b88030a2cdfdb92e7bd33ef37f63f60e41ec1d6cef", 0x6c}, {&(0x7f00000005c0)="5c6f4514a783193436a001dc137f8813979f0e9223e0c743319cc51b5a620cb19a1aa254977535bbbf61752398e46673377eaea66a75537ecf56ad8c82593144a116723197a1491522ae63e48f514f8f6a0c92bfa69fcffd01a8d9e45b22c3c7fd3ec393", 0x64}], 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000170100000300000001000000000000001800000000000000170100000400000000100000000000003000000000000000170100000200000015000000816c288b52b2dbf58a9bab0f79bbd1193128f8f9d8000000000000000f586d99a5085efdc56c8c9faded3ee22534b4883f44c208726ec3650ff48594e0c4fe676da4ce26c1c1844b4bddefac813355aab885fc2966d66893743ea36a"], 0x60, 0x41}], 0x2, 0x40810) [ 1077.013597][T14419] tipc: Enabling of bearer rejected, cannot adjust to lower [ 1077.087772][T14415] overlayfs: unrecognized mount option "lowerdirB./bus" or missing value 02:17:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0x6, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909e5, 0x7, [], @ptr=0x1}}) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1077.150653][T14416] encrypted_key: insufficient parameters specified 02:17:25 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275772c776f726b6469043d2e2f66696c65312c75707065726469723d2e2f66696c6530250d17ce48ed0ef90a821bd70a1a64515d64da4da49fbdd86bcaff7f5306f5924374252f9bb89d7c5c452747db2a032d054ea19ea800000000"]) chdir(&(0x7f0000000380)='./bus\x00') rmdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1077.260492][T14430] overlayfs: unrecognized mount option "lordir=./bus" or missing value [ 1077.300666][T14440] tipc: Bearer : already 2 bearers with priority 0 [ 1077.359444][T14440] tipc: Enabling of bearer rejected, cannot adjust to lower [ 1077.422026][T14416] encrypted_key: insufficient parameters specified 02:17:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:25 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x1, 0x5, 0x4, 0x1404, 0x80000000, {0x77359400}, {0x4, 0xc, 0x8, 0x40, 0xf2, 0x9, "a74cfe9b"}, 0x1, 0x4, @userptr=0xf82, 0x80000, 0x0, r2}) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x9, 0x3, 0x278, 0xb8, 0xb8, 0x0, 0xb8, 0xb8, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, &(0x7f0000000040), {[{{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x8, 0x3ffc00, 0x5, 'syz1\x00', {0xa8b2}}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x10}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xe}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x8, 0x20, 0x2, 'snmp\x00', 'syz1\x00', {0x8}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r2 = syz_open_pts(0xffffffffffffffff, 0x8080) preadv(r2, &(0x7f00000017c0), 0x0, 0x800000) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x4000000, 0x800, {}, {0x3, 0x1, 0xff, 0x9, 0x0, 0x40, "c90261d1"}, 0x1, 0x3, @planes=&(0x7f00000000c0)={0x10001, 0x8, @mem_offset=0x1, 0xd5ef}, 0x2, 0x0, r1}) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f00000001c0)={0x7ff, 0x9}) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000000), &(0x7f0000000080)) [ 1077.487530][T14639] overlayfs: unrecognized mount option "workdi=./file1" or missing value 02:17:25 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000480)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x4}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r1}, 0x38) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r4, 0xc01864ba, &(0x7f0000001640)={0x3, 0x80000000, 0x10000, 0xdededede}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcsa\x00', 0xc000, 0x0) sendfile(r3, r2, 0x0, 0x8001) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000140)={&(0x7f00000001c0)="0b6a9d99b3aa7e708948174f643ac8a62ad0ea0431de801e594741ab5ba2c09d3370b9bb7cabe11b749565c54e4ca514d27e15cc98649d6453d1a267229fca4bb8ab", &(0x7f0000000240)=""/80, &(0x7f0000000640)="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", &(0x7f00000002c0)="08631ffa10b0607d55b33ae0ce99f606ce3daa5657308dcb01af102de50dec26f576ece6a9256f47db0f04cdfcdc9c37d4f408e0c802af3353eabd2c8dbce4289f2c8dab42b5b8d57563ea589cc53dd8f9393be9f60402fae766d43af91256cf89b0807b4b3f7796bc7ccdcaf93aacda9c02e5c4509ff1ddb1cbd2cab868a98ef457eb9ca8c935a774826d249822bc67270cb99dd0c25556d5a8a55d25f81bd0839a736ce3c2d31f40d64dda2a1b6fcc7ea6bf736d7a490a79835a25551b346ce19f3671609496b5dab66cf209c3ce29ca9e50b5825fcdc4", 0x0, r2, 0x4}, 0x38) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x7fffffff, 0x1}, {0x4, 0x1}]}, 0x14, 0x1) r6 = getpid() tkill(r6, 0x26) ptrace(0x10, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={r6, r4, 0x0, 0xa, &(0x7f0000001680)='/dev/vcsa\x00', 0xffffffffffffffff}, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r9 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r9, r8, 0x0, 0x8001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001940)={r2, 0xc0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=0xfffffffffffffff9, 0x0, 0x0, 0x0, &(0x7f0000001780)={0x9, 0x5}, 0x0, 0x0, &(0x7f00000017c0)={0x4, 0x3, 0x3, 0x2168}, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001980)={r7, r8, 0x0, 0xa, &(0x7f0000001700)='/dev/vcsa\x00', r10}, 0x30) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) [ 1077.636763][T14641] overlayfs: unrecognized mount option "workdi=./file1" or missing value [ 1077.666432][T14646] tipc: Bearer : already 2 bearers with priority 0 02:17:25 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r6 = add_key(0x0, &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000001480)="670e8ddd4d1041f23b8f6dd2475196214b81af42f98bdb2e0c0c14e4dc8650c71ffecf970eee4e9d4b57e44ca990cd0c53de6bf5f14bca6759c92dece1601e1a48ac172800e569cae6e945c9dd2d66fcaae614df58a05ad49c407e75d819cb1fab8ecd916021da119d68a2", 0x6b, 0xfffffffffffffff8) keyctl$revoke(0x3, r6) r7 = add_key(0x0, &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000001480)="670e8ddd4d1041f23b8f6dd2475196214b81af42f98bdb2e0c0c14e4dc8650c71ffecf970eee4e9d4b57e44ca990cd0c53de6bf5f14bca6759c92dece1601e1a48ac172800e569cae6e945c9dd2d66fcaae614df58a05ad49c407e75d819cb1fab8ecd916021da119d68a2", 0x6b, 0xfffffffffffffff8) keyctl$revoke(0x3, r7) keyctl$reject(0x13, r7, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r8) keyctl$chown(0x4, r5, r8, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r9, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r10, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1077.717050][T14646] tipc: Enabling of bearer rejected, cannot adjust to lower 02:17:26 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:17:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x8, &(0x7f0000000700)=[{&(0x7f0000000180)="99fc493059a1fa5f7383d64852bb38aeab14f05c610676067c02e582ff694b172f17c8342143e9b66a2f34aca68630f73fbc2886f28bb68001887d45d108933d3e459813c51d8177b7f05de9fc5266ac4db8af4bfc979c2ae190b13a2c5c357c87a8892c3da1d30b0c3e7ba1980300e5441fbd5622ee7fbef34bc4b2fc5b16362d856c81373b0002f6bc678efd9015c1b083408ffe5360f4617abac20a58a8a36af921947979", 0xa6, 0x4}, {&(0x7f0000000300)="79a109f0ee5c74dec5ac941307999e3348033e6f162f0274c023da247899a81e11a321fa469c8051570a220811b0532aa40df31168a504249866a30b42a397907f8d92fa04792dbce935a2498dfb76a3eb5742a2c696f36880bcdb9dfc57667f3da6875a179bd3232de630702c6defc95bdf96b974801cad7b94a6e7be5d047031e95f902a5bbf66c747469f7454149e9682f0096771852d2bcd", 0x9a, 0x7fff}, {&(0x7f0000000240)="c8aa4238fb466f34dc2224d17cbe73895df464320049d0ce4cd9bcbb4554e1cdb777470167b42e8b81a73f0a366b5cfb84ed3dcaab14731a64fcd9dbfcec1c53a67099468c94a5387789bbe118b1ed067bc5d6e391e3eff10d42557e259e54343bfc419fc960f5622ff5a9747f2c141f47d3110272", 0x75, 0x3f}, {&(0x7f00000003c0)="a9d52261ce4db13a85bb741fa2ac3a5eb8e62d70ec090dfd615b95e1b6760092ef0d491880f1b5a1825e10978ac1e2808d037ebc01", 0x35, 0x3}, {&(0x7f0000000400)="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", 0xfb, 0x401}, {&(0x7f0000000500)="897ef1db30e0e723034585489a70f74f6ee8612f32b313c231a95c97d6c1fe737319f3e2d3380d781d9e120b8810d25e751cd1ea7c3eb3d5530daba6e78cd31b548981fa8e41f233c0f2a76add8262eefb815ba09b6557d3b2a333807d4bd2a6817fbc0de4fdc9c027160e26a235d36c4b26931d6afd41cd1d370b2e37cdec0ff0fc3a40", 0x84, 0x2}, {&(0x7f00000005c0)="0fcaf17b13576c032932a05b2382", 0xe, 0x4}, {&(0x7f0000000600)="05f205db767fa5d342e87f4da6f075a708bb2e235d121c4bfb5aaa3d7ac2d6bc28d25324c690326f27eda8e0b5cdadd47b96467ccfd548640b1da5d00095cfbad11247f4d56e992ee9b40532bec75229569b2e405191ce4c5f00052bcfc95f22dd7157480a765a6090e97f0811c7514fa4d15103dda2da9dd0632c6b8b02a6a12491492f7de3ee987ea6c9ff43111fb659a08adfebe0366fd4b380c88188a3c26cbe3451dc31e0353363a53567ca0c601fd345831c05b024b16eeee41928b2da38fbb19af33abcdcb7b0d1d56c4d9df053c6d2a3c352f860c0814cf454f4b7ded5909fad38d8ad433620870682c58e", 0xef}], 0x100400, &(0x7f00000007c0)=ANY=[@ANYBLOB="636865636b5f696e745f646174612c736b69705f62616c616e63652c6496896c98cc8c07f9a05341cd0d53fe8d617461636f772c64617461636f772c7468726561645f706f6f6c3d3078303030303030303030303030303030332c61636c2c6e6f696e74f2655f63616368652c736d61636b66736861743d2c736d61636b66736465663d2c646566636f"]) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffff90}, {&(0x7f0000000080)=""/78}], 0x1}}], 0x1, 0x2000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) pwrite64(r4, &(0x7f00000008c0)="38011cddcaf0", 0x6, 0x200) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$rds(r3, &(0x7f0000000880)={0x2, 0x4e22, @empty}, 0x10) 02:17:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1078.075178][T14717] encrypted_key: insufficient parameters specified 02:17:26 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file1\x00', 