57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x7caa79655ed64e43}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r15 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r15, 0x28007d) 22:34:11 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40580, 0x90) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file0\x00', 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000400)=[@in={0x2, 0x4e22, @broadcast}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 905.828947] devpts: called with bogus options [ 905.875086] devpts: called with bogus options 22:34:11 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) gettid() ftruncate(0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 22:34:11 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000640)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140), &(0x7f00000000c0)={'syz'}, &(0x7f00000009c0)="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", 0x17d, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 905.999430] devpts: called with bogus options 22:34:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 906.144423] devpts: called with bogus options 22:34:12 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r7 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, 0x0, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) 22:34:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:12 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x80002, 0x8000000010) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, r5, 0xa01, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x2c, r5, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 906.793361] devpts: called with bogus options [ 906.895785] devpts: called with bogus options 22:34:12 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key(&(0x7f0000000640)='rxrpc\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f0000000800)="207e5084053e5fe9325223bec0da9ade910cb7a5ab0ac9b2aa43a8ee94d1b4759204315234107357cffec97f32d3d4679599406f217b9fe6970274988f52af334e6f812c9a2f876b83bb2b08aa270158622ebf66529a7dc88e92501cefd06ac5ce55e9b57bdf817c254989d8500cc8c7d28fb7cc509951f97175dadf2444d4435bf496bc625a34634e08dd2eb15c97017a9c9bb7e940359dc2c5d3727dadd953e5f75989c59d0877a4b716c67c", 0xad, 0xfffffffffffffffa) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f00000009c0)="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", 0x18b, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0xfffffffffffffc9d, &(0x7f0000000600)={&(0x7f0000000580)={'streebog512-generic\x00'}, &(0x7f0000000640)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) 22:34:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 906.994503] devpts: called with bogus options [ 907.003578] kauditd_printk_skb: 2 callbacks suppressed [ 907.003586] audit: type=1400 audit(1570401252.840:1553): avc: denied { map } for pid=16866 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:12 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='dev0ts\x00', 0x80000, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)=""/203, 0xcb}, {&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f00000009c0)=""/137, 0x89}, {&(0x7f0000000a80)=""/81, 0x51}, {&(0x7f0000000b00)=""/168, 0xa8}], 0x34, &(0x7f0000000c40)=""/172, 0xac}, 0x6}, {{&(0x7f0000000d00)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000d80)=""/103, 0x67}, {&(0x7f0000000e00)=""/206, 0xce}, {&(0x7f0000000f00)=""/176, 0xb0}, {&(0x7f0000000fc0)=""/167, 0xa7}, {&(0x7f00000006c0)=""/64, 0x40}, {&(0x7f0000001940)=""/113, 0x71}, {&(0x7f0000001100)=""/235, 0xeb}, {&(0x7f0000001200)=""/51, 0x33}, {&(0x7f0000001240)=""/18, 0x12}], 0x9, &(0x7f0000001340)=""/235, 0xeb}, 0xfffffff9}, {{&(0x7f0000001440)=@sco, 0x80, &(0x7f0000001800)=[{&(0x7f00000014c0)=""/35, 0x23}, {&(0x7f0000001500)=""/209, 0xd1}, {&(0x7f0000001600)=""/8, 0x8}, {&(0x7f0000001640)=""/209, 0xd1}, {&(0x7f0000001740)=""/67, 0x43}, {&(0x7f00000017c0)=""/29, 0xffffffffffffff5e}], 0x6}, 0xb4cc}], 0x3, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r5) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000000)='\xe8\x82\xfbI\x00', &(0x7f0000001080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r7, 0xfffffffffffffffd) keyctl$describe(0x6, r7, 0x0, 0x0) r8 = request_key(&(0x7f0000000240)='trusted\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000600)='\x00', r7) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r8, r6}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r9 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, 0x0, r9}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r12, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(r12, r13, 0x0, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r14 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r14, 0x28007d) 22:34:13 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r7 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, 0x0, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) [ 907.120142] net_ratelimit: 22 callbacks suppressed [ 907.120149] protocol 88fb is buggy, dev hsr_slave_0 [ 907.130199] protocol 88fb is buggy, dev hsr_slave_1 22:34:13 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xfcfe9e395382c91b}, 0xc) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000400)=[@in={0x2, 0x4e22, @multicast2}], 0xfffffffffffffec2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file2\x00', 0x7918, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000540)="88f4f8b381bb3d986a153c41517ec788402499604ad1dfddae2bc5c3ff48884203fc1fadd9b51b8166c09f403c8b150859eaa6d290468e7d76c9fd63a1ca56a35be1e12b216fa07896b771f8d418e1edf63256", 0xfffffffffffffe2d, 0x6ed}, {&(0x7f0000000200)="82fb103bb4e8c3020f6b5371fd613a0fe0e08465467887a924cb1658118c9efe80d93a18c7e7813a52f6c7dba9a7ef5fce269137d806a70b5b63a5f600e0b664", 0x40}], 0x82000, 0x0) [ 907.241141] audit: type=1400 audit(1570401253.070:1554): avc: denied { create } for pid=16879 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:34:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:13 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800400, 0x0) ioctl$VFIO_CHECK_EXTENSION(r3, 0x3b65, 0x1) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r4, r2, r4}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 907.357524] devpts: called with bogus options 22:34:13 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'\x04\x04\x00'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 907.409276] audit: type=1400 audit(1570401253.110:1555): avc: denied { write } for pid=16879 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 907.430159] devpts: called with bogus options 22:34:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r1) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 907.569721] audit: type=1400 audit(1570401253.110:1556): avc: denied { read } for pid=16879 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 907.807201] audit: type=1400 audit(1570401253.640:1557): avc: denied { map } for pid=16929 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.938585] devpts: called with bogus options 22:34:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r1) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:13 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000240)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'nhpoly1305\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 908.080148] protocol 88fb is buggy, dev hsr_slave_0 [ 908.085319] protocol 88fb is buggy, dev hsr_slave_1 [ 908.107060] devpts: called with bogus options 22:34:14 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x6, &(0x7f0000000280)={0x7ff, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) 22:34:14 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_elf64(r4, &(0x7f00000009c0)={{0x7f, 0x45, 0x4c, 0x46, 0x30, 0x9, 0x9, 0x3, 0x9, 0x3, 0x6, 0x27e, 0x2fb, 0x40, 0x187, 0x6, 0x0, 0x38, 0x1, 0x0, 0x940, 0x40}, [{0x0, 0x1, 0x1, 0x3, 0x9, 0x5, 0x40, 0x3}, {0x27fb4b5d82838d1f, 0x7, 0x7, 0x100, 0x9, 0xffffffffffffa71a, 0x1, 0x3}], "9b06c7dc5a4a6876b3a4ef9349f5383efd1a1d9978d923ba80dbd414228dfc5bc4a33a39a8e4cf4f806b492c66581422dfb9b97aa26436e930013bb0238778ef6c84bfb0cebe75ae0813e308c30b4951b14be7c1570f2feb9ae7428d89e7c5af4ed09719e6156620667a1eacb1cf5c480192db4812b5b75f3f6d36ecdd31bdc0d5c27e8ea7c94f144c409dfbae2bad7c96d848f09ac86ef0f47fc56e1aaa6a5264331adb1afdc663d40b49478496554e3c36c9ff1b7adb88b7f0b0fe6a983bb8de744dbfbdda9d1a23e4477010d07d987fd4bc126aeb783de19e4b3bbf42c200aa0e9a4ac941e1f2091697", [[], []]}, 0x39b) ioctl$sock_netdev_private(r3, 0x89f3, &(0x7f0000000800)="207c529b622bc8057477a615bba0a80d2a0b8af7b9e6b7b80c9a59907b8e47f7dea7e62ceb31c1878135cd5395e9ce428a08f3996d98bbbe4fb05cdd316c32e627ae0b70fd5dbb47c99a4b8f6d2a49ba31889ec713b60d81180d5302ad4b48cb6faf6ad99be4ec5bb325469588a291a640cbbad32fc1e57d6908083b8aba32542d88a0bfb4241ff438a9e4bb338345a84edbcd4d97b2fc98fb4d2ef0140308966df905abdf8fed63d34b545be47742a716148b61fe54b4b1a9f2f9258673d06dc0aec4ea06c8e2af31b53c39885c5cb3c616f674d19db4afdd0c") ftruncate(0xffffffffffffffff, 0x0) 22:34:14 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) [ 908.469287] devpts: called with bogus options [ 908.480111] protocol 88fb is buggy, dev hsr_slave_0 [ 908.480125] protocol 88fb is buggy, dev hsr_slave_0 [ 908.485224] protocol 88fb is buggy, dev hsr_slave_1 [ 908.490253] protocol 88fb is buggy, dev hsr_slave_1 [ 908.495288] protocol 88fb is buggy, dev hsr_slave_0 [ 908.505270] protocol 88fb is buggy, dev hsr_slave_1 [ 908.520555] devpts: called with bogus options 22:34:14 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r1) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 908.555254] devpts: called with bogus options 22:34:14 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x120, 0xe07f8f5afc8cabfe) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r6) r8 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r8, 0xfffffffffffffffd) keyctl$describe(0x6, r8, 0x0, 0x0) r9 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000005c0)={'\x00', 0x1}, &(0x7f0000000800)="00e270b3558f2499d0fcdb76b3ef920a39adc074b2a994ae3e69699411db3b8701875c4177cbe31d2c719066cccf5d511088de87bba85ba9313947917d705a0edf0d80052b53714effa6bf0d2f619877281416ef3ef9e1650877d225b5329ecd57738ec2118c480e851e28daef6def9a6f37ad2122a0107d5841e4f31a46ae82286d2efe0364d332f66a2e26568629ed001ec71152310487612d99778e8085bd45c10937c42960ca133ce8efc2bef5461d16446f3786064aadac12abdbd2ff538497c0344aac69afe9be9fa74459ec5ffe81d5172f574b94156e653545f9", 0xde, r8) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r7, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r5, r4, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 908.929766] devpts: called with bogus options [ 908.993235] audit: type=1400 audit(1570401254.830:1558): avc: denied { map } for pid=17000 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:15 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:15 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x5}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r9, r9}, &(0x7f0000000700)=""/243, 0xfffffffffffffe35, &(0x7f0000000240)={&(0x7f00000002c0)={'sha224-generic\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:15 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) [ 909.265389] devpts: called with bogus options [ 909.327899] audit: type=1400 audit(1570401255.160:1559): avc: denied { map } for pid=17007 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:15 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 909.441316] devpts: called with bogus options 22:34:15 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) add_key$user(&(0x7f0000000200)='\x00\b\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, r0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:15 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 909.573937] devpts: called with bogus options [ 909.647206] devpts: called with bogus options 22:34:15 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:15 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000180)={0x6, &(0x7f0000000080)=[{0x7, 0x5}, {0x3ab, 0xbb38}, {0x0, 0x4}, {0x0, 0x4}, {0x2, 0xfffa}, {0x9, 0xb6f}]}) listen(r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 910.003865] audit: type=1400 audit(1570401255.840:1560): avc: denied { map } for pid=17052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:15 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:16 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3d) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mq_unlink(&(0x7f00000002c0)='poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00') creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, 0x0) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r8, r7, r8}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r9 = request_key(&(0x7f0000000240)='encryptet\x00', &(0x7f0000000380)={'\x00\x06\x00', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r8, 0x0, r9}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000600)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r10, 0x28007d) 22:34:16 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x240880, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) r5 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x129, &(0x7f0000000200)={0x0, 0x0}}, 0xfffffffffffffe13) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r6, 0x8, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r6, 0x9, 0xc}, 0xc) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000400)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x3, 0x2, 0x5, 0x3f, 0xffffffffffffffff}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r7 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:16 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:16 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) 22:34:16 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000180)='keyring\x00', 0xfffffffffffffffe) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ftruncate(0xffffffffffffffff, 0x0) [ 910.430573] devpts: called with bogus options [ 910.633858] devpts: called with bogus options 22:34:16 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x200000}, 0x75b59972dcfa2069) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r10 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r11 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r10) r12 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r12, r11, r12}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r13 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r14 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r13) r15 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r15, r14, r15}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r12, r14, r9}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r16 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r17 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, r16, r17}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r18 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r18, 0x28007d) 22:34:16 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:16 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x207) getsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000240), &(0x7f00000002c0)=0x4) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) [ 910.803066] devpts: called with bogus options 22:34:16 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, 0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 910.955337] devpts: called with bogus options 22:34:16 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:17 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x5, &(0x7f0000000280)={0x9, 0x1}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r10 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r11 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r10) r12 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r12, r11, r12}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r12, r9}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000600)="9f59dabb282f9104e5f3538df6b8f4783b500a65305553c96fc718947ef3be9162608ff9f52e764d141b1f9461b5a3a9f86491c769383522231d5b7f4cdda70c122c8906203ca564a6cb08f140e780fdd349bf50a79b7dd3966d9aa456644251d3274017335a714b7c5a73826e137e0fd621d19d08bbfffe062a880a0ffeff5e5bc5b544d91eed8c31e4bb180f0399c3c55952eaa6265233067c1f9fe15cabb0012853d8838793ed9d7fbbc134d874f1428f98e9cbd84a615f40c5415648", 0x4a3}) r13 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r14 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, r13, r14}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r15 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r15, 0x28007d) 22:34:17 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 911.305713] devpts: called with bogus options [ 