0x5c) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)='overlay\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U+', 0xffff}, 0x16, 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000140)='./bus/file0\x00', 0x400) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000140)=0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000000c0)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000040)="cfdd61e1d44b7599f3cf2fc1d841602fcce95e1f824637433169922ce1024be24b0e4b20be1f551978447ea1348eb0303176245fde4f00"/66, &(0x7f00000014c0), 0x3000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1078.240901][T14965] overlayfs: './file0' not a directory 02:17:26 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file10\x00'/47]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1078.334902][T14973] encrypted_key: insufficient parameters specified [ 1078.398563][ T27] kauditd_printk_skb: 12 callbacks suppressed [ 1078.398574][ T27] audit: type=1400 audit(1583115446.609:397): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=14976 comm="syz-executor.5" 02:17:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:26 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r2 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r3 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r3, 0x5c, 0x3, r4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r5) keyctl$chown(0x4, r4, r5, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r6, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r7, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1078.545244][T14983] overlayfs: failed to resolve './file0': -2 [ 1078.619712][ T27] audit: type=1804 audit(1583115446.839:398): pid=14983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir645434648/syzkaller.vacy4S/1212/bus/file0" dev="sda1" ino=16583 res=1 02:17:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1078.763981][T15017] overlayfs: option "workdir=./file10" is useless in a non-upper mount, ignore [ 1078.788417][ T27] audit: type=1400 audit(1583115446.889:399): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=14979 comm="overlay" [ 1078.796791][T15017] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 02:17:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000100)={0x0, 0x98, 0xfffffffffffffde9}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x22000, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x3}}], [{@pcr={'pcr', 0x3d, 0x1b}}]}) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:27 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperd)r=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) [ 1078.855411][ T27] audit: type=1804 audit(1583115447.069:400): pid=15192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1143/bus/file0" dev="sda1" ino=16626 res=1 02:17:27 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x24) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = getpid() tkill(r1, 0x26) ptrace(0x10, r1) sched_getparam(r1, &(0x7f0000000180)) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./bus/file0\x00', r0, &(0x7f0000000300)='./bus\x00', 0x4) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6ff4fb88727fecc20f2f627573113149750d062b"]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000040)='./file0\x00', 0x12c) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x101402, 0x4) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, 0x0) 02:17:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1079.077566][T15207] overlayfs: unrecognized mount option "upperd)r=./file0" or missing value 02:17:27 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1079.355704][T15415] tipc: Bearer : already 2 bearers with priority 0 [ 1079.371275][T15415] tipc: Enabling of bearer rejected, cannot adjust to lower [ 1079.390041][T15019] encrypted_key: insufficient parameters specified 02:17:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000001c0)="305e37d90241b315c9109380c42ed884a4e702b90afde6176a5279837a8d03e86fa52e615862eae19d147fd95fe50699ea4b523e046b818ea0af9a0016ebf087b9429a4b71aeff1b84240a52a016bf732b1a4d90cf9a78ebb72577f4b40012214cb3475abd0f4576102c7fcdef96c871c0d77cb307a3acce0e779f8f9e95e0bb46f2e571cf378b6a62cc6e41f753e4895fe7c40f108c7b603d96498cd90fcb03e7d0aba914ed8ab336ab0121323970e4e17170b4d5c25cd36702b6ff3a44ee96a9e2538ba8c9f0c53786ae18c33564e006613ff6adc2f0cc976e5218955389c4", 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x8001) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000000)={0x18, 0x0, 0x0, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x1f, 0xc, 0x4, 0x4000, 0x106, {}, {0x4, 0x0, 0x9, 0xc1, 0x9, 0x5, 'ZN+<'}, 0x2, 0x3, @fd, 0x630, 0x0, 0xffffffffffffffff}) pidfd_getfd(r4, r1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r5, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:27 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0xe000, 0x40, &(0x7f0000ff1000/0xe000)=nil) shmctl$IPC_RMID(r0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000000)=0x8) r2 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x8b11, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400600, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000140)=0x4, 0x4) 02:17:27 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') epoll_create1(0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000140)=0x68) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:27 executing program 0: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1079.574761][ T27] audit: type=1400 audit(1583115447.789:401): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=15418 comm="syz-executor.2" [ 1079.668076][T15425] encrypted_key: insufficient parameters specified [ 1079.685929][T15430] overlayfs: './file0' not a directory 02:17:28 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[]}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x5, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000000700)='./file0\x00', 0x0, 0x14) r5 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r5, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r7) keyctl$chown(0x4, r6, r7, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000680)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000740)='./file0//ile0\x00', 0x44) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:28 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)=0x8) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x4) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f7765726469723d0001000000000000726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c6530"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000040)={0x7ff, 0xffffffff}) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x7f, 0xff, 0x7, 0x1, 0x1f, 0x6, 0xdf, 0x6, 0x0, 0x6, 0x7, 0x4, 0xfb, 0x34}, 0xe) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000000c0)=0x1) 02:17:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ftruncate(r0, 0x80000001) accept$unix(r1, 0x0, &(0x7f0000002a80)) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x8001) clock_gettime(0x0, &(0x7f000000be80)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f000000c200)={0x8000, 0x7, 0x4, 0x4, 0xfffffeff, {r6, r7/1000+10000}, {0x1, 0xc, 0xf8, 0x1, 0x80, 0x0, "8e1c6e4d"}, 0x2, 0x4, @userptr=0xaed8, 0xb8, 0x0, 0xffffffffffffffff}) ioctl$RNDADDTOENTCNT(r8, 0x40045201, &(0x7f000000c280)=0x97) sendfile(r3, r2, 0x0, 0x8001) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r9, &(0x7f00000017c0), 0x2a2, 0x800000) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) 02:17:28 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./bus/file0\x00', 0x2c22360f9a66bd39) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f77653d2e2f4975732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696cb61a13006530"]) chdir(&(0x7f0000000380)='./bus\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5, 0x1, 0x3, 0x8, 0x40, 0x8001}, 0x20) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000000)=0x8) [ 1080.083051][ T27] audit: type=1400 audit(1583115448.299:402): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=15652 comm="syz-executor.5" [ 1080.161672][T15705] overlayfs: unrecognized mount option "lowerdir=" or missing value 02:17:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1080.217671][ T27] audit: type=1804 audit(1583115448.429:403): pid=15705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1146/bus/file0" dev="sda1" ino=16595 res=1 [ 1080.262709][T15698] encrypted_key: insufficient parameters specified [ 1080.267290][T15705] overlayfs: unrecognized mount option "lowerdir=" or missing value 02:17:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0xfffff800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2d}}, 0x4}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r3, 0x4800, 0x30, 0x4, 0x6}, &(0x7f0000000180)=0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:28 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000040)='./file2\x00') r0 = open(&(0x7f0000000000)='./bus/file0\x00', 0xce381, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1080.381406][T15698] encrypted_key: insufficient parameters specified [ 1080.432551][T15858] overlayfs: unrecognized mount option "lowe=./Ius" or missing value 02:17:28 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1080.513717][ T27] audit: type=1804 audit(1583115448.719:404): pid=15858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir645434648/syzkaller.vacy4S/1215/bus/file0" dev="sda1" ino=16641 res=1 02:17:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f00000001c0)="ca0c9b8a54b7112ef0fc1925d9afd83d885539cc91239277216dfe140afd699f24f63b99fd003b56ddaa18d51c2ae9b121d04695b2c55a4319dd6932ed0125caf0f07c785fdbd8f9e191ac68a33cde3b2d41b9976c88ce2e5e9fa30ca58125b5a0b6eb508a1a7e3d699ea2bf566f45d09221d822999ae9c0552b66d82ba0955f8d039a022f9250337cc2876e98605bc3", &(0x7f00000014c0), 0x1100, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101200, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0x0, 0x6, {0x4}}, 0x18) 02:17:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:29 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) write$midi(0xffffffffffffffff, &(0x7f00000002c0)="6dc81d08a9569d82c1dabac5cb89e53cad3fc4486df65b185f1f10aabf898eecc969cf7ce14ddfb780e4e636b664f3b9f0d1b0d27eed271396ee072c689c4d19316c1310ff679ae60127ff36defd220a98a7cffb520e6c2ce8c878e0d26b3c7d0f8e985a3531548970e103520c78cd44b46b65d5fa3f6151ec80f99607718fc0f9058feb2c41ca9fc82ea56c97468033770b1d71ba190f5b81139f6b60d5da3f6ac87c484a49125f348de0f008c999e7db03646820055c", 0xb7) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) 02:17:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x0, 0x7ffffd) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) [ 1080.820962][T16176] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 1080.916283][T16109] encrypted_key: insufficient parameters specified 02:17:29 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x80, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2c}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, 'overlay\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr="6da560b425b5b44366b26f23fc2fe0b9"}, @NLBL_MGMT_A_DOMAIN={0x13, 0x1, '#%-vmnet1*eth0\x00'}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, 'overlay\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 02:17:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:29 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x4000000) 02:17:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = getpgid(0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x5a, 0x20, 0x0, 0x2, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp, 0x8f6c4821e9cec5c0, 0x7, 0x7, 0x6, 0xdc7b, 0x2, 0x2}, r3, 0x10, r4, 0xa) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:29 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x1a) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) [ 1081.269981][T16109] encrypted_key: insufficient parameters specified [ 1081.277505][T16395] overlayfs: './file0' not a directory 02:17:29 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x4000000) [ 1081.327488][ T27] audit: type=1804 audit(1583115449.539:405): pid=16399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1148/bus/bus/file0" dev="overlay" ino=16738 res=1 02:17:29 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="dc0000000a06010100000000000000000a000006440008800c000780060005404e0830809a000780060005404e2100000c00078008000840000000820c000780060005404e210000100007800c001840b6f50001000000ebd100080009400000989408000940000100f0070009400000000060000880100007800900120073797a30000000000c00078005000300200000000c0007800500150000000000180007801400170073797a6b616c6c6572300000000000000c000780060005404e210000100007800a0011000180c2000073797a3000001078c1e3af2a96684885a739c8d9549b3c959c07d84621e4c892277d23ffc419dada8e2e72ba7c102c72bf941ad76e0920bc6b459102992b7b8f8e85c01152888132780f05e486c5eaff7e1f5342f3b9bf4bba8000000000000000608a71bc6a2decc297eb9c0ba561062c9237adf4757949c90f30abb2a4da6325f218b7f9e18bdc4c611a34a3c3bfb9606c5302d01b27a20c58101d02a2212727d9cd4fec25c271ad637356aedced7ec3e10232d4cd11299b5b7dea0d187e47558eef40cb9c28adc7bc7679e6494b8cefb54b02d01d47a20aefd1033ea48b00403e06b7728b59c596ce83e30fa3e8f6a5fc4a5145fc2a965b6f666fa7dbb0125c57490a6f4e02d981d7c7c80fa25047a1f20187808312f53b762964905ba9c6e5eda549bab90f94866cf19b33363fed23992bbeedcd163466089fd7e1816751caae139c11c835f294e695d30b779d8275981d493043cfd6665e4cabf48838f39b984b1d43cf1b80a48f4f5acd036a47595f98b22a0d5b7ee74e3efceb09249509d4879dfcd00d9e1dc7053b747567801e9867ea3c310fab3e28be5e63ac012d0a07af16465f2f5dff75fb6df6dffca0c933c5f0f68518df3f00000000"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:29 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="000002000000000000004500fde50000000000849078ac1e0001c400000100000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0xfdef) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240)=0x8ab, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000001080)={@ipx={0x4, 0x4, 0x863, "8383358595b6", 0x7f}, {0x0}, 0x0}, 0xa0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) write$apparmor_exec(r6, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) 02:17:29 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = socket(0x40000000015, 0x5, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x20, r2, 0x22, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)="fe", 0x1}], 0x1, 0x0, 0x0, 0x40}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x82, &(0x7f00000001c0)={r7}, 0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r7, 0x7f}, &(0x7f0000000280)=0x8) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r8, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80001}, 0x6000800) 02:17:29 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x4000000) 02:17:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, &(0x7f0000000140)) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x2}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 02:17:30 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4000000) 02:17:30 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x1) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1ccd0000d065b3f6033622a2828b221a6cc8ca1d3c9fd768538a90d66f85f19c90a595b7f49cf3c4c0161f9afd50b14e4ebc49292f1801cc0246b8c91b16a41c3eb1aed28f0a8495644964d3b1c781e0f50bad5cf81c6f51aa8b6ff2d6bd179cf35284f9c5f6ad", @ANYRES16=r1, @ANYBLOB="000229bd7000fddbdf25000000000800020000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) mount$overlay(0x400000, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000080)='overlay\x00', 0x10000, &(0x7f0000000480)=ANY=[@ANYRES32=r2]) symlink(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000440)='./bus\x00') chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x20000001, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040)="908bb2cb2b58688c2228f011f80b29bd37a814d8a426b3856967eb36b98971744a442719c6d139a9562f57e612488aa5dc47b5b571ad7d89575099a2881cc2d04adb3e49b885c80f51a0510ca5eec3a03004cc3b783bb198e72b0ef7f296a04f3b2ffa1c2b3727b58f78", &(0x7f00000001c0)="b1e209b6463ff0485651b01d5462ecd305ee0ce79f5cc7a0801feadff210b826b62dd63766188e6b4b41a0b72d05f64da99102ce7974d2aa88a5126669d166db575564745c2b996e0bf3e150607f7f1b094cdc1ccd8a69981cd85b7ece7af31072a80131282a2837335d549246e7d277b83ab98f69252120d79110036d8e464dcb304fb41212e6a78e007d427ac602ec085b46b6fe693a42cce7e5f31825a17f", 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000140)="630ab154aebf2d560272c256d8b95b0647d5cbb252e69d928e8bbfdef1e9aebd5b5bc6edadf17e1e0967f5476da7", &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x9, 0x2, 0xc, 0x4, "d6a07a4aca00cc4ad1292706c62a46968a4662c5b05410bfa543d58fa34fda4c287ea9b7617824124e6def21ddf819c0e9c4e555ea0bfa1e1c112b0170bc52e6", "0b4114b8c432c464ef2c5a42c0ba7e32f7d0019d7c0ac6639e1d0cf2e2fdbeda", [0x80000000, 0x9]}) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000640)=""/4096) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1081.980330][T16610] encrypted_key: insufficient parameters specified 02:17:30 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4000000) [ 1082.088389][T16687] overlayfs: unrecognized mount option "" or missing value 02:17:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x80000000, 0x105041) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x10000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10800, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000100)={0x4000000, 0x9, 0x4}) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000080)=0x5) [ 1082.144676][ T27] audit: type=1400 audit(1583115450.359:406): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=16723 comm="syz-executor.5" 02:17:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) connect$l2tp6(r1, &(0x7f0000000080)={0xa, 0x0, 0x7, @loopback, 0x0, 0x4}, 0x20) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)="091e5c8b005bc5dc435327c0a6b80888123cbe195bb9c18b5f14aba6d71ea96b12eb035c04922862d42f00f723647890fe957d54dd9dd3dc8cf0af08c0f06000c7270ec30983c8e37fd2462c69d3e451298987d6ce77f14b67fbf1fa5202c5035208ee9d9f609c4844c9ad356ec25f1b3a051810cccad1374ccfd5e357197d232ae74314520de7ab93cd97a9683fa00bf6eb8520ee43b7157e13959e0faf68b4105951e4d93578d8d9c90af40425c3baecfe3d96f097c5444442a8e97608528607f5de6e62ee3a06acf84114af31023b446093d49eb2c2e876d97f813912c6537d527855067fa297cfb36b9bfbb37c", 0x0, 0x7, r2}, 0x38) 02:17:30 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4000000) [ 1082.285630][T16610] encrypted_key: insufficient parameters specified 02:17:30 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000700)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRESOCT=0x0, @ANYRES16=r3, @ANYRESOCT=r3, @ANYBLOB="6ad96675a6d86de5b23798900fe450ab924a65497ddd6987984d56c18289ee138c9d7f50c4187ff2485e34d1c44c04ff36bd500b369ce72c111ed5305116c1a12ee6a6d20f58e58f7d85a4c2e62406eb8283e36557fbaa94520db6e6018d26b9"], 0x6}, 0x1, 0x0, 0x0, 0xfc679f8c7f368820}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r5 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r5, r4, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r6 