911.318636] devpts: called with bogus options 22:34:17 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='c\x00\x00\x00\x00idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000600)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 911.421291] devpts: called with bogus options 22:34:17 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x602082) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) dup(r3) ftruncate(0xffffffffffffffff, 0x0) 22:34:17 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:17 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000002d80)=[{{&(0x7f0000000600)=@l2, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000680)=""/84, 0x54}, {&(0x7f0000000800)=""/203, 0xcb}, {&(0x7f00000009c0)=""/7, 0x7}, {&(0x7f0000000a00)=""/177, 0xb1}, {&(0x7f0000000ac0)=""/149, 0x95}, {&(0x7f0000002f00)=""/224, 0xe0}, {&(0x7f0000000c80)=""/240, 0xf0}, {&(0x7f0000000d80)=""/230, 0xe6}, {&(0x7f0000000e80)=""/243, 0xf3}], 0x9}, 0x9}, {{&(0x7f0000001040)=@hci, 0x80, &(0x7f0000001200)=[{&(0x7f00000010c0)=""/15, 0xf}, {&(0x7f0000001100)=""/61, 0x3d}, {&(0x7f0000001140)=""/111, 0x6f}, {&(0x7f00000011c0)=""/41, 0x26d}], 0x4, &(0x7f0000001240)=""/118, 0x76}, 0x4}, {{&(0x7f00000012c0)=@ipx, 0x80, &(0x7f0000001600)=[{&(0x7f0000001340)=""/1, 0x1}, {&(0x7f0000001380)=""/9, 0x9}, {&(0x7f00000013c0)=""/207, 0xcf}, {&(0x7f00000014c0)=""/227, 0xe3}, {&(0x7f00000015c0)=""/2, 0x2}], 0x5, &(0x7f0000001680)=""/108, 0x6c}, 0x80000000}, {{&(0x7f0000001700)=@hci, 0x80, &(0x7f0000001840)=[{&(0x7f0000001780)}, {&(0x7f00000017c0)=""/115, 0x73}], 0x2, &(0x7f0000001880)=""/64, 0x40}, 0x180000}, {{&(0x7f00000018c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001a80)}, 0x1}, {{&(0x7f0000003000)=@pppol2tpin6, 0x80, &(0x7f0000002c40)=[{&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/212, 0xd4}], 0x2, &(0x7f0000002c80)=""/244, 0xf4}, 0x2000000}], 0x6, 0x40010062, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) r12 = add_key(&(0x7f0000000b80)='syzkaller\x00', &(0x7f0000000bc0)={'syz', 0x2}, &(0x7f0000000c00)="209732e23e6ff396cfd7a677d06f36691c2c0fc356a77e4b9ec39e3cf37fb91cb0180a048697b9af600fa1b4849998bfc93a750e80e2b2ae00fc1f69d18dafb9a16d861731cf0fd47c6f4d5fd40124c4d4fb4452", 0x54, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) 22:34:17 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 912.088833] devpts: called with bogus options 22:34:17 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, 0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 912.203770] devpts: called with bogus options 22:34:18 executing program 1: gettid() r0 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0xe2) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000080)=0xfffffffffffffffa) socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140), &(0x7f00000000c0), &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 912.240122] net_ratelimit: 16 callbacks suppressed [ 912.240128] protocol 88fb is buggy, dev hsr_slave_0 [ 912.250464] protocol 88fb is buggy, dev hsr_slave_1 22:34:18 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x38f, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(0x0, 0x0, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 912.561371] audit: type=1400 audit(1570401258.400:1561): avc: denied { map } for pid=17186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.593151] devpts: called with bogus options [ 912.640153] protocol 88fb is buggy, dev hsr_slave_0 [ 912.645277] protocol 88fb is buggy, dev hsr_slave_1 [ 912.650115] protocol 88fb is buggy, dev hsr_slave_0 [ 912.655480] protocol 88fb is buggy, dev hsr_slave_1 [ 912.660685] protocol 88fb is buggy, dev hsr_slave_0 [ 912.665881] protocol 88fb is buggy, dev hsr_slave_1 [ 912.671050] protocol 88fb is buggy, dev hsr_slave_0 [ 912.676253] protocol 88fb is buggy, dev hsr_slave_1 22:34:18 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$USBDEVFS_SETCONFIGURATION(r3, 0x80045505, &(0x7f0000000000)=0x8) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000240)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 912.879654] devpts: called with bogus options 22:34:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(0x0, 0x0, 0x0, 0x0, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 912.978755] devpts: called with bogus options 22:34:19 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, 0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 913.657697] devpts: called with bogus options [ 913.979935] devpts: called with bogus options 22:34:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(0x0, 0x0, 0x0, 0x0, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:20 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 915.238482] devpts: called with bogus options 22:34:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:21 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xef761b1580cdd8a8, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) 22:34:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 915.930514] devpts: called with bogus options 22:34:21 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 916.362795] devpts: called with bogus options 22:34:22 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 916.529457] devpts: called with bogus options 22:34:22 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={0x0, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:22 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x20) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r9, 0xfffffffffffffffd) keyctl$describe(0x6, r9, 0x0, 0x0) r10 = request_key(&(0x7f0000000600)='dns_resolver\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='/\x96vboxnet1!\x00', r9) keyctl$dh_compute(0x17, &(0x7f0000000000)={r8, r10, r8}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f00000006c0)='cifs.idmap\x00', &(0x7f0000000240)={'H2\xa9', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) r12 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r12, 0xfffffffffffffffd) keyctl$describe(0x6, r12, 0x0, 0x0) r13 = request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000a40)={'syz', 0x3}, &(0x7f0000000a80)='vboxnet1\x00', r12) r14 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r15 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r14) r16 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r16, r15, r16}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400)={r13, r11, r15}, &(0x7f0000000440)=""/97, 0x61, &(0x7f0000000800)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f00000009c0)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d25c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161b8b38e5dd464897da66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x100000000000002) open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r17, &(0x7f0000000340), 0x41395527) r18 = accept$packet(r17, &(0x7f0000000540), &(0x7f0000000840)=0x14) ftruncate(r18, 0x28007a) 22:34:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 916.691541] devpts: called with bogus options 22:34:22 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)={'filter\x00', 0x44, "1da3ef04a8aae5b5d896d9b386cfc8bf0cbf71c9c87756dae5cb6800fee54c768d79f9d008082df77f753ec41c3aeb06c395c24e917d95e86e57d415d55920dbadd947e4"}, &(0x7f0000000500)=0x68) write(r2, &(0x7f0000000340), 0x41395527) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r2, 0x0, 0x6, &(0x7f0000000340)='^(#,]\x00'}, 0x30) sched_setattr(r4, &(0x7f0000000440)={0x30, 0x99112e6e21f50cd0, 0x0, 0xfffff408, 0x934a, 0x7, 0xfffffffffffffffd, 0x1}, 0x0) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000540)="462488199c5229e245a7a0e5d3f36e900c4630167098fd747bda7031c6773190c3405c39570252891ea2756f25b971d41dcc218fbf4f9e6d738e15cf460ad6a770fe42aef9517d68617b94e5a7bc08f56b5b78d5d535c162f32f8910ff353f19df", 0x41395a07) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r7, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xf8, r8, 0xac90e731336a4bfd, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x541}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x7fff}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x69}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2d}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x0) r9 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r10 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r9) r11 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r11, r10, r11}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000600)={r6, r5, r11}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'crct10dif\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:22 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={0x0, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 916.760981] devpts: called with bogus options 22:34:22 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='#\x00\x0f\xc6\xa9)\xa1\xf4\xb7\x9a', 0xfffffffffffffff1, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file0\x00', 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r3, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000540)}, 0x10) r5 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x129, &(0x7f0000000200)={0x0, 0x0}}, 0xfffffffffffffe13) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r6, 0x8, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r6, 0x1e, 0xc}, 0x97) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x10, 0x1, {0x29, 0x23, 0x8, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r7 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xc268, 0x130100) listen(r4, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:22 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x1000000, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) r11 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r12 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r11) r13 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r13, r12, r13}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400)={r12, 0x0, r10}, &(0x7f0000000440)=""/97, 0x328, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0xfc9c}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r14 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r14, 0x28007d) [ 916.879093] devpts: called with bogus options 22:34:22 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x802, 0x5) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 917.032266] devpts: called with bogus options 22:34:22 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={0x0, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 917.084641] audit: type=1400 audit(1570401262.920:1562): avc: denied { create } for pid=17305 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 917.185729] devpts: called with bogus options 22:34:23 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000140)='\x80\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, 0xfffffffffffffff8) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r8, r7, r8}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r9 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r8, 0x0, r9}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r10, 0x28007d) [ 917.312181] audit: type=1400 audit(1570401262.920:1563): avc: denied { write } for pid=17305 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 917.378077] devpts: called with bogus options 22:34:23 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 917.518128] devpts: called with bogus options [ 917.523490] net_ratelimit: 23 callbacks suppressed [ 917.523497] protocol 88fb is buggy, dev hsr_slave_0 [ 917.523549] protocol 88fb is buggy, dev hsr_slave_1 [ 917.627064] devpts: called with bogus options 22:34:23 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0xffffffffffffffe9}], 0x1, 0x8) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000180)={[{0x1, 0x1, 0x0, 0x9, 0x20, 0x1, 0xff, 0x3, 0x8, 0x5, 0x3f, 0x1, 0x9}, {0x10001, 0x3, 0x7, 0x9, 0x94, 0x20, 0xe0, 0x1, 0x5, 0x5, 0x6, 0x5, 0x3}, {0x200, 0x1a, 0x6, 0x40, 0x81, 0x3f, 0x5, 0x2, 0x9, 0x5, 0x3, 0x7, 0x9}], 0x2b}) ftruncate(0xffffffffffffffff, 0x0) [ 917.652908] audit: type=1400 audit(1570401262.920:1564): avc: denied { read } for pid=17305 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:34:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 917.913816] audit: type=1400 audit(1570401263.390:1565): avc: denied { map } for pid=17356 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.993169] devpts: called with bogus options 22:34:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b281580fe5f3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r6) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r7}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) [ 918.308569] devpts: called with bogus options 22:34:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:24 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x4, 0x1, {0x34, 0x23, 0x4, 0x19, 0x6, 0x2, 0x2, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @rand_addr="04000000000000fffffffffffffff200"}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:24 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) openat$ppp(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/ppp\x00', 0x8100, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000bc0)=0xffffffffffffffff, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x9, &(0x7f0000000a80)=[{&(0x7f0000000240)="ec71ad1071147585b1ccc96c4d0ebf6c6387fb41dec079d9aac4c2db4572bcdb5b349bbd554714c0fb744a68851b56c8a28ceda542f6e9f051b36ad1915159c92e7df3975f79483eb628f2d7bb9346f697c2fc8bd6c004940ccea7ef40154951d3868faf56b81fb838c4ba581e42e4b53bc2a66c55b52076df8f1c3c50e13a7390d0", 0x82, 0x3}, {&(0x7f0000000180)="af77db22b662abcc18c98d2fa8", 0xd, 0x44}, {&(0x7f0000000400)="7822218a76740a5d8a1139c59f9fb55c2198eb125bb1263281f508c509b8b22f16e9e29e20d746d769241324c5b1bfca6e151c6330863a354667e07433a10d2afe50f4ed579bf5758d5dcda4a312bb064e63c2a342754fc35c9067c9c23871673d50664124b82fb352d3891a19488157eb92fea79411ed46b5246c1bae7e3aabd670876751d9f48cfe5a81c9cc3023ec25e33d1cc958b2a657a663deca78b2f4fa68a14c0a422e5d9213608d8c728818f67a274f91003bbd528c5838dcd59418bc7b3b6fdd078a51d052aff8c5cf691d6fbb126e6a361513a4efcac66340ece4a46dcc7f987e217aaeb895edc84078242c6efdc818", 0xf5, 0x3}, {&(0x7f0000000800)="a6ea0a6a25fce9b35c58fe17123ffb8f21c3e58bb043dde81ef86f4503e978b8718084daa938feb8568710ff9f092f971abb586218a7433773c1e1a160289b74aa88b6080bd41c3fdd995fa5d0e78356e263034aedbe38c6befb426bdd32a1a037303866451d73693143156b1491bc81566567ea3a5b1b5f9ef410f38edb183d13dd9dd8ebc5d95b9f28f03018716ef8b5ef1b133eee4c9c5b3ad8d64c126596a5e8c422d34832b3899ea7b09504c929b724ca7f09bd007feddd2d8604769c2c902d2b0b04672838c1a676c06e1f56c486ea94007c43767d4e9e8063fc94158b3e388b4578a456cfc4b14bd60f183a", 0xef, 0x100}, {&(0x7f0000000300)="c28f6711cb6122667f1a994153a961952891b36bce6b8cd2aa3a310102e8f875891d5c9224e0e7ead0370d375f37d28c3ed718287dc7a3d1d7b3653a166cde6a0e0ba786de2e266be8fcf6ccf2e9d69c6cb7b15caf0f9f779760ea61d5249eaa6f863396c1f84c2b0d03587c6c0e48ae3bc8", 0x72, 0x1ff}, {&(0x7f0000000500)="59fe3130cf1a577596601c56c53a09947dd31df93b36e4cb7a17a100ddefd3a80cee07290ae1da5d3697f9e5a199c2191a6333dca33851b065331ab708a960ee138595ec7428d9620341fcce8b61298c07cf70ff25371d91805a8e91b6751184179d020fbc49aeec2ce4db3a0442c0956b7004aac856422a7fbd7d5ee1bb6124b129b6c120287758a27d72f7", 0x8c, 0x6}, {&(0x7f00000001c0)="7d66b5f0edfa252befafd907328fbb7bf8f395634f05f826a469a83f53ed7c3e58d67c136e2ce5", 0x27}, {&(0x7f0000000680)="a63cc354eabd18488e0712c3980aa7e2eb77e82f86553f741cefab6021223af0b1ef089acff4f7a9ff4662a1cb105ebed7fb026d9e45d6bc876deef28f09bf49f667a7ab0d5db6f6cf69c2c4c73691fce986562b5614a090b37181926bad2417546cfc18862ba2b315aa65a6dcb4e00a47", 0x71, 0x2b85}, {&(0x7f00000009c0)="0d07d89bf99a9f7abc8e98d5bbef39e1c63431f9ff1db73e447694fd7d25f0c814c762ebcf9d1948101f5c72cba59313ea70dd775eaee439de059d52d3eff35ed4d45abca106032f187692231403ca8083f8f95b694abfcf27eda7469baf28757c7c4f1ea76a43e277f170c15880dc051236f6e3b3ba9a0c24be244eeb2b543c3fcf30f3bba675fd776ac1fa5f17e5457fcd2149416aee0e2af9d5527b", 0x9d, 0x1}], 0x100020, &(0x7f0000000b80)='trusted,GPL/mime_typeem0\x00') request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:24 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 918.480116] protocol 88fb is buggy, dev hsr_slave_0 [ 918.485398] protocol 88fb is buggy, dev hsr_slave_1 [ 918.581881] devpts: called with bogus options 22:34:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x0, 0x10000, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, r10, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x100000000000002) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) [ 918.673609] devpts: called with bogus options 22:34:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 918.808540] devpts: called with bogus options [ 