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) r7 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r7, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r6, 0x5c, 0x3, r7) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r8) keyctl$chown(0x4, r7, r8, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r9, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r10, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1082.741883][T16860] encrypted_key: insufficient parameters specified [ 1082.909999][T16854] encrypted_key: insufficient parameters specified 02:17:31 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x206000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x100, r1, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfff7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x18}}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x34}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8523}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x465}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x100}, 0x1, 0x0, 0x0, 0x8}, 0x8080) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,usperdir=./file0']) lsetxattr$security_evm(&(0x7f0000000340)='./bus\x00', &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000500)=@ng={0x4, 0x5}, 0x2, 0x2) chdir(&(0x7f0000000380)='./bus\x00') r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, 0x0) 02:17:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) setpriority(0x3, 0xffffffffffffffff, 0x9) 02:17:31 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chdir(&(0x7f0000000380)='./bus\x00') open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) 02:17:31 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x4000000) 02:17:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x3, 0x80, 0x400, 0x420, 0xffffffffffffffff, 0x659, [], 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r3, 0x8983, &(0x7f0000000040)={0x1, 'sit0\x00', {}, 0x8}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r1}, 0x38) 02:17:31 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x2, 0x20, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1f}, 0x9010, 0x8, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:31 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x4000000) [ 1083.364679][T16867] encrypted_key: insufficient parameters specified [ 1083.459447][T16867] encrypted_key: insufficient parameters specified 02:17:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xfffffffe, 0x80, 0x400}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:31 executing program 3: r0 = getpid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000680)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001f00)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r4 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r5 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r6 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r5) r7 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f00000006c0)={'syz'}, &(0x7f0000000780), 0x0, r6) keyctl$read(0xb, r7, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r5, 0x5c, 0x3, r7) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r8) keyctl$chown(0x4, r7, r8, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r9, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r10, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1083.514968][T17038] overlayfs: unrecognized mount option "usperdir=./file0" or missing value 02:17:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', &(0x7f0000000140)='\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x8001) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000001c0)={0x8, 0x6, 0x4, 0x100000, 0x80000001, {0x77359400}, {0x1, 0x8, 0x1f, 0x9, 0xff, 0x9, "044c1f90"}, 0x8, 0x1, @fd=r2, 0x80000000}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) syz_emit_ethernet(0x95, &(0x7f0000000040)={@local, @random="3b503239a227", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x22, 0x88, 0x0, @local, @local, {[], {0x0, 0x0, 0x5f, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "5f0ae9c9550d2435980fc617a8f5b16bb20db5fd4be2d5df319877d4b7678a3fe774e84c91550513fde7e369ef513c771877e48e61845cfc300f6d9080345026ea693bcbfd32f37b0d0f3f44b854d861e0f22d"}}}}}}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') pipe(&(0x7f0000000000)) preadv(r6, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:31 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f00000003c0)={{&(0x7f00000002c0)=""/92, 0x5c}, &(0x7f0000000340), 0x1}, 0x20) r1 = getpid() tkill(r1, 0x26) ptrace(0x10, r1) setpgid(0xffffffffffffffff, r1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000200)=0x1, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000400)='./bus/file0\x00', 0x0, 0x18}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) [ 1083.561489][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 1083.561504][ T27] audit: type=1804 audit(1583115451.779:410): pid=17038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1150/bus/file0" dev="sda1" ino=16596 res=1 02:17:31 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x4000000) [ 1083.653293][T17083] overlayfs: unrecognized mount option "usperdir=./file0" or missing value 02:17:32 executing program 4: mkdir(&(0x7f00000018c0)='./file0\x00', 0x9e) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file1\x00', 0x100000001, 0x8, &(0x7f0000001780)=[{&(0x7f00000002c0)="3729fc00000080e3f891700feb9cf0e064f875c3e7d6ec03d79d73b1b28ca2cbc01e09c789848020db9de50bc3f82513acedaf0bc9fd2785b16b23edfa07303cb09e3cd7e007846a5419c3ecfb44aeefcaae33e376ff00308417e1e8dd14f9485dca701d74", 0x65, 0x9}, {&(0x7f00000003c0)="041c2d84d5010b4fd8f1c41014fc8122d26464ae7f17d78bea56b9b89f8afbe19c05df5c18901e88b279e038f22e2ee70eab0be3dac8889f37ae7f67f309af000072e219f4958933418e9d62c43e443cd6efd58c3516100b11bbcfbafeeb6779557370280a0eb6467ee3b9182e5b2a346310c71cb8adab0a4de2d4ca146bb951a904", 0x82, 0x81}, {&(0x7f0000000480)="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", 0xfd, 0x7}, {&(0x7f0000000580)="597faf04796a7b9a77f35daa7ad667bd13604c7fe6876351994eed326cae1f4097232136bef137a0c75d5036a50972825566c2e76492df5f5c5eb0b57447e7fbc057bf94092f7c555fdd4bd957b606f4812f2954495547e84e5371b0", 0x5c, 0x4}, {&(0x7f0000000600)="ea95ddf171ed3ca8d148da50c363dce87e18d2d1e8373843124736db0614b985bb22e2376d7c2af755f989eead86569f331afb0cd02c1459b031473384600aa5e3c98fc11f022cd45d543b5453cf7ba8260a5dd57bec83fb3193a8998adf08d619e0e3bf5cfbfd478c7d20052824574f2edcc5ecdde2a284fe9376fce4b82d285cb202ea025ec193d4e9b874cc076eafc8a916496758530ae4df96d8343765184ad9bd348b0db36b60e2de65875c", 0xae, 0x8000}, {&(0x7f0000000140)="910400b81ba4", 0x6}, {&(0x7f00000006c0)="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", 0x1000, 0x53}, {&(0x7f00000016c0)="0a56771c9f51f2574662fa03313d6ad442ecf30fa66d2543840b4bc0aef0cf0d00ea096213c05b24722795c7611911c98ecda8fdabbf852fb88cd99f2fa0d701b71f4255b5c4e925615e409faf13b119f69261c7c9a4ab68efa0282515ca848c9f38ac49f4d8d0b13de31cee2d707451247b5b02e880f5d9136e81e5e6f564a6f465432b4129e82962c2297e8c12a20f93d6e9dc239b6b6a39d5a7d55ac08903051169d839411fba", 0xa8, 0x8}], 0x4810, &(0x7f0000001900)={[{@noquota='noquota'}], [{@subj_role={'subj_role', 0x3d, '!ppp0vmnet0'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'overlay\x00'}}, {@smackfsdef={'smackfsdef'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'overlay\x00'}}]}) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) mknod$loop(&(0x7f0000000340)='./file0\x00', 0x34c2, 0x0) 02:17:32 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0], 0x2}}, 0x4000000) 02:17:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r4 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) pwritev(r5, &(0x7f0000000600)=[{&(0x7f00000000c0)="170d4a743ba1521302c4516db52aeda052c6f6d8fe25b11b05152d9d54aa721f0cf55f9e5701e400be5c2459a4afb3129215f7481ce19de547b29afb27743339d5531c95d041437a1a4592e0eff7d4ae5474bf311370a308a824233f9a5b68", 0x5f}, {&(0x7f0000000140)="27c26496e5331b8b90fca068e05fc8a0d1f72c9ed3fb076ced33c78f7d50e946b780d06a19eb1b6b9a448ddaafca74781a6a03c7774cdc3abf91140dd4dab6d305ff20fb9477aa49eaab601926fa228291e942df36aadec5f550cfbac68685ebbc505c01c03464162698cfe6a725a55df8de9d8669ff20b4d907aa6a8bd756f637c1426f7fc2e7b69309ae421940d44d605310b7c22c73d6366f1b902a6c4e469df109bffaf5617bc3056b063c94b30d3e99caac33c75f696dabe7a91b165d801d79d4279814f69ea4476427b3c40dc1dba1f40b5d", 0xd5}, {&(0x7f0000000300)="fbee862090748ab52e28d5f1c77905d9c7a5f310bf93180a9f80736833a910bef1226616541ea142137b553db31f9eec2fa0502cb3535e4df9133a341c16359e68c182d60133c47285c2850dff30917fcba821f62d648f04a650e3200703f7bbe8d5a50f9dcc042402acf2baf48b6290ac5bc2c7e03d22dfdb87e6583c536648fcae2997ca88bea5d831391d03cbd6a43b9d34c22df81e04b75e8e29baed4f6106736053be244c4ccdba11046ea04378cb0f312a2166a1ac5984b8f8dbb68d862760027fb4bba3b6bcdcca99186841db4307946fdd63344aabcc8e8e4bb6", 0xde}, {&(0x7f0000000400)="7ce7a01e14c943dd62fe0e396148b6bcf11cf255ee9d549f2a0f278b8523bb992b25f35497c948883e28ca454cfbe8473fba93818c3a7a5363a587160ccc874a7ae9c76fd7a1637fda22c57b356d622ba64d53b7a7e4971b12a10758b835cc89844bc24bc049beec51141e35da7359f70d7135e89348bcbaa1a322f347e22b7af31d553003b8ac9a7692279b2148899cd8cd7abef240c456161d95c29cb085d047b72a2e00124aa2401dcc8b57def6459d1709f79229909c04d00d180b38c4d8032cb213163fd68588c8a815d558eaa5944e101e339d66b6d18188504bdb0209e01c0605d739a6ac7a7f4d6f8600773187792879", 0xf4}, {&(0x7f0000000500)="a0febc0144f62d372c12c25af5634ff09a08ce4fc3b0ccafaac4638fc6c471c1217be9670e5a1621be665ba8caace4d515e19a8ee9", 0x35}, {&(0x7f0000000540)="c5486d3e3428e4299b99f6ebf7b923315762cfe400d0d2d76b5c229f7d7888908cb681255c23e4e0fc4987558ddb9fdb0d124f686a14280211f039391b4e57d913edabff875981255fe05c71243ab96f487e2d01aa734977e48f926b9bf820aad16e04dde8490d572c0ddec5d0ace03aac03ef22995f34543fab53d0b56088e02520746a7e8c4e0c5ddc743ae2c0f647b8c774183dbc04ae532112cf3da98b046df9fa5a16a21be62669a8cfab0c9141bf4ba4ecdd22", 0xb6}], 0x6, 0x3) r6 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r7 = socket(0x40000000015, 0x5, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(r3, r6, 0x0, 0x8001) mkdirat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r8, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:32 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r2, r1, 0x0) syz_mount_image$erofs(&(0x7f00000003c0)='erofs\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)="645707da57355af973f79e417bb0e76b84f479002a7f", 0x16, 0x3}], 0x8, &(0x7f00000004c0)={[{@user_xattr='user_xattr'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x8}}, {@acl='acl'}], [{@obj_type={'obj_type', 0x3d, 'em0proc(!em1ppp0.selinux-/ppp1'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vmnet0em0/bdevprocsystem$mime_typewlan1cpuset+'}}, {@measure='measure'}, {@uid_lt={'uid<', r1}}, {@hash='hash'}, {@fsname={'fsname'}}]}) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000000)=0x8) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x210000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000002c0)={0xfffff281, 0x800, 0x1, 'queue1\x00', 0x2}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000040)={0x0, 0x0, 0x300, 0x1, {0x4, 0x1, 0x7, 0x6}}) [ 1084.246962][T17293] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0xa74f4898) 02:17:32 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0], 0x2}}, 0x4000000) [ 1084.294619][T17293] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 02:17:32 executing program 2: prctl$PR_SVE_SET_VL(0x32, 0x9517) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000000)=[{{0x3, 0x1, 0x1, 0x1}, {0x1, 0x0, 0x0, 0x1}}, {{0x4, 0x1, 0x0, 0x1}, {0x3, 0x1, 0x0, 0x1}}, {{0x3, 0x1, 0x1, 0x1}, {0x0, 0x1, 0x1}}, {{0x4}, {0x3, 0x0, 0x1}}, {{0x1, 0x0, 0x1}, {0x1}}], 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0xc1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1084.356967][T17319] erofs: (device loop1): erofs_read_superblock: cannot find valid erofs superblock [ 1084.387850][T17293] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 02:17:32 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/822], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x68df462b90fbc917, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1084.459088][T17293] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 02:17:32 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0], 0x2}}, 0x4000000) [ 1084.612554][ T27] audit: type=1804 audit(1583115452.829:411): pid=17328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1151/bus/file0" dev="sda1" ino=16723 res=1 [ 1084.701622][T17328] overlayfs: './file0' not a directory 02:17:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000140)=0x1f, 0x4) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000380)={'wg2\x00', r4}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], r5}, 0x40) socket$nl_sock_diag(0x10, 0x3, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000001c0)="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", 0x0, &(0x7f0000000080), &(0x7f0000000080)="7eb4be570b7870bbf731d166f02b0000000000000000914260f40bc973370ce11e4db3e73e42acff3c02000000000000002a", 0x1000, r6}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r6}, 0x38) ioctl$SG_NEXT_CMD_LEN(r6, 0x2283, &(0x7f0000000040)=0xeb) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000440)=""/126) r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r10, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r11 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000f00)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r10, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xfe0b30f6f140e346}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r11, 0x10, 0x0, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c804}, 0x24008010) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r9, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x6c, r11, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_team\x00'}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:usr_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) sendfile(r8, r7, 0x0, 0x8001) r12 = inotify_init() r13 = inotify_add_watch(r12, &(0x7f0000000240)='.\x00', 0xc0000080) inotify_rm_watch(r12, r13) r14 = socket$phonet_pipe(0x23, 0x5, 0x2) pwrite64(r14, &(0x7f00000004c0)="8e53d48e2bfbc900ae66fa6302dfa3f238f20a6a8235482fa6d38733c3a8cbfeff1d14d2be2586da055c2fc970398fcf560f818561b7626e73fe1ee5923e25c412f2aef66f4144b2e1ef9919f0bc09706343436b6087ad68349f9af0e6af89d7e54d8cbf59acc12faf6ce4c381e1318947d43e87030ca8c3d2a3d4940f8717c5bd3b66b8950bfe26c62a4dfd47587133dffd0c15713f1cde2095495071bfec1d633c4a950e2f986ee597a03049ca8dc9a0fab2328f40184627a17a1a559f56281d741abdcfd11b8131be0fb8e8c0b3b3cf4cd74ddf039d881aa6557d44", 0xdd, 0x2) inotify_rm_watch(r7, r13) 02:17:33 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) uselib(&(0x7f0000000040)='./bus/file0\x00') creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f7765766469723d2e2f6275732c776f726b6469723d2e01c3fe67fe81e4cd707065726469723d2e2f66696c65307af99de673bfd9deb5d7a6df695a7ce8daaf999caedb5ff6ac0219e55540340d39d76da62307ec6d0885fa7b43f225bae776c2e77d69179a0f97ed7747bc25f429980a63132eb372edebedd62d0498e6fdd4d2d40b8632a81048"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x3}}, 0x4000000) [ 1084.910168][ T27] audit: type=1400 audit(1583115453.129:412): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=17534 comm="syz-executor.5" [ 1084.946909][T17332] encrypted_key: insufficient parameters specified 02:17:33 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @fixed={[], 0x11}, 0x3}, 0xa) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x3}}, 0x4000000) 02:17:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x5, @remote, 0x535}}, 0x2, 0x7f, 0x5b0, 0x8, 0x93, 0x7, 0x1b}, &(0x7f0000000140)=0x9c) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={r3, 0x40, 0x0, 0x20}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000177ab83f418e080007002e2f"], 0x10) preadv(r4, &(0x7f00000017c0), 0x2a2, 0x800000) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) setsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r8, 0x0) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0xd7, 0x3, &(0x7f0000000240)=[{&(0x7f00000003c0)="a8a6c221defb10ff8b3bb25cb29da74a9321f093b589aadafe9309fa9d16caf8c49d2ce92dc3bcb4baef14dd29f40e013d72d5ece08e17894ef7207f8a8aea9700a7a13f26878c87b9de0b94c7f6c389d832537dfc8a0aecd61f5b81722455f9ee967b770a6ad1f02c042b5bf9d5ace2e60458f8f646f5d9b8a1c06f5406217596953a7a330e527a58df8fb1fa9dcf48d9388a58cad92d6ebdb6cd822d9206cfb2d7c110c0a1da93e4fe8a8dce1318b552277aed07996d8bf2824acbf88fc49fd970b02a632518431011ffa63c3488a77ba9f1464722a1342f93633fa34effb50f9deba3cd0c489bede1a231bf891256940155ac4600", 0xf6, 0x8efb}, {&(0x7f00000004c0)="8074a279519aa7c7a1bde6237c84405eb7bda92acdd9cef1ff3d600dc439f6f89465035b7bd7784e19f00c25f8f97c81c17268454ca42c9c90967af6cd348e775107dd0567654cde7daf9b9812e85df4df7a28a911466bb905c3e1a8e25177d5bf05fb2b071b8bca8a2f49d037895b26b9e9a25e140a5e1e0124b218ce192e5508634f8c144403b5d846616648bdc69c59d1b6d4ccfc4c311100f8d09e16272a", 0xa0, 0x7}, {&(0x7f0000000580)="dd3b869d24977ba60ac5aea18ba183d0d290df6a70d18ff179acc71743458a0b92ea4d1beeaa115052e6ea68bb5887c79b43554fc30a007d0c4b0affc7244f94151e142e7c51a71169e0f60c8130d053695f2c826235e276aee7a47f16a8c72f97de97043ea03c564403058da13747afa6f103029636aad5d0f4fe12da5e2b1bde941d46871a106efc8abf9b48c1f58fb88f028261ae6fea5de896033c9ed2f9f6aa99d232fcbe7c8881d012c4442031", 0xb0, 0x3f}], 0x10000, &(0x7f0000000780)={[{@tails_on='tails=on'}, {@tails_off='tails=off'}, {@user_xattr='user_xattr'}, {@data_writeback='data=writeback'}, {@errors_ro_remount='errors=ro-remount'}, {@acl='acl'}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', r5}}, {@fowner_gt={'fowner>', r6}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_eq={'euid', 0x3d, r9}}, {@subj_user={'subj_user', 0x3d, 'lo'}}]}) 02:17:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) write$dsp(r1, &(0x7f0000000040)="44941081c0e23ae9b2d67a08b7", 0xd) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)="2903a46b2a", 0x0, 0x6, r0, 0x4}, 0x38) [ 1085.300533][T17581] overlayfs: unrecognized mount option "lowevdir=./bus" or missing value [ 1085.340728][ T27] audit: type=1804 audit(1583115453.559:413): pid=17581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir645434648/syzkaller.vacy4S/1222/bus/file0" dev="sda1" ino=16581 res=1 02:17:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x3}}, 0x4000000) [ 1085.431313][T17332] encrypted_key: insufficient parameters specified [ 1085.476952][ T27] audit: type=1400 audit(1583115453.669:414): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=17640 comm="syz-executor.5" 02:17:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000"], 0x3}}, 0x4000000) 02:17:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() tkill(r2, 0x26) ptrace(0x10, r2) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r8, r7, 0x0, 0x8001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r2, r7, 0x0, 0x8, &(0x7f0000000540)='net/arp\x00'}, 