918.880107] protocol 88fb is buggy, dev hsr_slave_0 [ 918.885268] protocol 88fb is buggy, dev hsr_slave_1 [ 918.903879] protocol 88fb is buggy, dev hsr_slave_0 [ 918.909005] protocol 88fb is buggy, dev hsr_slave_1 [ 918.914169] protocol 88fb is buggy, dev hsr_slave_0 [ 918.919233] protocol 88fb is buggy, dev hsr_slave_1 [ 919.014803] audit: type=1400 audit(1570401264.850:1566): avc: denied { map } for pid=17426 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:25 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:25 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x80) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r0, &(0x7f0000000180)="6f41ff6ff5158fc476bfb669fdafc4314f9ba1d93a9999d1707bbad1ba800d81e6e2382a96745feb28d6d96d4e215123eeaeaf0fd7019185ab44f11d2ffc044ed61da3dd531903568c073de0299927aab0d4bed940e681fff82a8c8a90e0f63e1ad17d433f3705f0cf6865a0ee", &(0x7f0000000240)=""/126, 0x36d8f80b4c302971}, 0x20) 22:34:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 919.591672] devpts: called with bogus options [ 919.635445] audit: type=1400 audit(1570401265.470:1567): avc: denied { map } for pid=17455 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:25 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) 22:34:25 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000240)='GPL\x00', r2}, 0x30) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x113, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000240), 0x0, 0x4) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r9 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r10 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r9) r11 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r11, r10, r11}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r11, 0x0, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r8, r7, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) 22:34:25 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 919.928462] devpts: called with bogus options 22:34:25 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 919.982072] devpts: called with bogus options 22:34:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0xdaa, &(0x7f00000003c0)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0xd74, 0x3a, 0x0, @ipv4={[], [], @loopback}, @mcast2, {[], @udp={0x0, 0x0, 0xd74, 0x0, [], "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"}}}}}}, 0x0) [ 920.027352] devpts: called with bogus options 22:34:25 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000000c80)=[{{&(0x7f0000000600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000680)=""/58, 0x3a}, {&(0x7f00000006c0)=""/3, 0x2}, {&(0x7f0000000800)=""/66, 0x42}, {&(0x7f0000000cc0)=""/238, 0xee}, {&(0x7f0000000880)=""/75, 0x4b}, {&(0x7f0000000ac0)=""/254, 0xfe}, {&(0x7f0000000bc0)}], 0x7}, 0x8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f00000002c0), 0xfffffffffffffffe, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000009c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) 22:34:26 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000000)=0x1000) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00'}) [ 920.283974] devpts: called with bogus options [ 920.305049] devpts: called with bogus options [ 920.577596] audit: type=1400 audit(1570401266.410:1568): avc: denied { map } for pid=17511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:26 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r10 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r11 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r10) r12 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r12, r11, r12}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r11, r8, r9}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000600)="5446c5a4d7ac81963c0191c534e7be8c3d438ffa1beef0cf52fd7ee3f390fd5fd93567b080fb40449345c8403038f795e515db92cebb345503b5d0967b623995b237e7989aeb8b104fae", 0x4a}) r13 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'\xb9\x00', 0x2}, &(0x7f00000003c0)='/\x96vboxn\x00\x001!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r13}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r14 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r14, 0x28007d) 22:34:26 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x80, 0x530040) symlinkat(&(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xc4, &(0x7f0000001000)}, 0x0) r6 = socket$inet(0x10, 0x2, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r6, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) creat(0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2000000000fe, 0xffffffffffffffff, 0xc) [ 921.084606] devpts: called with bogus options 22:34:26 executing program 2: dup(0xffffffffffffffff) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) pipe(&(0x7f0000000180)) unlink(&(0x7f0000000040)='./file0\x00') 22:34:27 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:27 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x83) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000), 0x17e, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 921.288017] devpts: called with bogus options [ 921.512619] devpts: called with bogus options 22:34:27 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x2) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x2) 22:34:27 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r1, r2) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r6 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r7 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 921.603152] devpts: called with bogus options 22:34:27 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000001280)='./file0/bus\x00', 0xbc9dc8fbd81cb4b0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000280)="ff", 0x1}], 0x1) close(r0) 22:34:27 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_pts(r1, 0x200) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000240)="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", 0x10f, r2) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r4, r3, r4}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:27 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024", 0x2a}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 921.912721] devpts: called with bogus options 22:34:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000015c0)={0x44, 0x0, &(0x7f0000000540)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x26f, 0x0, &(0x7f00000005c0)="b5f3cd914b68a4263dbafbb0596e1b02b008a94cd3a5722abb1c24b7526273a921b316f9d827470611e695228f498af3f26d3ad8bcec633b9994f34266b3d353cb607e380f2a44cf9838fa5f8778318c687833c8ce6c5d1262e8c08bc8d75f88a04172aa98d9e1cdf91d20da7cb993d408286fd47f12f8cd591dd5ed4b542e7b9a54fa6cc54d6882e1959db411fc7d177e2d279d4eea6e6874173f172ca9aa253d0a949d533c0c3005e14031fad091b93a27c60acf11b72d31d8bb88ec96c8ec7390f2412f3ef31fc1d1870137b193c4b899501636643f8f47fe669ae67f57b742c9237b9f9cebe90172f5d6007458314159dd91d1bce3ba145d11ff5f8da670687d68a46bd128884bad19fec9ed414609fd0da96764ddfa2339ce01ba16a38a674f5cb5d02932968263c4cb6262253ff5b85b5e910ed972d911c4584203fa6bea4e396051262eb9696187c7b0134760e9e710c0e183d6a1672e2dc5a76eb8226d66856b1561fdb9160202f31508843e9a13f3038ad4f9109c01ef99af444dea1499081532dc18b89f4310a03c10d3ba3a318c0fc156f2fb1c253f764f695e99d1fed72c594c2722b869a73898d8126dc14eed9a80a83868198801be82f99bce54c88481ca81c83378e63a9bdf827bb75b1ad17d6f9c1945d4fe712a21b402b94d99a4af2bfaf1f008c1f50de67021b49e3e6b63055ea686daeff31741c4046ace5c972000c3ec25009d82be3e9cc077e17186985f594fe55db1bf3502b088343fcea3a755e0d0c8483aace2663715cdbe35947697bb294b45e4830b7f64181aa16f9a289b584faab613a5d6187e4e00bc61c39fe24e50d990ed1dc2eddc68fd54b7795b2986a9145c62df8633c371"}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0}) socket$inet6(0xa, 0xb, 0x2) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 922.091172] devpts: called with bogus options 22:34:28 executing program 3: creat(&(0x7f0000000240)='./file0\x00', 0x4c35f615eace4fc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 922.419891] devpts: called with bogus options 22:34:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000015c0)={0x44, 0x0, &(0x7f0000000540)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x26f, 0x0, &(0x7f00000005c0)="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"}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0}) socket$inet6(0xa, 0xb, 0x2) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 922.514307] devpts: called with bogus options [ 922.640141] net_ratelimit: 15 callbacks suppressed [ 922.640147] protocol 88fb is buggy, dev hsr_slave_0 [ 922.650417] protocol 88fb is buggy, dev hsr_slave_1 22:34:28 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000015c0)={0x44, 0x0, &(0x7f0000000540)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x26f, 0x0, &(0x7f00000005c0)="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"}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0}) socket$inet6(0xa, 0xb, 0x2) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 923.040123] protocol 88fb is buggy, dev hsr_slave_0 [ 923.045508] protocol 88fb is buggy, dev hsr_slave_1 [ 923.050101] protocol 88fb is buggy, dev hsr_slave_0 [ 923.055604] protocol 88fb is buggy, dev hsr_slave_1 [ 923.060760] protocol 88fb is buggy, dev hsr_slave_0 [ 923.065846] protocol 88fb is buggy, dev hsr_slave_1 [ 923.071245] protocol 88fb is buggy, dev hsr_slave_0 [ 923.076418] protocol 88fb is buggy, dev hsr_slave_1 22:34:29 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024", 0x2a}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 923.276285] devpts: called with bogus options 22:34:29 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r3}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000000002) 22:34:29 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$bt_l2cap(r3, &(0x7f0000000340)={0x1f, 0xfff, {0x3, 0x0, 0x40, 0xbe, 0x80}, 0x9, 0x1}, 0xe) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r4, 0xfffffffffffffffd) keyctl$describe(0x6, r4, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000100)='\a', 0xfffffee3, r4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000300)) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_DEV_CREATE(r6, 0x5501) keyctl$dh_compute(0x17, &(0x7f0000000600)={r5, r2, r5}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x48000) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000), 0x0, 0x13) bind$netlink(r7, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbfb, 0x80000}, 0xc) ftruncate(0xffffffffffffffff, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x7, 0x5, 0x2, 0x0, 0x1ff, 0x1, 0x3, 0x5, 0x0}, &(0x7f0000000240)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r8}, 0x8) 22:34:29 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r5, &(0x7f0000000240)={0x30, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x80008000}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007b) 22:34:29 executing program 4: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xfcfe9e395382c91b}, 0xc) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000400)=[@in={0x2, 0x4e22, @multicast2}], 0xfffffffffffffec2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file2\x00', 0x7918, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000540)="88f4f8b381bb3d986a153c41517ec788402499604ad1dfddae2bc5c3ff48884203fc1fadd9b51b8166c09f403c8b150859eaa6d290468e7d76c9fd63a1ca56a35be1e12b216fa07896b771f8d418e1edf63256", 0xfffffffffffffe2d, 0x6ed}, {&(0x7f0000000200)="82fb103bb4e8c3020f6b5371fd613a0fe0e08465467887a924cb1658118c9efe80d93a18c7e7813a52f6c7dba9a7ef5fce269137d806a70b5b63a5f600e0b664", 0x40}], 0x82000, 0x0) 22:34:29 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r10, 0x28007d) [ 923.849075] devpts: called with bogus options 22:34:29 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000600)="3b1d27e26275d9f6414059414e31f153d29058241217d4a279d751e971d72cdc4d296c", 0x23, r7) r11 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r12 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r11) r13 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r13, r12, r13}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r14 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f0000000800)="876925cc35f3dbee041d8c37a63e15c28a269aaa63eae6282b362d306446ad0c29b349a99ebecc31d84611f098897420dfc308c60ecbcd901cb859ee45b7783a834ef2cc98a3d627dfc7f629e8458aeb18f5d1169d0d5812c88de6fee539ed688fc3853d8518c70d0c658da1c2b40a409129746f19a4058e93ae9d1e0d4188054e89d8f62b275b444e41ff811394dc190f378c92e956c4b3feda543f882c1784cb7e279bf8c70b1e19e046e1fda3763508c1067c59b59535eb4919617997d3ed8d66", 0xc2, r7) keyctl$dh_compute(0x17, &(0x7f0000000400)={r13, r14, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x7caa79655ed64e43}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r15 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r15, 0x28007d) 22:34:29 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) [ 924.107477] devpts: called with bogus options [ 924.470240] devpts: called with bogus options [ 924.499147] devpts: called with bogus options 22:34:30 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x256, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff947}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) r5 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x8000000000000003) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:30 executing program 1: r0 = gettid() sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x3, 0x1, 0x0, 0x7, 0x7f, 0xb4, 0x4000000000000}, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) fcntl$setown(r1, 0x8, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000180)={0x5, [0x1, 0x6, 0x0, 0x8f61, 0xa7d5]}, &(0x7f00000001c0)=0xe) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r2) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) prlimit64(r0, 0xb, &(0x7f0000000000)={0x10000, 0x4}, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000600)={r5, r4, r5}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x3, 0x8000) 22:34:30 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024", 0x2a}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:31 executing program 4: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x8, @loopback, 0x2}], 0x1c) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file1\x00', 0xc1b, 0x57a, &(0x7f0000000380), 0x8, 0x0) 22:34:31 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda8", 0x3f}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 925.242622] devpts: called with bogus options [ 925.261359] devpts: called with bogus options 22:34:31 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x103800) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x294100, 0x389) gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r2) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r4, r3, r4}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{0x4}}}}]}, 0x74}}, 0x0) connect$packet(r1, &(0x7f00000002c0)={0x11, 0x1b, r10, 0x1, 0x4}, 0x14) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r6, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6009000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x148, r11, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb32}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x56c}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffe00}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4a5}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x1f}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @remote, 0xffffff80}}}}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 22:34:31 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x1, 0x0, 0x3, 0x0, 0x9}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r10 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r9) r11 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r11, r10, r11}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000240)={r8, r11, r8}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000800)="a4da9f0b0afc89ef8ed4b064c1c641ed66da0ce074e7a3f40ebdc3078b243bab32163ef6dbc392e80766db01dc911313ef02583476edf3ac403cc7e5077d92269fadb2d962b9ee3c70a867", 0x4b}) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r8, 0x0, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'sha256-avx2\x00'}, &(0x7f0000000600)="eff01d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120700e278eccb24ba8e4b73b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c315228ba97b2610bbad070000bb356d032e803ebf092ea1158b084ceac51084aa43324093c2f6949fb106fe6aa2b490445511390de6590d039c236750838b20c871bcb7e63396098e8c2ea567629600000000", 0x99}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 925.651948] devpts: called with bogus options [ 925.698327] devpts: called with bogus options 22:34:31 