0x30) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast2, @multicast2}, &(0x7f0000000300)=0xc) sendmsg$nl_route(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=@mpls_delroute={0x154, 0x19, 0x200, 0x70bd28, 0x25dfdbfe, {0x1c, 0x14, 0x14, 0x2, 0x0, 0x2, 0xff, 0xa, 0x1100}, [@RTA_MULTIPATH={0xc, 0x9, {0x9, 0x0, 0x3, r4}}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x71}, @RTA_DST={0x8, 0x1, {0xaf9}}, @RTA_NEWDST={0x84, 0x13, [{0x4e}, {0x1ff, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x180, 0x0, 0x1}, {0xeb2, 0x0, 0x1}, {0xd5f}, {0x401, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x2}, {0x7, 0x0, 0x1}, {0x2}, {0x9, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x22, 0x0, 0x1}, {0x1f, 0x0, 0x1}, {0x364, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x3}, {0x86b1}, {}, {0x1}, {0x9}, {0x2}, {0xc34a}, {0x3, 0x0, 0x1}, {0x91, 0x0, 0x1}, {0xcb, 0x0, 0x1}, {0x8}, {0x9}, {0x3f, 0x0, 0x1}]}, @RTA_OIF={0x8, 0x4, r6}, @RTA_NEWDST={0x84, 0x13, [{0x5}, {}, {0x1ff, 0x0, 0x1}, {}, {0x1400}, {0x7, 0x0, 0x1}, {0x1}, {0x1010, 0x0, 0x1}, {0x80, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x2}, {0x9}, {0x7ff, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x8}, {0x4}, {0xffff, 0x0, 0x1}, {0xffffa, 0x0, 0x1}, {0x7}, {0xfff, 0x0, 0x1}, {0xfffc0}, {0x7, 0x0, 0x1}, {0x4}, {0x773, 0x0, 0x1}, {0x8}, {0x4, 0x0, 0x1}, {0x400, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x5}, {0x1, 0x0, 0x1}, {}, {0x84b}]}, @RTA_MULTIPATH={0xc, 0x9, {0x1, 0x1, 0x80, r9}}]}, 0x154}, 0x1, 0x0, 0x0, 0x8000}, 0x1) rt_sigqueueinfo(r2, 0x20, &(0x7f0000000080)={0x32, 0x0, 0x8}) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r10, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1085.612912][T17766] overlayfs: './file0' not a directory [ 1085.638429][ T27] audit: type=1804 audit(1583115453.849:415): pid=17766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1152/bus/bus/file0" dev="overlay" ino=16755 res=1 02:17:34 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:34 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRESOCT]) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:17:34 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x4, &(0x7f0000000140), &(0x7f00000002c0)=0x4) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) bind$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) 02:17:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000"], 0x3}}, 0x4000000) 02:17:34 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x2) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1}], 0x1, 0x0, 0x0, 0x6bf326d9c8e80396}, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000780)={0x0, 0x1000, "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"}, &(0x7f0000000180)=0x1008) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000001c0)={r5, 0xfff5, 0x20, 0x35, 0x9}, &(0x7f0000000240)=0xfffffffffffffe68) dup2(r1, r2) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="be", 0x1}], 0x1}, 0x2000000) connect$netrom(r0, &(0x7f0000000080)={{0x3, @null, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x88400, 0x0) r8 = socket(0x40000000015, 0x5, 0x0) connect$inet(r8, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r8, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) write$nbd(r8, &(0x7f00000003c0)=ANY=[@ANYBLOB="674466980000010000007bebdd4b47d0fe7af0f5d08ac620959640a958b8d17ffb100587ecd06020c6f0b2f5c2f895ffff0000fda71dff2220eeaf3892344511be587305b2a03554bb69de5d0355d81c5a920f7ad696deac4e067d33bc2e61c102c2e086ffd07f6fbe1654bb950542c55617322c407c621ea36d6e240044c546032c7c4fe4bc96fe6f3e469387b667f30da6698a5d15e72e98fc006d7b0fd3b5e86a91d2ede679d70cf8bfd3c864f04b876e017311c254d46aa944f91be9d5a1ce"], 0x3f) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r9, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x1, 0xffffffff, 0x400, 0x0, 0xffffffffffffffff, 0xca}, 0x40) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xffffffff, 0x101003) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000080)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000"], 0x3}}, 0x4000000) [ 1086.204517][T17810] overlayfs: unrecognized mount option "" or missing value [ 1086.227211][T17782] encrypted_key: insufficient parameters specified [ 1086.282255][ T27] audit: type=1804 audit(1583115454.499:416): pid=17810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1153/bus/file0" dev="sda1" ino=16657 res=1 02:17:34 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6ffc5342838156ec6479723d2e2f6275732c776f6469723d2e2f66696c65312c7570bd04726469723d000000"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) [ 1086.348494][T17999] overlayfs: unrecognized mount option "" or missing value 02:17:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_S_MODULATOR(r3, 0x40445637, &(0x7f00000000c0)={0x1f, "c67723e24b71f6c02ac87615a8ade3b9b77ef84d70e51cc580042e3419f22bc9", 0x10, 0x2, 0x8000, 0x8, 0x5}) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069"], 0x3}}, 0x4000000) [ 1086.460910][ T27] audit: type=1804 audit(1583115454.679:417): pid=18003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1153/bus/bus/file0" dev="sda1" ino=16575 res=1 02:17:34 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726bb458646925312e2f66696c65312c75707065726469723d2e2f66696c6530"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1086.566808][T17782] encrypted_key: insufficient parameters specified 02:17:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8001) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, r0}, 0x40) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x1, 0x0) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0xfffffffc, 0x3ff, 0x2f47972c, 0xfffffe01, 0x97, 0xffffffff, 0x8, 0x8}}) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000001c0)={0x4, "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"}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f0000000640)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r2}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r2}, 0x38) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r8, r7, 0x0, 0x8001) write$apparmor_exec(r8, &(0x7f0000000140)={'stack ', '(y\x0e(&]\x00'}, 0xd) [ 1086.714955][ T27] audit: type=1400 audit(1583115454.929:418): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=18029 comm="syz-executor.5" [ 1086.742935][T18058] overlayfs: unrecognized mount option "loSBVdyr=./bus" or missing value 02:17:35 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0xa6000, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x1f}, 0x41004, 0x0, 0x0, 0x9, 0x1, 0x2}, 0x0, 0x10000000000006, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000a80)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000a40)="51c98b5e742c439eef", 0x9, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000940)=""/119, 0x77}], 0x3}, 0x60) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:35 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069"], 0x3}}, 0x4000000) [ 1086.792490][ T27] audit: type=1400 audit(1583115454.979:419): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=18029 comm="syz-executor.5" 02:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000002cc0), 0x0, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1086.943110][T18166] overlayfs: unrecognized mount option "workXdi%1./file1" or missing value 02:17:35 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000140)=0x4) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000000)=0x8) [ 1087.043236][T18211] encrypted_key: insufficient parameters specified 02:17:35 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069"], 0x3}}, 0x4000000) 02:17:35 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x10) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1087.199345][T18211] encrypted_key: insufficient parameters specified 02:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:35 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x5c, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xca}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:35 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a62617461"], 0x3}}, 0x4000000) [ 1087.580812][T18351] overlayfs: unrecognized mount option "lowe_ƘBg#urdir=kdir=./file1" or missing value 02:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'bond_slave_1\x00', {0x3}, 0xfff9}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x2002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:36 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x100, 0x4) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:36 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a62617461"], 0x3}}, 0x4000000) [ 1087.833442][T18432] encrypted_key: insufficient parameters specified 02:17:36 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) accept4(r0, 0x0, &(0x7f00000002c0), 0x80000) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xd, "2a66c1e46c600d25fc15b303cf"}, &(0x7f0000000040)=0x15) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r3, 0x80000000, 0x10}, 0xc) [ 1088.166320][T18432] encrypted_key: insufficient parameters specified 02:17:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') semget$private(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) 02:17:36 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a62617461"], 0x3}}, 0x4000000) 02:17:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000001c0)="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"/330, 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) 02:17:36 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6c6f7365326469723d2e2f6275732c776f726b6469723d2e2f66696c65312c7570efe7b5910c7b70653000"/53]) chdir(&(0x7f0000000380)='./bus\x00') ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)=0x7fffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) 02:17:36 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) r4 = socket$inet6(0xa, 0x10000000000001, 0x0) r5 = dup2(r4, r4) setsockopt$inet_int(r5, 0x0, 0x18, &(0x7f0000000200)=0x1, 0x1) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, 0x0, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r7) keyctl$chown(0x4, r6, r7, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 02:17:36 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a62617461000830"], 0x3}}, 0x4000000) 02:17:36 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66692c65309a13a406bb948a0caa569ec025fe65f3cfedcc5958309ad2a4b76fea60fa9a68b8ef4f0fdb1d5255135722b40be06ec190880e7735ad22ef4b8f10f679dde86da70f2a75780b4494acf99cd4c54475166925c380a5912d54fc95c4308212280298df59f185227dc78889da4b394bd788e22bd59f77"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x280101, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00000002c0)={@loopback, @rand_addr=0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8001) stat(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno'}, 0x2c, {[{@posixacl='posixacl'}, {@dfltgid={'dfltgid', 0x3d, r5}}, {@debug={'debug', 0x3d, 0x20}}, {@cache_mmap='cache=mmap'}, {@version_u='version=9p2000.u'}, {@debug={'debug', 0x3d, 0x2}}, {@version_u='version=9p2000.u'}, {@access_client='access=client'}], [{@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@dont_appraise='dont_appraise'}]}}) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:37 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a62617461000830"], 0x3}}, 0x4000000) 02:17:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') rt_sigpending(&(0x7f0000000000), 0x8) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1088.789478][T18988] overlayfs: unrecognized mount option "lose2dir=./bus" or missing value 02:17:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x1, 0x80, 0x400}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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"/326, 0x0, &(0x7f0000000080), &(0x7f00000001c0)="b6e5dbda4b8bef802c64ed9356cecf56617f86992841d6c5cde0b31d9137e18972ba3b7bd2490a2fe6dbf6f88f5ddd13a45d9148fe843391b4a58912061225357a9af34d832b9a2d4c9ccc0621da3ab77d25890cf7adc0bba87e71f0b3af68c59b508a690e431413e623bac1c410a9eeacf60264e9b9c2009e330ba1210e4071ba431df52bbc75cf3ff79682f5cf6df0b91a3fcf96f1b73b45da88754f3a65558eff00bbe3da5830cb18996959364a7881b90f24f1333d9cd2c94ea4d24fa3de77", 0x7f, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1088.852375][T18899] encrypted_key: insufficient parameters specified [ 1088.863356][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 1088.863373][ T27] audit: type=1804 audit(1583115457.079:424): pid=18988 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1157/bus/file0" dev="sda1" ino=16527 res=1 [ 1088.942386][T18993] overlayfs: unrecognized mount option "e0 V%eYX0Ҥo`hORUW" nw5"Kym*ux DDui%À-T0(Y"}LjK9K׈+՟w" or missing value 02:17:37 executing program 4: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='./file0\x00', 0x78, 0x3, &(0x7f0000000480)=[{&(0x7f00000002c0)="f540f040508fe2adb08d97726cc09adb469fb225d677f260b762ccaa3be28b5661c28c380a98f184e21c2590b137b8fa9aa6687cceccbf92e7dd59044ace56d14d011760744042ad6909ab85cd0a9e150c3e7cd93890bb350ab99db687e43a8165abe0e9fb4c5c1d1b2b938cd34ba040df429b072dfe79ea543060b8ab02496d3e4d23c3103e17f750d78707d8562e2bb098c201ec29764c8774299add11d302096774e5eac6304c1d71b2ee62051a93e68e79", 0xb3, 0x6}, {&(0x7f00000003c0)="f973cd94f07f35f7767463a5f27182f83d788d50985d97ded3524f43bd0f9a2d2c483a27f631275fe14963499bf9ef81548c1c5d657f637a24217dbbdda8b6a266a1db0db286a98ff8f1a8d8b52ef8da5581bfca3a8797febc666c5261bcd96c888de1253329d204834c0bc586054a7db5d0d2029913683ae244a2dd19523ec4826cd948d0aad00c9f79b82caa94cd0c37ff2db1749ec451da402fa2493fed801cdb87c14e79c05518519bda439d10b4", 0xb0, 0x9}, {&(0x7f0000000140)="4abd1bbc5484e260e96d5cf392352054e1f4d1a234e385e393b116ec06a3ecb4575d13d7c5276858dce3", 0x2a, 0x200}], 0x1000000, &(0x7f0000000500)='system![vmnet0Gvmnet1mime_type+\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) 02:17:37 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a62617461000830"], 0x3}}, 0x4000000) [ 1089.187407][T19107] encrypted_key: insufficient parameters specified 02:17:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x100000) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x2a2, 0x800000) [ 1089.341811][T19211] overlayfs: failed to resolve './file1': -2 02:17:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="89095380ab19bc261648f1373fb105389405c382ef747920d8159fac16ca425b72b17bfd7389bb55f8bf08091a143f15210fcf952a394644cd01c1b3a49bf64932f0f4decc35dd4283ce20891cd14bf50de4afbeea898730fa46cb2945202935b937df35912d017513b1bb2379ac28a7c6c2d3ac930a6a13d68f74a3fe67e063dcf0bbd81790ad451673f3ac40b6787984e4f4a33f959b23c80247b39730d4d796e8b13adcb6ddb6f719abaac737b2dcf39606d1b86123ec2ac0fc00118bbca1b3b21a3e4a8258ad7ffd13eb065a77483b91c6bbc4cf52fa0dcf3997166d75e7d54b60bf89bde30a136d520f13021963a20b680dd9b6d21fdfdb33b4c40376d0f5b7651a69be036462150e2f83880c85eb4e50856340fe80d36ea913249fea7fbdd8750d35aa33b177851f4c3a01fe061437bbbb9e1bb250c7f3647825d8573277ccb1e85f6b", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1}], 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 02:17:37 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a6261746100083000"], 0x3}}, 0x4000000) 02:17:37 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x100010, 0xffffffffffffffff, 0xbdddd000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1089.434442][T19211] (syz-executor.4,19211,0):ocfs2_parse_options:1449 ERROR: Unrecognized mount option "system![vmnet0Gvmnet1mime_type+" or missing value [ 1089.460581][T19211] (syz-executor.4,19211,0):ocfs2_fill_super:1175 ERROR: status = -22 [ 1089.499990][ T27] audit: type=1804 audit(1583115457.719:425): pid=19214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1158/bus/file0" dev="sda1" ino=16596 res=1 [ 1089.539301][T19222] encrypted_key: insufficient parameters specified [ 1089.565291][T19222] encrypted_key: insufficient parameters specified [ 1089.594349][T19214] overlayfs: './file0' not a directory [ 1089.607959][ T27] audit: type=1804 audit(1583115457.819:426): pid=19226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1158/bus/bus/file0" dev="sda1" ino=16585 res=1 02:17:37 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) keyctl$chown(0x4, r5, r6, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r7, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) 02:17:37 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000014c0)={0x1, 0xffffffff, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x3, 0x4e5}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r5, 0x0) r7 = socket(0x40000000015, 0x5, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000001500)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000001600)=0xe8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) setsockopt$inet_sctp_SCTP_CONTEXT(r9, 0x84, 0x11, &(0x7f0000000000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r11, r10, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='./bus/file0\x00', 0x1f, 0x3, &(0x7f0000000300)=[{&(0x7f00000002c0), 0x0, 0x10000}, {&(0x7f00000003c0)="28bfb7db5d223bb5777bb7ec407284f4958bc06b2f8b9654056144692eed67de72310c2913360c308cdec7ffca4093c45d9dd3f04f58059ec7620f89e0a6b7c5b2e973c6759c44f5924bc5bfea36b11430395afbcedec5670dd182049cf5a1685470d161c2fa79a0683cde8f23400dbff8db3969d368ac9b25b20620a1cc61da52feb44358cf4860fb2940da36037e34449d603b330209b37cd4138ae3ffaf6d9135a71cace622cb0e316c3ab9f88de006c0ffa273f66973e8fe16a23439f500057899cbae45e2f9b688c58b2746650705d3", 0xd2, 0x9}, {&(0x7f00000004c0)="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", 0x1000, 0x1a2}], 0x8000, &(0x7f0000001640)={[{@flushoncommit='flushoncommit'}], [{@uid_lt={'uid<', r3}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@permit_directio='permit_directio'}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1'}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r5}}, {@obj_user={'obj_user', 0x3d, 'overlay\x00'}}, {@uid_lt={'uid<', r8}}, {@uid_eq={'uid', 0x3d, r10}}]}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:37 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a6261746100083000"], 0x3}}, 0x4000000) 02:17:37 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dlm-monitor\x00', 0x22401, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x40, 0x15, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x44884}, 0x10) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6c1f94ac8dcfc6bc6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065366469723d2e2f66696c6530"]) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x5, 0x6, 0x6, 0x51}) chdir(&(0x7f0000000380)='./bus\x00') r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, 0x0) 02:17:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8200, 0x0) preadv(r2, &(0x7f00000017c0), 0x2a2, 0x800000) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f0000000080)={{r3}, 0xffffffff, 0x4, 0xcc51}) 02:17:38 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a6261746100083000"], 0x3}}, 0x4000000) [ 1089.893847][ T27] audit: type=1400 audit(1583115458.109:427): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=19296 comm="syz-executor.1" 02:17:38 