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x1a5, 0x5, 0x1, 0x0, 0xf1, 0x0, 0xfffffffffffffffc}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r7, 0xfffffffffffffffd) keyctl$describe(0x6, r7, 0x0, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'t\xa0Z', 0x2}, 0x0, 0x0, r7) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) 22:34:31 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:31 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x0, 0x50a}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x1, 0x23, 0x2, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r5 = socket$inet6(0xa, 0x6, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x800003) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:31 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000080)='./file0\x00') keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 925.941730] devpts: called with bogus options [ 925.970494] audit: type=1400 audit(1570401271.800:1569): avc: denied { create } for pid=17769 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 926.026098] devpts: called with bogus options 22:34:31 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 926.092943] audit: type=1400 audit(1570401271.800:1570): avc: denied { write } for pid=17769 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 926.143098] audit: type=1400 audit(1570401271.810:1571): avc: denied { read } for pid=17769 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 926.389776] devpts: called with bogus options 22:34:32 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda8", 0x3f}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 926.692338] devpts: called with bogus options 22:34:32 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0xffffff41, 0x5, 0x0, 0x0, 0x5, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'s\x18\x01'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:32 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000400)=[{&(0x7f0000000640)="7ab8b74ce35feb38a51e383dc532cc9609efe3b88d1dfc08f13b9948889c2dd2d931205d699c0dbd0d285515ebf11b513bc5911cdc946f245309639cb7574d0cc040c0a19d839a0e904eaed71190a6ff84c6bf2bbe", 0x55}, {&(0x7f0000000100)="2666efe813018e5228e741d0d38e376a538ff72ad1fbe46ef7e8b8b3b213c133624e7ea6b4b7586a4bd83009369ed768c35561", 0x33}, {&(0x7f0000000800)="ecfc19d97a857f0c9ebcd02fa31b69c116dcaf698a7f07ad67e6d8b613e3c0a634e8513ca6426c69b879d0cfe6dd4a74d619c06c87dae8f02ca273baa08c46b923eb8ba7", 0x44}, {&(0x7f00000009c0)="36515f68800b0d70fb5702cf4fa694c41ba3cca8cd1478695de6d21c664f70f8a54c765c49909828f1b698abe447fc1f88d6cf1644e516cbe14f2efb5597edfd0413e9da2ed20499ed3ddbbc91e41dfeced4223e46eb3cee5db723abc9c109eae4cc5155196de6532142d34637f342984e641833246ae94a60d37a0c0c8e72f4b98a56914704f8c80a23421342117bb7033b6a989207fb68a6f2692c800ddb722adcb0bdc214e4ca4b80987ca704b2f36df610", 0xb3}], 0x4, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="00d0566de72531beb7b12a74833a98", 0xf, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f00000006c0)='ci?\xe3f\x00\x00ifmap\x00', &(0x7f0000000880)={'syz', 0x2}, &(0x7f00000008c0)='vmnet0vmnet0\x00', r8) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000600)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 926.968732] devpts: called with bogus options [ 927.028792] devpts: called with bogus options 22:34:32 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000400)=[{&(0x7f0000000640)="7ab8b74ce35feb38a51e383dc532cc9609efe3b88d1dfc08f13b9948889c2dd2d931205d699c0dbd0d285515ebf11b513bc5911cdc946f245309639cb7574d0cc040c0a19d839a0e904eaed71190a6ff84c6bf2bbe", 0x55}, {&(0x7f0000000100)="2666efe813018e5228e741d0d38e376a538ff72ad1fbe46ef7e8b8b3b213c133624e7ea6b4b7586a4bd83009369ed768c35561", 0x33}, {&(0x7f0000000800)="ecfc19d97a857f0c9ebcd02fa31b69c116dcaf698a7f07ad67e6d8b613e3c0a634e8513ca6426c69b879d0cfe6dd4a74d619c06c87dae8f02ca273baa08c46b923eb8ba7", 0x44}, {&(0x7f00000009c0)="36515f68800b0d70fb5702cf4fa694c41ba3cca8cd1478695de6d21c664f70f8a54c765c49909828f1b698abe447fc1f88d6cf1644e516cbe14f2efb5597edfd0413e9da2ed20499ed3ddbbc91e41dfeced4223e46eb3cee5db723abc9c109eae4cc5155196de6532142d34637f342984e641833246ae94a60d37a0c0c8e72f4b98a56914704f8c80a23421342117bb7033b6a989207fb68a6f2692c800ddb722adcb0bdc214e4ca4b80987ca704b2f36df610", 0xb3}], 0x4, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="00d0566de72531beb7b12a74833a98", 0xf, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f00000006c0)='ci?\xe3f\x00\x00ifmap\x00', &(0x7f0000000880)={'syz', 0x2}, &(0x7f00000008c0)='vmnet0vmnet0\x00', r8) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000600)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 927.049584] devpts: called with bogus options 22:34:33 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) getpgid(0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0xffffffd0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0x8a, "296bc09c3e6d02aa3fd53ce504393a4f771ab8ec02b1018b57b2c9b8891cb856f70ff4ec4e1cb7f4b54e371aa388a3d4237919cdb1b63461059f8373563bc7d4159d74e89f5294a432604483890f4a9390ad67d81470c7c2071c2a8278218874c703fede30ff745b806e8d7b0b4594cb264f7e52f337591907ba78d7663b8531b4bc7f32978feaa10a97"}, &(0x7f0000000000)=0x92) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000080)={r5, 0x4678}, 0x8) ftruncate(0xffffffffffffffff, 0x0) [ 927.199416] devpts: called with bogus options 22:34:33 executing program 4: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000080)='./file0\x00') keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:33 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:33 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda8", 0x3f}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 927.829067] audit: type=1400 audit(1570401273.660:1572): avc: denied { map } for pid=17888 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.879737] devpts: called with bogus options [ 927.920105] net_ratelimit: 24 callbacks suppressed [ 927.920110] protocol 88fb is buggy, dev hsr_slave_0 [ 927.930208] protocol 88fb is buggy, dev hsr_slave_1 22:34:33 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x7, &(0x7f0000000280)={0x0, 0x2}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x80000, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='/\x96v\x88b\xc3R\x92( \x84\a', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f00000002c0)={'sha256-avx\x00'}, &(0x7f0000000600)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf0e824ec8daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x57}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:33 executing program 2: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r3, 0xfffffffffffffffd) keyctl$describe(0x6, r3, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r3) ftruncate(0xffffffffffffffff, 0x0) [ 928.042020] devpts: called with bogus options 22:34:34 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:34 executing program 1: gettid() pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x2, 0x6842ce0556ae6d85}}, 0x20) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'\x00', 0x3}, &(0x7f0000000400)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r2) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r4, r3, r4}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) personality(0x800000) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) r6 = accept4$unix(r5, &(0x7f0000000180), &(0x7f0000000000)=0x6e, 0x80000) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000080)=@generic={0x3, 0x9, 0x5}) ftruncate(0xffffffffffffffff, 0x0) 22:34:34 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 928.462360] devpts: called with bogus options 22:34:34 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:34 executing program 4: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r3, 0xfffffffffffffffd) keyctl$describe(0x6, r3, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r3) ftruncate(0xffffffffffffffff, 0x0) [ 928.540733] devpts: called with bogus options [ 928.632691] devpts: called with bogus options 22:34:34 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:34 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="6487e5f37a4d1e820223af9539d484992a89ebdc3271d58f3a4297db662fe777926f79fb1b17f3e3feb020b85351be55c26f99d870467cdab8c2d6d14f11e01b0f4769628758403da91812a109e6b642025c35ec432e7a8c4c56c9a942d938029cdc0d1926e93a9f8238d7d230ddef75d4a143a751a3aac513405e537f7fddbfc80c2bde744d20c093efbf279503ca83062c81a5e3fa838769b8d14314ee92743977", 0xa2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000800)='\xff\x039ring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r7) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000280)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'cbcmac(des)\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) 22:34:34 executing program 4: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 928.880106] protocol 88fb is buggy, dev hsr_slave_0 [ 928.885255] protocol 88fb is buggy, dev hsr_slave_1 [ 928.924627] devpts: called with bogus options 22:34:34 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 928.957241] devpts: called with bogus options 22:34:34 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000640)='cifs.idmap\x00', r2}, 0x30) tkill(r0, 0x1403a) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r6) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r7}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000000000002) [ 929.063866] devpts: called with bogus options [ 929.188852] devpts: called with bogus options [ 929.224099] devpts: called with bogus options [ 929.280115] protocol 88fb is buggy, dev hsr_slave_0 [ 929.280127] protocol 88fb is buggy, dev hsr_slave_0 [ 929.285231] protocol 88fb is buggy, dev hsr_slave_1 [ 929.290292] protocol 88fb is buggy, dev hsr_slave_1 [ 929.300447] protocol 88fb is buggy, dev hsr_slave_0 [ 929.305539] protocol 88fb is buggy, dev hsr_slave_1 22:34:35 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x86800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) 22:34:35 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x7f, 0x1000, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r4, 0xf) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r6 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r7 = socket$inet6(0xa, 0x3, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:35 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000400)=0x3, 0x4) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800, 0xa) r5 = socket(0x10, 0x80002, 0x8000000010) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, r6, 0xa01, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r6, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xcd}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x35e}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:35 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db5", 0x4a}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 929.839225] devpts: called with bogus options [ 929.854600] devpts: called with bogus options [ 929.941739] audit: type=1400 audit(1570401275.780:1573): avc: denied { create } for pid=18022 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:34:35 executing program 2 (fault-call:10 fault-nth:0): clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:35 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 930.019076] audit: type=1400 audit(1570401275.780:1574): avc: denied { write } for pid=18022 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 930.129259] audit: type=1400 audit(1570401275.780:1575): avc: denied { read } for pid=18022 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 930.262336] audit: type=1400 audit(1570401276.050:1576): avc: denied { map } for pid=18047 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:34:36 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f9802", 0x4f}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:36 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f9802", 0x4f}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 930.541855] devpts: called with bogus options [ 930.599415] devpts: called with bogus options 22:34:36 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f9802", 0x4f}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:36 executing program 4: request_key(0x0, &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000740)='threaded\x00', 0xfffffffffffffffd) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @broadcast}, {0x2, 0x4e1e, @remote}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0xe283, 0x0, 0x0, 0x7, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='map_files\x00\xf9\xc9\f\xf8\xddw\xd9\xda\x87\xc6\xa7\xce\x9b\x90\xd9\xb6\xe1=\x19u\xac\xc0Y\xb6\xba\x12\xb7g0ZN\xc09\x13\xac)@\xb7K\x8d\xfb\xf9\xb5\r\xd6b\x0e\x85\x92;\xca\xbc\xc5\xb4\xdd\x82_\xaa\x9a\x12^') mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000200)={0x0, 0xb94, &(0x7f0000000400)="df7aa1f200ee4eff30782b30074da4b88754d4e1a5751718c41e8764cc36504e77f55a6f65636ef8537197691ec4effc557b875f672a761166b7b10741a8953dd9c9a8de03be39cd35ebab519e39a75ea233580de75b559b30e4124db870aea6e7c1e31d6e609dbbec529f0b196a88a2a3caa6d5933b7104a7b978c1c429fdc3a3ee3a120e2d80a315de7348126750a5127aa0af06f846dec1475af8b3ddd902a583c118a96103b0cd68a7de5135ab52530486e679f0ee767aa889447d7cc146", &(0x7f0000000340)="7d9dff9789312d9ae167696aaf42e3c72b6674ec50efe111c241f87a94a045787004c002d9767897d33c9c0514302ea5521ece4206330c34024cf6f6815f628d90e02f00686760323f923f47cb0400f306415a2b6a95d3a54b51e2f722402f7d3040ef8d35fe56d68fa78e4f7aaca5", 0xc0, 0x6f}) ptrace(0xffffffffffffffff, 0x0) capset(&(0x7f00000006c0), 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000003c0), &(0x7f00000005c0)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='map_files\x00\xf9\xc9\f\xf8\xddw\xd9\xda\x87\xc6\xa7\xce\x9b\x90\xd9\xb6\xe1=\x19u\xac\xc0Y\xb6\xba\x12\xb7g0ZN\xc09\x13\xac)@\xb7K\x8d\xfb\xf9\xb5\r\xd6b\x0e\x85\x92;\xca\xbc\xc5\xb4\xdd\x82_\xaa\x9a\x12^') mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000080)=0xffffff80) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) ioctl$KDADDIO(r3, 0x4b34, 0x800) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002e80)={{{@in=@initdev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0x2da) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f00000004c0)=""/67) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sync() syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000140)={0x7ce60266, 0x9}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x40120, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x40284504, &(0x7f0000000580)={0xd7, 0xe, 0x3, 0x9, "bf4c2195323d176b236e1e6f4d1634900d4ba89e1db1d11196522f691069b613"}) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000600)={0x10000, 0xa, 0x4, 0x40000, {r6, r7/1000+30000}, {0x3, 0x2, 0x81, 0x7f, 0x8, 0x1f, "faae543c"}, 0x6, 0x3, @userptr=0x8, 0x4}) r8 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r8, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r9, 0x47ce80901e941bc1, 0x70bd2c, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x1) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)={0x1c, r9, 0x800, 0x70bd28, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x10) r10 = syz_open_dev$admmidi(&(0x7f0000000780)='/dev/admmidi#\x00', 0x2, 0x400000) setsockopt$IP_VS_SO_SET_TIMEOUT(r10, 0x0, 0x48a, &(0x7f0000000000)={0x8000, 0x0, 0x8}, 0xc) [ 930.670414] devpts: called with bogus options [ 930.680667] audit: type=1400 audit(1570401276.510:1577): avc: denied { create } for pid=18022 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:34:36 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000240)={0x8, 0x0, [{0x28f}, {0x3bf, 0x0, 0xfff}, {0xc62}, {0x3b2, 0x0, 0xfffffffffffffe01}, {0xaa1, 0x0, 0x52d}, {0x65b, 0x0, 0x7}, {0x1f5, 0x0, 0x80000001}, {0xe9918982cd64131, 0x0, 0x4}]}) ftruncate(0xffffffffffffffff, 0x0) [ 930.777085] audit: type=1400 audit(1570401276.520:1578): avc: denied { write } for pid=18022 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 930.853712] devpts: called with bogus options 22:34:36 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0xfffffffffffffefe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x238, 0x153e58cf}, 0x10006, 0x100000, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xeffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(r1, &(0x7f0000000040)='./file1\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r2) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000700)="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", 0x64) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x4e25, 0x0, @dev={0xfe, 0x80, [], 0x20}}, 0x1c) r7 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:36 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) getpid() ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) syz_init_net_socket$x25(0x9, 0x5, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000080)={0x1, 0x1, [@random="b08bdccd4723"]}) bind$pptp(r3, &(0x7f0000000000)={0x18, 0x2, {0x1, @remote}}, 0x1e) 22:34:37 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat(r1, &(0x7f0000000380)='./file0\x00', 0x40500, 0x1f4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r2) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) io_submit(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, 0x0, 0x400000, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setreuid(0x0, 0xee00) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0xbdacf1617e16049a) r4 = geteuid() setreuid(r4, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='sT\x01', 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r5, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) [ 931.394999] FAULT_INJECTION: forcing a failure. [ 931.394999] name fail_futex, interval 1, probability 0, space 0, times 1 [ 931.407444] devpts: called with bogus options 22:34:37 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) sendto$x25(r0, &(0x7f00000009c0)="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", 0x1000, 0x4004800, &(0x7f0000000240)={0x9, @remote={[], 0x3}}, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 931.484425] CPU: 0 PID: 18077 Comm: syz-executor.2 Not tainted 4.14.147 #0 [ 931.491486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.500837] Call Trace: [ 931.503430] dump_stack+0x138/0x197 [ 931.507060] should_fail.cold+0x10f/0x159 [ 931.511204] get_futex_key+0xa4e/0x1040 [ 931.515191] ? futex_lock_pi_atomic+0x210/0x210 [ 931.519947] ? lock_downgrade+0x740/0x740 [ 931.524092] futex_wake+0xd9/0x430 [ 931.527629] ? is_bpf_text_address+0xa6/0x120 [ 931.532125] ? __unwind_start+0x1f6/0x3d0 [ 931.536268] ? get_futex_key+0x1040/0x1040 [ 931.540507] do_futex+0x290/0x19e0 [ 931.544043] ? __lock_acquire+0x5f7/0x4620 [ 931.548278] ? __lock_acquire+0x5f7/0x4620 [ 931.552512] ? exit_robust_list+0x230/0x230 [ 931.556829] ? trace_hardirqs_on+0x10/0x10 [ 931.561065] ? trace_hardirqs_on+0x10/0x10 [ 931.565296] ? __might_fault+0x110/0x1d0 [ 931.569358] ? save_trace+0x290/0x290 [ 931.573156] ? __might_fault+0x110/0x1d0 [ 931.577214] ? __might_fault+0x110/0x1d0 [ 931.581270] ? find_held_lock+0x35/0x130 [ 931.585330] SyS_futex+0x215/0x302 [ 931.588873] ? do_futex+0x19e0/0x19e0 [ 931.592687] mm_release+0x30e/0x450 [ 931.596313] do_exit+0x3ad/0x2c10 [ 931.599765] ? find_held_lock+0x35/0x130 [ 931.603821] ? mm_update_next_owner+0x5d0/0x5d0 [ 931.608494] do_group_exit+0x111/0x330 [ 931.612392] get_signal+0x381/0x1cd0 [ 931.616109] ? task_work_add+0x8e/0xf0 [ 931.619998] do_signal+0x86/0x19a0 [ 931.623541] ? SyS_recvmsg+0x50/0x50 [ 931.627248] ? lock_downgrade+0x740/0x740 [ 931.631389] ? setup_sigcontext+0x7d0/0x7d0 [ 931.635709] ? __mutex_unlock_slowpath+0x71/0x800 [ 931.640547] ? check_preemption_disabled+0x3c/0x250 [ 931.645570] ? exit_to_usermode_loop+0x3d/0x220 [ 931.650238] exit_to_usermode_loop+0x15c/0x220 [ 931.654824] do_syscall_64+0x4bc/0x640 [ 931.658702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 931.663546] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 931.668729] RIP: 0033:0x459a59 [ 931.671911] RSP: 002b:00007f9ebd9a3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 931.679615] RAX: fffffffffffffe00 RBX: 00007f9ebd9a3c90 RCX: 0000000000459a59 [ 931.686887] RDX: 0400000000000249 RSI: 0000000020008880 RDI: 0000000000000004 [ 931.694153] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 931.701422] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ebd9a46d4 [ 931.708689] R13: 00000000004c71f9 R14: 00000000004dcb88 R15: 0000000000000005 22:34:37 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438", 0x52}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:37 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x800, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:37 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000380)=0xeee) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000003040)='ip6tnl0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) setxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(0xffffffffffffffff, r2, 0x0, 0x1) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000500), 0x2) sendmmsg(r1, &(0x7f00000038c0), 0x4000000000000a8, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000300)={'batadv0\x00', {0x2, 0x4e24, @local}}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6bf, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x2, 0x0, 0x10001, 0x9}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)={0x744c, r4}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000280)=0x3, 0xc6) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000003040)='ip6tnl0\x00', 0x10) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r5, &(0x7f00000038c0), 0x4000000000000a8, 0x0) sched_getattr(0x0, &(0x7f0000000180)={0x30}, 0x30, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="0f59e4777e383a701a2e0e38604bb7e477cf0bd8ce448d429736f9560e6c42cecb5e6123f14decdfe02ac22e35dcdb58a7bbb5c147d778d8f04ac46144d4afba8d852ab2389fcffb098306f690aef0614b99864af79cd47a4e24e06014f05a62f847b5a727e60ea0baa9c864dfcbc3b896360aaf544fc716d8e2026551973abc70714063a09ff8f6e2067da400cc543ca27a1e176865e8dd2131eaa8871624d7af", 0xa1) [ 931.977605] devpts: called with bogus options 22:34:37 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x4000, 0x7729216d9bfb7dcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r2) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) r6 = accept(r1, &(0x7f0000000540)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x80) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_SIOCINQ(r7, 0x89e9, &(0x7f0000000040)) bind$inet6(r6, &(0x7f0000000400)={0xa, 0x4e23, 0x3, @rand_addr, 0xfffffffe}, 0x1c) syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) [ 931.998989] devpts: called with bogus options 22:34:37 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000400)) ftruncate(0xffffffffffffffff, 0x0) 22:34:38 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x107fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGKEYCODE_V2(r4, 0x80284504, &(0x7f0000000140)=""/177) [ 932.287582] syz-executor.0 uses old SIOCAX25GETINFO [ 932.506606] kauditd_printk_skb: 1 callbacks suppressed [ 932.506614] audit: type=1804 audit(1570401278.340:1580): pid=18190 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir225388386/syzkaller.9SeRmn/1153/bus" dev="sda1" ino=20884 res=1 22:34:38 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x1a1000, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 932.599907] audit: type=1804 audit(1570401278.340:1581): pid=18190 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir225388386/syzkaller.9SeRmn/1153/bus" dev="sda1" ino=20884 res=1 22:34:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socket$nl_route(0x10, 0x3, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) dup(0xffffffffffffffff) r0 = socket(0x40000000015, 0x80005, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000900)="ba", 0x1, 0x0, 0x0, 0x0) close(r0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast1, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xef) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x6, 0x0, 0x10000, 0x4cf}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x0, 0x400}) r2 = memfd_create(0x0, 0x4) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x4e20, 0x0, 'lc\x00', 0x4, 0xfffffffffffffffb}, 0x2c) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000030, 0x0) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000000040)={0x0, 0x4, 0x1000}) socket$inet6(0xa, 0x6c7804ee0d12cd9c, 0xffffffffffffffcb) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000000000000f600000898bf5ebec2c177df00000007000000402c11000000ffed09f8ff0600"/56], 0x38) socket$netlink(0x10, 0x3, 0x0) 22:34:38 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438", 0x52}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 932.786328] devpts: called with bogus options [ 932.790782] SELinux: policydb string does not match my string SE Linux [ 932.816556] SELinux: failed to load policy [ 932.826509] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20000 [ 932.869055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=18210 comm=syz-executor.2 22:34:38 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x20000003}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{0x4}}}}]}, 0x74}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'gretap0\x00', r3}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000280)=""/41, 0x29) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 933.023987] devpts: called with bogus options [ 933.040820] net_ratelimit: 16 callbacks suppressed [ 933.040860] protocol 88fb is buggy, dev hsr_slave_0 [ 933.051466] protocol 88fb is buggy, dev hsr_slave_1 22:34:39 executing program 4: r0 = perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x4000, 0x7729216d9bfb7dcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r2) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) r6 = accept(r1, &(0x7f0000000540)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x80) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_SIOCINQ(r7, 0x89e9, &(0x7f0000000040)) bind$inet6(r6, &(0x7f0000000400)={0xa, 0x4e23, 0x3, @rand_addr, 0xfffffffe}, 0x1c) syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) [ 933.317711] devpts: called with bogus options [ 933.440142] protocol 88fb is buggy, dev hsr_slave_0 [ 933.440552] protocol 88fb is buggy, dev hsr_slave_0 [ 933.445288] protocol 88fb is buggy, dev hsr_slave_1 [ 933.450582] protocol 88fb is buggy, dev hsr_slave_1 [ 933.455382] protocol 88fb is buggy, dev hsr_slave_0 [ 933.465406] protocol 88fb is buggy, dev hsr_slave_1 [ 933.470511] protocol 88fb is buggy, dev hsr_slave_0 [ 933.475570] protocol 88fb is buggy, dev hsr_slave_1 [ 933.497925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18232 comm=syz-executor.2 22:34:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010020004870000000000000bc7000003bc8000095000000000000001c5ddd7a8269b51ed952d2719610f54f9aed6935b25fa5299590dddedaf7c6bddc3c1e38d041e824d4ee25e662ea33ee5a95388cde5a68896789d6077ec6c1b6bbaa6d5da91fa4111d4d5ff62487fdbb0ada8a"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="cdf419f68ad74369"], &(0x7f0000000300)='.\x00', &(0x7f0000000340)='proc\x00', 0x40000c, &(0x7f0000000380)='/dev/snd/pcmC#D#c\x00') prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001180), 0x400000000000010, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x2, 0x10000) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000280)={0x9e0000, 0x8a, 0x0, [], &(0x7f0000000240)={0x990a30, 0x401, [], @p_u32=&(0x7f0000000200)=0x3}}) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x400, 0x7ff, 0x1, 0x1, 0x2}, 0x14) 22:34:39 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000500)='uedr\x00', &(0x7f0000000540)={'{91'}, &(0x7f0000000400)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d25228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca00001800800000acf40d32e4b58a8d270f561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff34c3c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x81, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:39 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438", 0x52}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:39 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) syz_emit_ethernet(0xffffffffffffffd9, &(0x7f0000001740)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa169100400081003b0088470000000000000007000000000040f900000064800180000078ac1414bbac1414aa830001ac1e00010005019078ffffffff402000080068020008828001ac1e0101ac1e010194000000008001005d6af50164c43ca8b7ca7131"], 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x5, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x23}}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) 22:34:39 executing program 1: gettid() r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)=0x1) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x482a41) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000001c0)) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r2) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r4, r3, r4}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000c5070000682c74ca7d21732a00000000bc70000000000000950000000000000018f23c727b46930f88ec4e226d2788839f2030801d2b824b2ace142e76bad75cc18bc1eb8685a21caeaedc3763e0886adb106123a179f602b9cd729f87501c3f2e435082cd53796b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000100)={0x7, 0x4, 0x7, 0xffffff00, 0x5}) [ 934.086153] devpts: called with bogus options [ 934.118897] devpts: called with bogus options 22:34:40 executing program 3: creat(&(0x7f0000000600)='./file0\x00', 0x80) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="ca16000000000000b7070000010000004870000000000000bc700000000000950000000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:40 executing program 4: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000500)='uedr\x00', &(0x7f0000000540)={'{91'}, &(0x7f0000000400)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d25228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca00001800800000acf40d32e4b58a8d270f561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff34c3c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x81, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 934.511127] devpts: called with bogus options 22:34:40 executing program 1: r0 = gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r2) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r4 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000180)='(keyring$+nodevsecurity*wlan0\x00', 0xfffffffffffffffe) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000300)={0x30, 0x5, 0x0, 0x0, 0xbd2, 0x0, 0x53, 0x10000}, 0x0) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r4, r3, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}, 0x0, 0x107}) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ptrace$setregs(0xd, r6, 0x80000001, &(0x7f00000002c0)="45f2914ec0de30e8bdf6be578f6d1263ebb35a3448842a9b710ca49300") r7 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x4, 0x4000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x40}, &(0x7f0000000440)=0x8) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:40 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4", 0x53}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:40 executing program 4: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000500)='uedr\x00', &(0x7f0000000540)={'{91'}, &(0x7f0000000400)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d25228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca00001800800000acf40d32e4b58a8d270f561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff34c3c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x81, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:41 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x10082}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) r2 = dup2(r0, r1) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0xfffffffffffffe2e) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r6 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r7 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000a87c32a9d3c64d8300010000004870000000000000bc700000000040"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = msgget(0x1, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f00000001c0)=""/181) msgget$private(0x0, 0x308) r2 = msgget(0x1, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000001c0)=""/181) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000240)=""/150) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f00000006c0)=[{&(0x7f0000000380)="e5f9c243b548affc717448ad0bb46b3b23b26a18905e6dc48cd99c78037812d57ef5bd3aa336d4489df249935a22bf8c8d73cbab527210b888c881640298ec6ca0a1f5fcd4980a9a0ed8d30a43848f97c1b26f76200432787c24c0a7"}, {&(0x7f0000000400)="5e406300771d5bf3596c578d7e93e00d60ccda2eff6d16a691928064277ab3fd00557be8f491788b9027af4a86ec87431a7e0c386ac3df304e8bbe8ff0715ab6d42e2525b14f9b2a2821e7ea656ac1af1e5a7cf4df6c1443fbc26be978dd18e58b72b9403102b3b5e2aa246c1c18a141cbb09dd659f7e9aae12644b11270437f3860bcfe2a61b0162c9749f8bddeae22d8ac56cc81f4a4e51ce5a8bcc34e54a79eb740d70aa63b7d9fd1616b221985d7439b09edf62c559f27ff36c9a0cbc1"}, {&(0x7f00000004c0)="fcd0ec23ece6e7498f1beef90fc2c99e06556e2cdda33a18b75cb3202df4d0b43b4452a4c3bfd4ce5f8cf57b2d908427e329ef2aa0ee2292bf31b166ecf0bb3180460e4e781e7556691ddc2aad9d39ca11f49307c5d6cec8466b41e30e84b411d0c8582ced3f8076b39e33cba4e68c44dd92e5db963757ff9a46a78a0868dd6ab305f77039dc6c4e3dfe5dfed277853752ea4cc03b34bbb6f81847434bc28636b44e17ddf82ea5c9e4d025fb7560e3d8e4cd028aa17c6e6fe3142c350e28a2d5050778845af1731ae355f2cd2c311950caf0ce9cd982e4c12deeec1de74f55672629e6ab5a9b2ce87e84ed0084d8ec"}, {&(0x7f00000005c0)="efccf84d1f2d436cfd80403e759ecf1adaee50e7aba6e722b3f4e883dd7abbceea5058c4c92f5cc54f84d420da4539bb0eb5941b31d19fd3ef245547734c8492f09662ba00c70552ead0488a767de926de37da9c6097db6d3d65d228146e9b98d76cbb3caa4ef3e121553c831c2e874b98c9db0e73c011dac564a29a1128dc7c1bcb3da6c849f817a1ccb711872d3ada677de6314630d3a58a2c1a9f298fda2926fca3b159900ee53070bd31b7e838c907a8b494a0134476ac2751ac8e6064b3bb2d838ac0262e0b4bd8f875b65fc0"}], 