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x2}}, 0x4000000) 02:17:38 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x2}}, 0x4000000) [ 1090.136974][T19364] overlayfs: unrecognized mount option "lƼowerdir=./bus" or missing value 02:17:38 executing program 5: pkey_free(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f00000004c0)="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", 0x0, &(0x7f0000000080), &(0x7f00000014c0), 0x1000, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)="2903a46b2a", 0x0, 0x6, r0}, 0x38) [ 1090.173744][ T27] audit: type=1804 audit(1583115458.389:428): pid=19364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1159/bus/file0" dev="sda1" ino=17020 res=1 [ 1090.216716][T19483] overlayfs: unrecognized mount option "lƼowerdir=./bus" or missing value 02:17:38 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000040)='./file1/../file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x50003, 0x106) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:38 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) getxattr(&(0x7f0000000000)='./bus/file0/file0\x00', &(0x7f0000000040)=@random={'btrfs.', 'overlay\x00'}, &(0x7f00000002c0)=""/113, 0x71) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file1\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0]) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x84) 02:17:38 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x2}}, 0x4000000) [ 1090.489143][T19567] overlayfs: unrecognized mount option "00000000000000000004" or missing value [ 1090.518490][ T27] audit: type=1804 audit(1583115458.729:429): pid=19567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1160/bus/file0" dev="sda1" ino=16566 res=1 [ 1090.549662][T19340] encrypted_key: insufficient parameters specified [ 1090.599598][T19573] overlayfs: unrecognized mount option "00000000000000000003" or missing value [ 1090.714169][T19634] encrypted_key: insufficient parameters specified 02:17:39 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) 02:17:39 executing program 2: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) r4 = socket$inet6(0xa, 0x10000000000001, 0x0) r5 = dup2(r4, r4) setsockopt$inet_int(r5, 0x0, 0x18, &(0x7f0000000200)=0x1, 0x1) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r6, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, 0x0, 0x5c, 0x3, r6) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r7) keyctl$chown(0x4, r6, r7, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 02:17:39 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="000002000000000000004500fde50000000000849078ac1e0001c400000100000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0xfdef) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240)=0x8ab, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000001080)={@ipx={0x4, 0x4, 0x863, "8383358595b6", 0x7f}, {0x0}, 0x0}, 0xa0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x8001) write$apparmor_exec(r6, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) 02:17:39 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockname(r0, &(0x7f00000002c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, &(0x7f0000000140)=0x80) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469729cecee42dc2865312c7570706562646cb87dd6adf80edde200"]) chdir(&(0x7f0000000380)='./bus\x00') prctl$PR_GET_TIMERSLACK(0x1e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file1\x00', 0x1, 0x47f) r2 = open(&(0x7f0000000200)='./file0\x00', 0x101800, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, 0x0) 02:17:39 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c7767726b6469723d2e2f66690000000000000006726469723d2e2f66696c6530"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:39 executing program 3: r0 = getpid() getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x4040) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') r3 = socket$kcm(0x29, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x36a44d91) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000100)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$reject(0x13, r4, 0x5c, 0x3, r5) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(r7, r7, 0x0) keyctl$chown(0x4, r5, r7, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={0x0}}, 0x4008040) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$can_j1939(r8, &(0x7f00000002c0)={&(0x7f00000001c0)=@phonet, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/248, 0xf8}, {&(0x7f0000000240)=""/119, 0x77}], 0x3}, 0x2040) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setpriority(0x2, r0, 0x8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x103000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r9, 0x28, 0x2, &(0x7f0000000040)=0xe3a, 0x8) [ 1090.912936][T19687] overlayfs: unrecognized mount option "workdirB(e1" or missing value 02:17:39 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1090.999544][ T27] audit: type=1804 audit(1583115459.219:430): pid=19687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1161/bus/file0" dev="sda1" ino=16706 res=1 02:17:39 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x20000, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, 0x0) [ 1091.050625][T19697] encrypted_key: insufficient parameters specified [ 1091.052379][T19688] overlayfs: failed to resolve './bus': -2 [ 1091.077287][T19696] overlayfs: unrecognized mount option "wgrkdir=./fi" or missing value 02:17:39 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff9f, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x34}}, 0x4000000) [ 1091.142970][ T27] audit: type=1804 audit(1583115459.239:431): pid=19694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir289652675/syzkaller.h3rr7k/212/bus/file0" dev="sda1" ino=16580 res=1 02:17:39 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x84820, &(0x7f00000003c0)=ANY=[@ANYBLOB="ad8772a9541d22bbd92a9d4f6c6fd8a9dd950617246f7365726469723d2e2f621c9b2c75707065f2623595609459cc1f0d466d0fed437e9c1fd515d1a2e17fdc03247ad5730a9beeec74c6b87f6d7713bde6919e1729e0cd1ffcac0f83b7bc9d80d294b5f0185ae6e5c65e3579143ba78ee23c7b6515a2b592cf36618ca93fa5a6394f3bf3e4e1cdc2ed4b2618ea349f9bfce694fbdad15d4966dc198ca0ed1b211613ea79bf81f613063c82364d2b52a94b1e08c01afed778ec4c4e2197687f48dd"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x8) 02:17:39 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x2}}, 0x4000000) [ 1091.333838][ T27] audit: type=1804 audit(1583115459.549:432): pid=19754 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474360863/syzkaller.n16cGW/1162/bus/file0" dev="sda1" ino=16785 res=1 [ 1091.360736][T19682] encrypted_key: insufficient parameters specified 02:17:39 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000500)=[&(0x7f0000000040)='\x00', &(0x7f0000000140)='overlay\x00', &(0x7f00000002c0)='overlay\x00', &(0x7f0000000300)='overlay\x00', &(0x7f0000000340)='vmnet0\x00', &(0x7f00000003c0)='overlay\x00', &(0x7f0000000400)='\\%-&^vboxnet1cgroupnodevmime_type\x00', &(0x7f0000000440)='overlay\x00', &(0x7f0000000480)='overlay\x00', &(0x7f00000004c0)='overlay\x00'], &(0x7f0000000640)=[&(0x7f0000000580)='overlay\x00', &(0x7f00000005c0)='overlay\x00', &(0x7f0000000600)='\x00']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8001) write$uinput_user_dev(r1, &(0x7f0000000680)={'syz1\x00', {0x100, 0x4540, 0x5, 0x4}, 0x3b, [0x3, 0x0, 0x2a90, 0x1000, 0x4, 0x1, 0x3, 0x7, 0x9, 0x1, 0x5, 0x80000000, 0x0, 0x80000000, 0xfffffffb, 0x1ff, 0x81, 0x5, 0xbeb, 0x2, 0xfff, 0x400, 0xee6, 0x8, 0x7f, 0x1, 0x1, 0xffffffb3, 0x1, 0x54f2, 0x3f, 0x800, 0x40, 0xf7, 0x9, 0x8, 0x2, 0x10001, 0x1, 0x1f, 0xff, 0xfffffffd, 0x0, 0x9, 0xdff, 0xd2, 0xfffffffb, 0x1, 0xffffffff, 0x101, 0x4, 0x6, 0x3ff, 0x6, 0x3ff, 0x7, 0x20, 0xfc6, 0x0, 0xcf, 0x2, 0x5, 0x6e14, 0x6], [0x20, 0x1, 0x3, 0x9, 0x9, 0x1000, 0x4, 0x4, 0x3ff, 0x8, 0x7, 0x9, 0x6, 0x7, 0x6, 0x400, 0x2, 0x8, 0x400, 0xadaa, 0x401, 0x200, 0x0, 0x5, 0x1f7, 0x1, 0x3f, 0xfffffffb, 0xffff, 0x1, 0x5a, 0x3f, 0xb5d, 0x7ff, 0x0, 0x5, 0x7abc, 0x80000001, 0x10001, 0x800, 0x10001, 0x401, 0x3, 0x9, 0x9, 0xff, 0x2, 0x7, 0x7ff, 0x2, 0x6, 0x7, 0x50f, 0x4, 0x8001, 0x3, 0xa08e0000, 0x1f, 0x5, 0x8, 0x3, 0x2, 0x2ab, 0x6], [0x6, 0x200, 0x3, 0x3ff, 0x3, 0x1ff, 0x20, 0x3, 0x40, 0x1, 0x8, 0x1, 0x32, 0x4, 0x4, 0x2, 0x0, 0x7fffffff, 0x3, 0xffff, 0x80000000, 0x10001, 0xfff, 0x0, 0x8, 0x7fffffff, 0x3, 0x7, 0xbfa, 0x80000001, 0x0, 0x7f, 0x1, 0x1ec2142d, 0x9451, 0x7, 0x1, 0x7fffffff, 0x1000, 0x10000000, 0x1, 0x3, 0x5, 0x10001, 0x3, 0x3, 0xfa, 0x400, 0x2, 0x7, 0x20, 0x6, 0x3, 0x9, 0x8, 0x5, 0x4, 0x10001, 0x7, 0x1, 0x4, 0x0, 0x8, 0x2], [0x1ff, 0x5, 0x1000, 0x6, 0x1, 0x8, 0xfff, 0x1000, 0x73a, 0x9, 0x7, 0xfa, 0x5, 0x2, 0x80000000, 0x4, 0x9, 0x13, 0x4, 0xfffff000, 0xffffffe0, 0x77, 0x7, 0x89, 0xffffffff, 0x0, 0x3, 0x1, 0xffffffe0, 0xffffffff, 0xfff, 0xffff, 0xffffb797, 0x4, 0x2, 0x9, 0x0, 0x80, 0x0, 0x5, 0xe8a8, 0x1000, 0x0, 0x9, 0x3, 0x7fffffff, 0x8, 0xbf, 0x9, 0x7ff, 0x0, 0x4, 0x8, 0x8, 0xe184, 0x9, 0x3, 0x0, 0x101, 0x7fffffff, 0x1, 0x2, 0x401, 0x2]}, 0x45c) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, 0x0) [ 1091.505096][T19691] encrypted_key: insufficient parameters specified [ 1091.540607][ T27] audit: type=1400 audit(1583115459.759:433): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=19681 comm="syz-executor.5" 02:17:39 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYBLOB="110e000000000400000001000000000000000141000000180017000000000000000069623a626174610008300000"], 0x2}}, 0x4000000) [ 1091.801174][T19916] [ 1091.803548][T19916] ======================================================