0x1000000000000092, 0x4) ioctl$RTC_PIE_ON(r3, 0x7005) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r4, 0x28, &(0x7f0000000040)}, 0x10) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd28, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 935.279983] devpts: called with bogus options 22:34:41 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$getenv(0x4201, r0, 0x2, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup2(0xffffffffffffffff, r4) 22:34:41 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) r3 = accept4$nfc_llcp(r0, &(0x7f0000000600), &(0x7f00000002c0)=0x60, 0xc0000) recvmmsg(r3, &(0x7f0000000240), 0x5e3, 0x40, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) 22:34:41 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4", 0x53}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 935.433754] devpts: called with bogus options 22:34:41 executing program 4: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000500)='uedr\x00', &(0x7f0000000540)={'{91'}, &(0x7f0000000400)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d25228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca00001800800000acf40d32e4b58a8d270f561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff34c3c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x81, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 935.736557] devpts: called with bogus options 22:34:41 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4", 0x53}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:41 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:41 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe16c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 935.835904] devpts: called with bogus options [ 935.951605] devpts: called with bogus options 22:34:41 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r3) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r5, r4, r5}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r6 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r7 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r5, r6, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) [ 936.132861] devpts: called with bogus options 22:34:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000040)) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 936.375742] devpts: called with bogus options 22:34:42 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r3) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r5, r4, r5}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r6 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r7 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r5, r6, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) 22:34:42 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) socket$inet6(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000400)=0x2, 0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) fcntl$dupfd(r0, 0x0, r0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:42 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000180)) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000001c0)='user\x80', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r4, 0xfffffffffffffffd) keyctl$describe(0x6, r4, 0x0, 0x0) keyctl$assume_authority(0x10, r4) ftruncate(0xffffffffffffffff, 0x0) [ 936.814903] devpts: called with bogus options 22:34:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16e50e1a7d1100b7078695d78d2070a2d70b01aaea1a5f01c800ff000001000000010000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x800, 0x9fc4f5b7ea97c0ca) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000100)=0x1) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x1c}, 0x10) accept4$rose(r0, &(0x7f0000000280)=@full={0xb, @dev, @bcast, 0x0, [@netrom, @default, @bcast, @netrom, @rose, @rose]}, &(0x7f00000002c0)=0x40, 0x80000) fcntl$setpipe(r0, 0x407, 0x2000000000000002) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KIOCSOUND(r4, 0x4b2f, 0x1f) syz_init_net_socket$bt_l2cap(0x1f, 0x74b6e7a34cc81c55, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xffffffffffffffff) 22:34:42 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) fsetxattr$security_evm(r0, 0x0, &(0x7f0000000300)=@v2={0x5}, 0xa, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x208}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 22:34:42 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r3) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r5, r4, r5}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r6 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r7 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r5, r6, r7}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000000002) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r8, 0x28007d) [ 936.918386] devpts: called with bogus options 22:34:42 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$vnet(r5, &(0x7f0000000800)={0x1, {&(0x7f0000000600)=""/91, 0x5b, &(0x7f0000000680)=""/77, 0x1, 0x1}}, 0x68) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, 0x0, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r7, r6, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) 22:34:42 executing program 1: r0 = gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x6, r0, 0x8000, 0x100000) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() setregid(0x0, r5) r6 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8c0000007d010000006b0001000400000010010000000300000000000000000000020400000001000000050000000000000004005c2d5d4025006574683176626f703176626f786e65743025406e6f6465762562646576de006b657972696e67000700236d786e657431", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6], 0x8c) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 937.120763] devpts: called with bogus options 22:34:43 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:43 executing program 4: [ 937.525435] devpts: called with bogus options 22:34:43 executing program 4: 22:34:43 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000600)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 937.578439] devpts: called with bogus options 22:34:43 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xfffffffffffffffc, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r1, r2) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r6 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r7 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:43 executing program 1: gettid() r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000180)={[], 0x400, 0x80000001, 0x5, 0x9, 0xfffffffffffffffd}) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:43 executing program 4: 22:34:43 executing program 2: socket$pptp(0x18, 0x1, 0x2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 937.986054] devpts: called with bogus options 22:34:43 executing program 4: 22:34:43 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000240)=""/243, 0x49, &(0x7f0000000080)={&(0x7f0000000640)={'sha3-224\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_tcp_buf(r3, 0x6, 0x42, &(0x7f0000000400)=""/140, &(0x7f0000000180)=0x8c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ftruncate(r6, 0x40) [ 938.320154] net_ratelimit: 24 callbacks suppressed [ 938.320160] protocol 88fb is buggy, dev hsr_slave_0 [ 938.330213] protocol 88fb is buggy, dev hsr_slave_1 22:34:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b707000001000000487000000000008000000000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@delrng={0x10, 0x14, 0x100, 0x70bd28, 0x25dfdbfb, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x7713a569caa38179) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r2, 0x10, &(0x7f0000000040)={&(0x7f0000000200)=""/202, 0xca, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r3, 0x4) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:44 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:44 executing program 4: [ 938.620710] devpts: called with bogus options 22:34:44 executing program 4: write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000240)) pipe(0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000380)={0x0}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000003c0)={r0}) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='selinuxfs\x00', 0x0, &(0x7f0000000300)='\'\x00') r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = fanotify_init(0x200, 0x0) fanotify_mark(r4, 0x1, 0x4800003e, r3, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) [ 938.763328] devpts: called with bogus options 22:34:44 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x5d) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc26b, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res(0x0, 0xfff, 0x0) request_key(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0xff600000, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0, 0x2}]) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000000)={0x48, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB="08000000008000000601002cfb66b770cf373aa92442f68c4f9c3571f56a53b504e49bc4ac01326a8e1ed873e31f9cd2616422e359719e09908652b5a68f0eac84155e010f9267cc"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:34:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000001) [ 938.931267] audit: type=1804 audit(1570401284.770:1582): pid=18588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir225388386/syzkaller.9SeRmn/1165/file0" dev="sda1" ino=21495 res=1 22:34:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000eab8ad8eb431cec4"], 0x0, 0x10}, 0x20) accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 939.280112] protocol 88fb is buggy, dev hsr_slave_0 [ 939.285340] protocol 88fb is buggy, dev hsr_slave_1 22:34:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5, &(0x7f0000000240)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000080)='GPL\x00', 0x800, 0x2ed, &(0x7f0000000280)=""/176}, 0x48) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x80000001) 22:34:45 executing program 1: gettid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000480)=""/119) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="b632dc8966fd052a0ceecfe0a76d0668ddaf8706ee100f7706", 0x19}, {&(0x7f0000000680)="531423697f05f62ca7dcf08ec0c2fd2f75304ed5a6ca4b7672fb62bd9180dda1cdbe35394d30eaa14cc5fbd3679e213310c21bed4695feedf2d7ed8badda154ad4e798ab372208d9a68e0d86ae05394d67e459cc", 0x54}], 0x2, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r3) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r5, r4, r5}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="fd8d8fe69e11d5", 0x7, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e24, @broadcast}}, 0x0, 0x7fff, 0x0, "7d2a7a7a0c712937da7c773c71339a1947a09502898b02670c5ed8e1aa0fd45d8edfa592c162cc523eb56c9c35836e495832a1b57a712e7ac5678ba6cf06cd0eef1daf60fb94df8d67ef64feb3e3408d"}, 0xd8) write(r6, &(0x7f0000000340), 0x41395527) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8080004}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="33935fd3c085de87fd5fa6384aeb0dc9ed13d35e5303a24f3904fc6cc260cff78b72bcd164aac4426e3f68354d3f1c27ba6023eceb6cdb6f8e16b49ee5235a152fa066bef85ea39015a5"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000070) 22:34:45 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc7000000000000095000000000000007162499970993001cdbc7c40fac491b1ba3d6f5b5ac741511978e0fc24effeefce9680b5715ec5c67208533b810b89a2da3d160edce508604c5a72e6323b7375063d5ed743f0ea70161d915c376e1b3cdd6c00ec1ece4e38806e326533e9d2143ae71a988a77960605779ffd8f4f3839d59a5e88d5ec1aa1cc08de91d9f857234de08437565c8a141e00000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@v2={0x4, 0x0, 0xc, 0x7, 0x2d, "d648273fd95559f3373b6edd468fdded92d213c4425adb86ddb75c9424da8da8c9d431b3ae27d863a081ecddbf"}, 0x37, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x9a, {{0x2, 0x0, @local}}}, 0x88) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/207) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$KVM_RUN(r4, 0xae80, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) 22:34:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000001280)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) close(r0) [ 939.680120] protocol 88fb is buggy, dev hsr_slave_0 [ 939.685251] protocol 88fb is buggy, dev hsr_slave_1 [ 939.690110] protocol 88fb is buggy, dev hsr_slave_0 [ 939.695343] protocol 88fb is buggy, dev hsr_slave_1 [ 939.700483] protocol 88fb is buggy, dev hsr_slave_0 [ 939.705549] protocol 88fb is buggy, dev hsr_slave_1 22:34:45 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(0x0, 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 939.873425] devpts: called with bogus options 22:34:46 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x4000) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:46 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000600)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 940.129333] devpts: called with bogus options [ 940.145101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=18654 comm=syz-executor.3 22:34:46 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000600)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) [ 940.378213] devpts: called with bogus options [ 940.763500] devpts: called with bogus options 22:34:46 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x1f, 0xf5d9077a06f32098) ioctl$VHOST_SET_VRING_ENDIAN(r4, 0x4008af13, &(0x7f00000001c0)={0x0, 0x10000}) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0x0, 0x5}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:46 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000600)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r10 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r9, 0x0, r10}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r6, r5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r11, 0x28007d) 22:34:46 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(0x0, 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:47 executing program 4: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726412c62f5538c66545f51adb367342a769723d6e2f66696c65302c6c6f7765726469723d2e3a66696c65302c"]) link(0x0, &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) r1 = socket$nl_route(0x10, 0x3, 0x0) flock(r1, 0x3) mount$overlay(0x0, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e23, 0xfffffffd, @ipv4={[], [], @broadcast}, 0x7fff}, r3}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0xfffffffffffffcf7) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) 22:34:47 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x0, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xb3880, 0xf, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0xc}, 0x591) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 941.377407] devpts: called with bogus options [ 941.385686] devpts: called with bogus options 22:34:47 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 941.717500] overlayfs: unrecognized mount option "upperdÆ/U8ÆeEõÛ6sB§ir=n/file0" or missing value [ 941.892728] audit: type=1400 audit(1570401287.700:1583): avc: denied { getrlimit } for pid=18715 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 [ 941.897480] overlayfs: unrecognized mount option "upperdÆ/U8ÆeEõÛ6sB§ir=n/file0" or missing value [ 941.934663] syz-executor.2: page allocation failure: order:0, mode:0x14000c4(GFP_KERNEL|GFP_DMA32), nodemask=(null) [ 941.982260] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 942.007478] CPU: 1 PID: 18631 Comm: syz-executor.2 Not tainted 4.14.147 #0 [ 942.014547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.023928] Call Trace: [ 942.026536] dump_stack+0x138/0x197 [ 942.030178] warn_alloc.cold+0x96/0x1af [ 942.034166] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 942.039022] ? wait_for_completion+0x420/0x420 [ 942.043616] __alloc_pages_slowpath+0x23c6/0x2930 [ 942.048497] ? warn_alloc+0xf0/0xf0 [ 942.052145] ? __might_sleep+0x93/0xb0 [ 942.056040] __alloc_pages_nodemask+0x62c/0x7a0 [ 942.061152] ? rcu_read_lock_sched_held+0x110/0x130 [ 942.066193] ? __alloc_pages_slowpath+0x2930/0x2930 [ 942.071243] alloc_pages_current+0xec/0x1e0 [ 942.075596] kvm_mmu_create+0xdf/0x1e0 [ 942.079491] kvm_arch_vcpu_init+0x29c/0x8e0 [ 942.083839] kvm_vcpu_init+0x272/0x360 [ 942.087737] vmx_create_vcpu+0xfc/0x29c0 [ 942.091814] ? mutex_trylock+0x1c0/0x1c0 [ 942.095898] ? handle_wrmsr+0x6d0/0x6d0 [ 942.099881] ? wait_for_completion+0x420/0x420 [ 942.104480] kvm_arch_vcpu_create+0x8c/0xc0 [ 942.108810] kvm_vm_ioctl+0x501/0x1600 [ 942.112706] ? __lock_acquire+0x5f7/0x4620 [ 942.116954] ? kvm_set_memory_region+0x50/0x50 [ 942.121550] ? trace_hardirqs_on+0x10/0x10 [ 942.125822] ? trace_hardirqs_on+0x10/0x10 [ 942.130086] ? __might_fault+0x110/0x1d0 [ 942.134157] ? save_trace+0x290/0x290 [ 942.137965] ? __might_fault+0x110/0x1d0 [ 942.142053] ? __fget+0x210/0x370 [ 942.145654] ? find_held_lock+0x35/0x130 [ 942.149719] ? __fget+0x210/0x370 [ 942.153186] ? kvm_set_memory_region+0x50/0x50 [ 942.157776] do_vfs_ioctl+0x7ae/0x1060 [ 942.161670] ? selinux_file_mprotect+0x5d0/0x5d0 [ 942.166811] ? lock_downgrade+0x740/0x740 [ 942.170963] ? ioctl_preallocate+0x1c0/0x1c0 [ 942.175411] ? __fget+0x237/0x370 [ 942.178875] ? security_file_ioctl+0x89/0xb0 [ 942.183291] SyS_ioctl+0x8f/0xc0 [ 942.186684] ? do_vfs_ioctl+0x1060/0x1060 [ 942.190838] do_syscall_64+0x1e8/0x640 [ 942.194731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.199588] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 942.204794] RIP: 0033:0x459a59 [ 942.207972] RSP: 002b:00007f9ebd9a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 942.215698] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 942.215703] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 942.215707] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 942.215712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ebd9a46d4 [ 942.215717] R13: 00000000004c2a0b R14: 00000000004d64f8 R15: 00000000ffffffff [ 942.254717] Mem-Info: [ 942.278270] active_anon:843852 inactive_anon:317 isolated_anon:0 [ 942.278270] active_file:5191 inactive_file:5915 isolated_file:4 [ 942.278270] unevictable:0 dirty:306 writeback:0 unstable:0 [ 942.278270] slab_reclaimable:17499 slab_unreclaimable:139089 [ 942.278270] mapped:57110 shmem:4346 pagetables:76876 bounce:0 [ 942.278270] free:400621 free_pcp:319 free_cma:0 [ 942.324214] Node 0 active_anon:1802296kB inactive_anon:772kB active_file:2372kB inactive_file:852kB unevictable:0kB isolated(anon):0kB isolated(file):16kB mapped:211436kB dirty:76kB writeback:0kB shmem:16872kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 765952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 942.373694] Node 1 active_anon:1573012kB inactive_anon:496kB active_file:18392kB inactive_file:22808kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:17004kB dirty:1148kB writeback:0kB shmem:512kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 942.426461] Node 0 DMA free:10420kB min:216kB low:268kB high:320kB active_anon:4456kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:32kB pagetables:12kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 942.465419] lowmem_reserve[]: 0 2580 2580 2580 [ 942.476754] Node 0 DMA32 free:31024kB min:36468kB low:45584kB high:54700kB active_anon:1797840kB inactive_anon:772kB active_file:2372kB inactive_file:852kB unevictable:0kB writepending:76kB present:3129332kB managed:2644884kB mlocked:0kB kernel_stack:19136kB pagetables:95220kB bounce:0kB free_pcp:4kB local_pcp:0kB free_cma:0kB [ 942.568901] lowmem_reserve[]: 0 0 0 0 [ 942.573700] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 942.604133] lowmem_reserve[]: 0 0 0 0 [ 942.608360] Node 1 Normal free:1562856kB min:53420kB low:66772kB high:80124kB active_anon:1573012kB inactive_anon:496kB active_file:18392kB inactive_file:22808kB unevictable:0kB writepending:1148kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:82112kB pagetables:212124kB bounce:0kB free_pcp:1320kB local_pcp:688kB free_cma:0kB [ 942.644003] lowmem_reserve[]: 0 0 0 0 [ 942.648312] Node 0 DMA: 59*4kB (UM) 41*8kB (UM) 12*16kB (M) 2*32kB (M) 0*64kB 1*128kB (M) 1*256kB (M) 2*512kB (UM) 0*1024kB 0*2048kB 2*4096kB (M) = 10420kB [ 942.667236] Node 0 DMA32: 776*4kB (UMEH) 556*8kB (UMEH) 137*16kB (UME) 163*32kB (UMH) 251*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 31024kB [ 942.686541] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 942.697850] Node 1 Normal: 442*4kB (UME) 495*8kB (UME) 454*16kB (UME) 223*32kB (UM) 31*64kB (UM) 13*128kB (UME) 9*256kB (UME) 12*512kB (UME) 1*1024kB (M) 1*2048kB (U) 373*4096kB (M) = 1563104kB [ 942.720454] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 942.729803] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 942.743151] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 942.753138] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 942.765861] 15456 total pagecache pages 22:34:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) times(&(0x7f0000000040)) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:48 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(0x0, 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:34:48 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r2) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r4, r3, r4}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000600)={r1, r4, r1}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_matches\x00') readv(r1, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r1, &(0x7f0000000580), 0x3c1) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000340)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x1, 0xda95, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x2, 0x5}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$l2tp(0x18, 0x1, 0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001480)=ANY=[@ANYBLOB="019478486437ceb913000000cd9510e317a12e300670f05c6ecdb92a7b8be20d1b0600ad11653951a58d3405db9896f346b02d6e5829717263fbe871f717e827461d5d1904c58e6ff968465c02e7", @ANYBLOB="42e8ddf3f0ea577563dbda0b51c9f72aa5409ae27abd4adc47f0820dc0a4ee3a1387506ed08c2dfea2a6fbfde971663db8f9ae697d238401e5b58e664fef99dbcc7bb12127db949dd90284e698bd62adc08e114b87402fe3dda8593a167244967554b0d0903c11280e043bbbcb931e4c78abdc0e87693216cd7078abf7adc3c2b29448bd609dc47199842fad7244925d0b3bf98e45dde2e2111b399ed549c82491380cd56a647f9d12b3663a9552b726490f32fa374505b8ea6260d669c197736e6042d01bfa05b6b0ea1363f0ec6941dc77f76e475274a33cf06514231252a1b22048c611f9d2990ed232ea7179072d74b2c2bac7dc42a541"], &(0x7f0000000180)=0x2) r3 = socket$inet6_sctp(0xa, 0x2, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000980)={r4}, &(0x7f00000009c0)=0x14) r5 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x6, 0x2, 0x5, 0x80000000000007f}) mq_timedsend(r5, 0x0, 0x0, 0x100000001, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) write$binfmt_aout(r5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x604) open(&(0x7f00000012c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) connect$l2tp(r2, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) setfsuid(r7) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0xa9, 0x0) syz_open_dev$cec(&(0x7f0000001240)='/dev/cec#\x00', 0x1, 0x2) 22:34:48 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r6 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r7 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:48 executing program 4: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726412c62f5538c66545f51adb367342a769723d6e2f66696c65302c6c6f7765726469723d2e3a66696c65302c"]) link(0x0, &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) r1 = socket$nl_route(0x10, 0x3, 0x0) flock(r1, 0x3) mount$overlay(0x0, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e23, 0xfffffffd, @ipv4={[], [], @broadcast}, 0x7fff}, r3}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0xfffffffffffffcf7) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) [ 942.770528] 0 pages in swap cache [ 942.774333] Swap cache stats: add 0, delete 0, find 0/0 [ 942.784352] Free swap = 0kB [ 942.787642] Total swap = 0kB [ 942.791187] 1965979 pages RAM [ 942.794532] 0 pages HighMem/MovableOnly [ 942.798729] 333229 pages reserved [ 942.807994] 0 pages cma reserved [ 942.899710] devpts: called with bogus options [ 943.084547] overlayfs: unrecognized mount option "upperdÆ/U8ÆeEõÛ6sB§ir=n/file0" or missing value 22:34:49 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r2) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r4, r3, r4}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r5, 0xfffffffffffffffd) keyctl$describe(0x6, r5, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000180)="48ac81983937866907be88a04afbf8eeaae2b0091c8912f696f592c18122c8366838524cac69132034161745be0b7a", 0x2f, r5) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r3, r1, r6}, &(0x7f0000000700)=""/243, 0x1a2, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-arm64\x00'}, 0x0, 0x33d}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) capget(0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x530, 0x2d0, 0x0, 0x1b8, 0x3b8, 0x3b8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @multicast2, 0x0, 0xff, 'syzkaller1\x00', 'syz_tun\x00', {0x80}, {0xff}, 0xff, 0x2, 0x40}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0x2, 0x1}, {0x2, 0x81, 0x4}, {0x7f, 0x22, 0xd1}, 0x2, 0xff}}}, {{@ip={@multicast1, @loopback, 0x0, 0xffffffff, 'yam0\x00', 'ip6tnl0\x00', {0x7f}, {0xff}, 0xe1, 0x0, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x2, 0x40}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x5, 0x3f, 0x8}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x590) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x8f) r2 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0xd3, &(0x7f0000000d40)=ANY=[@ANYRES64=0x0]) r3 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000d80)=@filter={'filter\x00', 0xe, 0x4, 0x390, 0x238, 0x0, 0x0, 0x238, 0x120, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x4, &(0x7f0000000080), {[{{@ip={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xead1bb9165550201, 0x0, 'bridge_slave_1\x00', 'syzkaller0\x00', {}, {0xff}, 0x62, 0x2}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x2, 0x100, 0x1, 0x1}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x2, 0x2, 0x1}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@broadcast, @rand_addr=0x400, 0xc83ac3133bd6af07, 0xffffffff, 'bcsf0\x00', 'vxcan1\x00', {0xff}, {0x80}, 0xc, 0x1, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x2, 0x8}}, @common=@unspec=@realm={0x30, 'realm\x00', 0x0, {0x80000001, 0x800}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f0000000280)={0x0, @raw_data="e2c07d6cf34bf7373565792741030de9a1e6aed734cf96219aef2e7161b85c9bcef026dd8b9ed964f27968e1ae04e4d670f21d37430ba4a233cb3210be29d673e331782805750fb60d88599cb98b2fdfb5c8d37b2d44b2670d24b2cff3eeb345da7557447501fd0b92c09a9f1dda3cf986ccfdc0c44cd457c286c7d9e167854fe4c2da327c794b44d6d17d0b6d6a14ba1d6ad70966091586e5db2b4c3f4f50e18fabe3d3a5eda11b4052545e8ed7aecc0acc3e9a6bdd565d51eed7bab197e5747bdc554a61b0dacc"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f00000003c0)={0x0, 0x7fffffff}) chdir(&(0x7f0000000180)='./file0\x00') pivot_root(&(0x7f0000000340)='./file2\x00', &(0x7f0000000440)='./file1/file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) socket$netlink(0x10, 0x3, 0x2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000380)={0xa927}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x40000012, 0xffffffffffffffff, 0x0) 22:34:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000b1c1000000000000a05ec69d0fc0cc9a9108fed7c3370f0c12f7680b0407c2dffdcf424625ce65b2945f3319c878e6feff58a5cb26b6da5a6b68cae7ca84cedbab42965b7aba24a6c4b82e95dbd195143fe6b3ad8657cc7e210516740e4fcf90fe43ad2d62825e028f1c62214407c286fa4510"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x966500, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 943.440101] net_ratelimit: 15 callbacks suppressed [ 943.440106] protocol 88fb is buggy, dev hsr_slave_0 [ 943.450191] protocol 88fb is buggy, dev hsr_slave_1 22:34:49 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='cgroup\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f00000001c0)={0x30, 0x5, 0x1, 0x9, 0x58, 0x3, 0x3, 0x7e2}, 0xf01350fc48d3e15a) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 22:34:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf160000000000004000bc70000000000800950000000000000092e0d67d45ac5313e4fdc33ad55c4b7cfded64f8d2806130c7f40074848eef"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) move_pages(r2, 0x5, &(0x7f0000000040)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000100)=[0x6, 0x3, 0x9, 0x3f, 0xfffffffc], &(0x7f0000000200)=[0x0, 0x0, 0x0], 0x2) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000280)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 22:34:49 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ftruncate(r9, 0x28007d) [ 943.706678] overlayfs: missing 'lowerdir' [ 943.781296] overlayfs: missing 'lowerdir' 22:34:49 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x4, 0x1000, 0x4, 0x1338, 0x20}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980)='\x00\x1e\x00', 0x42, 0x0) sendmsg$alg(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000600)="da1137f6d85ffd6dee25877c6313832b94a52026d50c5bef1015376eb90bce43d065dbd5b869cf317b9b7758d71e782b6a151d0535bf9a54dbef41af2a362dbe1ec49e45bb1d48c4e2ccd552ff54079cfcf8909022c8e26208abca82808437602b4e2c009c79dd10f0dc091a0b08ae1a1223c0ae5d085938f5bf11de229870cfa90f1251ae72e73deb38d66b291a66c8be", 0x91}, {&(0x7f00000006c0)="7934409fe75f9fbaac5da81db06ce81282c9edf1edb865ad96e29e6e4778a562ef77ca2346b1fd34bf6a38e667b3c6a329d85d5b4d04d34f38681132ecbea6eba3608c9b3cc43b3f34ab454bbcf19d9e7dac9f39420e2b66ce71b377d353c0284546736db289ce87a17ad8c5a185e088e8542b5ccc9c297f3f2999f33c0d0506851fea89cada6d21d503ad35774d3bcc9f440777d80ef1b0169ca6f37f10128323932a4a85ca379bf7b78e752a5aba9c201d73e7680cbc1dadb9869c51d7fbbd8d82ac6ff7684a8be1aa7571acfd4a58b1d2dc832b72465503e74ea30b380a86d1d1d015630e043949cc82f1c681e1226b0eec49d092", 0xf6}, {&(0x7f0000000280)="9ca686ffc4f9fc147c2ecad40b240d03815af72d134656e3ffb31227cc63fd79bc608ede8038861f5e842ea9b3", 0x2d}, {&(0x7f0000000500)="a6c5b60f76a9abd3dfd338f000db79bfa178544dc960d809622902e98296afc0abcc0d1a5eb5bed4caa7a9f956c800cda3a5ad9118f484c7a70444d1d9027216fbdf0c", 0x43}], 0x4, &(0x7f0000000800)=[@assoc={0x18, 0x117, 0x4, 0x4}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x3ff}, @op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0xef8}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x101}], 0xa8, 0x4000004}, 0x8000800) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f0000000200)={'bcsh0\x00', 0x81}) syz_open_dev$rtc(&(0x7f0000000940)='/dev/rtc#\x00', 0x6, 0x600) setsockopt$packet_buf(r2, 0x107, 0xd, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) mmap(&(0x7f0000f60000/0x1000)=nil, 0x1000, 0x1000002, 0x11, r5, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="2000000091d0000000000000000000000000000978637862067eed256aad96fae4d86ffa15e540a247deb785ce0f8a5c659058dfc30e6f6e9e0bb350b1399fe7f02ea495110b80337cc551ca03f5c1fb59a0153bbfa82cc927748ba71e624e7d8ecb77dad89580ffaeda0e06ea24bfe413c36d209abfe1cc04898594f3ef0be960ac2135030069e032f323b59e250f469a20a3a99baefda420ac1d074fa59fdb61c18314fbb829335f74f982bcb808acd103f630e8fa2d0a71cb77ec05d6141fb8cccd53d9dc926b0c1eab14733cc74b47a42f53eefc37869855b56a27854628bab4f79a7b761d4d5e8240fee8ae6e0ab5e7632276bdb471edcf1b9987fbfff8cfc3a9ca4c0d324193128e188e79ab2a4c0c04b2386544ac353616d8b75125d2c021303f6cf0cf281bd6c05736b3464d3310a02064f3b7ac3363d1d50000b28f52f308000000002e1a6a31"], 0x1}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r6 = dup(0xffffffffffffffff) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r6, 0xc0f85403, &(0x7f0000000300)={{0x0, 0x7, 0x7fff}, 0x4, 0x8, 'id1\x00', 'timer0\x00', 0x0, 0x4, 0x0, 0x2}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000900)=0x33) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d4, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000580)={{0x1, 0x0, @descriptor="7b0764a72458193e"}}) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) [ 943.840168] protocol 88fb is buggy, dev hsr_slave_0 [ 943.845276] protocol 88fb is buggy, dev hsr_slave_1 [ 943.850431] protocol 88fb is buggy, dev hsr_slave_0 [ 943.851506] protocol 88fb is buggy, dev hsr_slave_0 [ 943.855476] protocol 88fb is buggy, dev hsr_slave_1 [ 943.860935] protocol 88fb is buggy, dev hsr_slave_1 [ 943.865581] protocol 88fb is buggy, dev hsr_slave_0 [ 943.875613] protocol 88fb is buggy, dev hsr_slave_1 22:34:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000c86138710000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 944.046608] devpts: called with bogus options 22:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x200, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) lstat(&(0x7f0000002680)='./file0/file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[@ANYRES32, @ANYBLOB="d4ff0500f1a3abfa4a6dd1b15e7246d6f9eb01ec20969e6c9b3d59191dea93ea1b23bcd23eac0f1a90d8a6fb132f73ed546e8a91c36d69073762c4919a09d17570b8ab2913e5784b25ce95670ea3bbd6e33fc19e37a9c11e90d5432f6e352fbfca7dc40d5c61a315665c9db8f97cc37d683b61f155db22d9481b0080a749c9fa1ce176d36fe0c1be381f0c87424aaf8ce4c18bca7d7d53e67586a62f98ea17a488796900bb3773cda1640746dd8706039d3ff7b6af51a6f2a694491940131eecc1771f0791de751092d99b3b576dbd7109c247201803118502", @ANYBLOB="ec58b4b6e964b4bd116ec8c1bea38a952ec12510f9cf2e4649d6d2723970f97d53feefd2a7ae06a958f81cabf2b3c30c9e4901c026a7ab3fcaeb84cb107f9a8419942160a58f0cb84eeb0e2af14364f75cc3915403762bbdfa0deda142af11231ccb9df4", @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="32e2c60e810ac6f28078901d42236296800de3528e06fc4be6af67fe2d9e6ea12aea286f65dd64f32484945ebc7e31d26e1c23717610304d7866df435b078eb0d6beb669b76b04b4fcbb20dd5fd1b6115ecf1ab13dbaf9398d63d4a4275f5eb879071543db602da85ef36066c0e460d2a0be7f09c13dc8b4432c553f84a3eb4696bb3f9925128deaf44347f4fa5cdf997143246fd18ceeccfae5fd711ee7612c14b82d57fe1dd225fb1dd7a14f756d5ab26895ef27e5051f5c2ebb68af8cd5ef32ed3c023c9689e5666e28183f51e3f20ca0a12033bcc3ff82822e2deeb6d530a5f57b20419827551f73", @ANYBLOB, @ANYBLOB, @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB], 0xb, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x5}, [], {0x4, 0x1}, [{0x8, 0x5, r3}], {0x10, 0x7}}, 0x2c, 0x1) syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000180), 0xc, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000700)=ANY=[@ANYBLOB="8000ffff08b7960ff7f96e041aefb1ebea7e7de8e703000000d8fc279f7c1deadb2487d9b2d074101b09cfb5fe9f187d9581a1d7ee31d9555d202e92514e871cd8202365860987d28b37167ba1ca8a7346f66c92ddf83f0a60de117b4ca700000000000000000000000000000000698bb22df53d1469e68f903a1dbf6af0149498b17d39889aa7e418ac7efee02b21e09f05d0fa1bfd8b51d885226684b9f88334afe10ce624714201ac75088a4be71e89f3d9bd600cf99c4c09ed5e51938b8ce41412b9a3121aa75a6963f0b112021c35631f8117ff9564258a3bc017c6cdc3a0f912f71a60cf1b90223219ff"], 0x6e) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x9, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r7, 0x105, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x3, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vxcan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r7, 0x20, 0x70bd27, 0x5, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20006044}, 0x4000000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r8}, 0x8) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000580)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, 0x0, 0x0) 22:34:49 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000100)='\x00', 0xffffffffffffff88, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 944.146516] audit: type=1804 audit(1570401289.980:1584): pid=18835 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir871481685/syzkaller.OI1H7m/1101/file0" dev="sda1" ino=22009 res=1 [ 944.477747] audit: type=1400 audit(1570401290.310:1585): avc: denied { map } for pid=18844 comm="syz-executor.3" path="/root/syzkaller-testdir646712221/syzkaller.3JNtNG/1006/cpuset.effective_cpus" dev="sda1" ino=22290 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 22:34:50 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:51 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file2\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x119fe048, 0x8}, 0xc) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0xfd, 0x1, {0x2a, 0x23, 0x4, 0x1b, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:51 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ftruncate(r9, 0x28007d) 22:34:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x17e) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(r1, 0x104, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 945.133187] DRBG: could not allocate CTR cipher TFM handle: ctr(aes) 22:34:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff008}, {0x80000006}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0200000000edc100040000f92c908f74e050"]) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2711}, 0x10) 22:34:51 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r0, 0x0, r0}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x11, &(0x7f00000000c0)=0x77, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) sendfile(r1, r3, 0x0, 0xfffffffffffffffd) r4 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x2, 0x640) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xfff, 0x2, 0x4, 0x1b52, 0xffffffff}, &(0x7f00000001c0)=0x14) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r4, 0x84, 0x78, &(0x7f0000000240)=r5, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x9) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f0000000080)={0x7f, 0xffff, 0x3, 0x174d73c6, 0xd1, 0x6}) 22:34:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020c01ed01000870fff8", 0x16}], 0x0, 0x0) r0 = getgid() setregid(0x0, r0) r1 = getgid() r2 = getgid() setregid(0x0, r2) r3 = getgid() setregid(0x0, r3) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fstat(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r5) r6 = getgid() setregid(0x0, r6) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r0, r1, r7) [ 945.611899] devpts: called with bogus options [ 945.670149] FAT-fs (loop3): bogus number of reserved sectors [ 945.678535] FAT-fs (loop3): Can't find a valid FAT filesystem [ 945.735488] audit: type=1804 audit(1570401291.570:1586): pid=18901 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir871481685/syzkaller.OI1H7m/1102/file0" dev="sda1" ino=22304 res=1 22:34:52 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x40}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0xe, 0x800) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r6 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r7 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000540)=[@in6={0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000}], 0xfffffffffffffd55) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000200), 0x1eb, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) tkill(r1, 0x2035) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f0000000100)=""/35) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:52 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ftruncate(r9, 0x28007d) 22:34:52 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7fffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000009c0)) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 946.448965] FAT-fs (loop3): bogus number of reserved sectors [ 946.458363] FAT-fs (loop3): Can't find a valid FAT filesystem 22:34:52 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) timerfd_settime(r0, 0x2, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20100000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse.', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1f3c6425f2cf1804c9ae0e1f6bb2d078b43960845c05f15d19dc472d1f49841419cc75b81b66386de87f000000935abdb41eff2385c9b159e0741018559ca955705599aa5b794eea371c9c41853aa4b35a9b67db2d94866a066f493ba5fefad69fc5f3a8807dc0d7564fcec0a41df03fc7cc3ce645413aca7eadfbaffcd0d516c424685d665f0ec3e2a0130b858604c46da797eeaff41b003939a3e03cf852ec94d189d2580d15d7"]) 22:34:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0xffffffffffffff83, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0xdb}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}, 0x4000}, r1}}, 0x48) [ 946.674715] devpts: called with bogus options [ 946.765841] audit: type=1804 audit(1570401292.600:1587): pid=18947 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir871481685/syzkaller.OI1H7m/1103/file0" dev="sda1" ino=22290 res=1 22:34:52 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000180)="c553ea701efb9abe2826ebecff08a23fcf06e21d45d8afd42b254381d2022ac55a1c61da344613502be2a5300dec8a59f831e276bfaa0dbc604703efd38317f22abbb722b0ed8bfdf1928b79671d", 0xd77, r0) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f0000000180)=0x98c6, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="f9ff0000"], 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000), 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$IMGETCOUNT(r3, 0x80044943, &(0x7f0000000100)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000040)={{}, {}, [], {}, [{0x8, 0x3}, {}, {}], {0x10, 0x6}, {0x20, 0x4}}, 0x3c, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r4 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) dup2(r0, r4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:34:53 executing program 1: gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000640)={'sha384-avx2\x00'}}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 22:34:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000267d7b7071b219d31fd7421067a6097e0a67e6e91725ec4fd0005567a97b03d0923b0d3a2092c56bc3a5b1247e00186bce5e6b0ad8a5a50ad3aadfdabb164a75fbc3e4325a7f5305230b1312fa6d633809fac06d67515d3df7be4c566ff66127cdc2f525077a1665ed1987ed61f9"], &(0x7f0000000200)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xb1d, 0xa00) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:53 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1d, 0x1b4456a67d86145a, &(0x7f0000003880), 0x80000, 0x0) 22:34:53 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x0) ftruncate(r9, 0x28007d) 22:34:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept$ax25(r2, &(0x7f0000000040)={{0x3, @bcast}, [@netrom, @null, @bcast, @remote, @remote, @remote, @default, @bcast]}, &(0x7f0000000100)=0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0xcc) 22:34:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) stat(0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000300), 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) syz_emit_ethernet(0x0, &(0x7f0000001400)=ANY=[], 0x0) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x7fff, 0x10000) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x30200, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000003800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000003a40)={r4, @in6={{0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0x11}}}, 0xfffffffffffffffd, 0x6e, 0x1, 0xea6b, 0x401}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x3f, 0x4, 0x8, 0x1f, r4}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r4, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r4, 0x4) rmdir(0x0) [ 947.648111] devpts: called with bogus options 22:34:53 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x1, 0x6, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 947.974732] audit: type=1400 audit(1570401293.810:1588): avc: denied { mac_admin } for pid=19004 comm="syz-executor.4" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 947.998130] SELinux: Context pos: 0 [ 947.998130] flags: 02 [ 947.998130] mnt_id: 8 is not valid (left unmapped). 22:34:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000e000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000140)="66b9800000c00f326635010000000f306766c7442400da38111e6766c74424025f845ddb6766c744240600000000670f011c24baf80c66b8c8d4408b66efbafc0c66b80020000066ef66b9bb08000066b8f2ffffff66baffffff7f0f30baf80c66b8100bec8d66efbafc0c66b8f9ffffff66ef6766c7442400001000006766c7442402040000006766c744240600000000670f011c240f01cf2e2664dbe02624ad650f01c3"}], 0x1, 0xc, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0xfffffffffffffffc) r6 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_timeval(r7, 0x1, 0x14, &(0x7f0000000100), &(0x7f0000000240)=0x10) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x4}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) setsockopt$SO_TIMESTAMP(r8, 0x1, 0x3f, &(0x7f00000000c0)=0x24, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 948.980935] net_ratelimit: 24 callbacks suppressed [ 948.980941] protocol 88fb is buggy, dev hsr_slave_0 [ 948.991048] protocol 88fb is buggy, dev hsr_slave_1 22:34:55 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x0) ftruncate(r9, 0x28007d) [ 949.680118] protocol 88fb is buggy, dev hsr_slave_0 [ 949.685496] protocol 88fb is buggy, dev hsr_slave_1 22:34:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b707000001000000497000ff00000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0xee13420dbe2eb975) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x400181, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10b, 0x0, @perf_config_ext={0x6a1, 0x79}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x26) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000440)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) connect$l2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 949.990822] devpts: called with bogus options 22:34:55 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) listen(0xffffffffffffffff, 0x80) r7 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) 22:34:55 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f000091d000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000236000/0x2000)=nil, &(0x7f0000621000/0x3000)=nil, 0x2000, 0x0, 0x6}) [ 950.080116] protocol 88fb is buggy, dev hsr_slave_0 [ 950.080154] protocol 88fb is buggy, dev hsr_slave_0 [ 950.086192] protocol 88fb is buggy, dev hsr_slave_1 [ 950.086281] protocol 88fb is buggy, dev hsr_slave_0 [ 950.091275] protocol 88fb is buggy, dev hsr_slave_1 [ 950.096306] protocol 88fb is buggy, dev hsr_slave_1 22:34:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x78) getegid() setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f006c007e5bc5795ecaa29a16f291d36a48e93100ffff81", 0x0, 0x100, 0xf2ffffff}, 0x28) 22:34:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) tkill(r0, 0x3) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) tkill(r0, 0x3a) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:56 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20040, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000100)={0x6, 0x1c, [0x0, 0x20, 0xdc7a, 0x508, 0xffff15d1, 0x2, 0x6]}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x0, 0x30}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0cb) 22:34:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) prlimit64(r0, 0xc, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7f, 0x400) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0xf, 0x1d, 0xa, 0x3, 0x5, 0x8, 0x3, 0x9d, 0x1}}) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$poke(0x4, r1, &(0x7f00000004c0), 0x4) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000005c0)={0xec, 0x5, 0xc0}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0xffffffffffffff1c}], 0xb9285b8cfd264f3, 0xa) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') execve(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000380)=[&(0x7f0000000240)='\x00'], &(0x7f0000000580)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='ext4\x00', 0x0, &(0x7f0000000500)='ext4\x00', &(0x7f0000000540)='ppp0\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687463915e3a702a9d8aea872943afd874e", 0x21, 0x400}], 0x0, 0x0) 22:34:56 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x0) ftruncate(r9, 0x28007d) 22:34:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f05000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x9, 0xfffffffb, 0x1f, 0x7ff, 0x4, 0xffffffffffffffff}) 22:34:56 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(0xffffffffffffffff, 0x28007d) [ 951.002460] devpts: called with bogus options [ 951.240624] devpts: called with bogus options 22:34:57 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r2) fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r4, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r6 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r7 = socket$inet6(0xa, 0x803, 0x20) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:34:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm-monitor\x00', 0x141203, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000700)) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000640)={&(0x7f0000000340)=@newspdinfo={0x2d0, 0x24, 0x8, 0x70bd2c, 0x25dfdbff, 0x401, [@policy={0xac, 0x7, {{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1, 0x4e23, 0x0, 0x4e23, 0x3, 0xa, 0x20, 0x20, 0x2c, 0x0, r3}, {0xfff, 0x872, 0x80000000, 0x19d, 0xffffffff, 0x7, 0x5, 0xe08}, {0x1, 0x1, 0xfff, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x2, 0x3}}, @mark={0xc, 0x15, {0x350759, 0x100}}, @user_kmaddress={0x2c, 0x13, {@in6=@empty, @in6=@empty}}, @sec_ctx={0xf4, 0x8, {0xf0, 0x8, 0x0, 0x2, 0xe8, "60a1a8e7fe27b1f776a0b01afff59c120784e000f6c34a1f0f3ce4d1c1365d39b5c4e3fa8f5aecb13240270c7f08bd501bfe63e3e1cf1a2d60eeea65a8e111c60d379353fe24ade6abb672a56f949f2ee2ba1c72848a3037478acb70887d1dd0390f341b7b69194e694573c859cb6c1726c1955f6c03c8681ec24c2c88169991de4aa8823768d6244dac5c5b49288bd1d97aa7d27f26bd44caae24389598636386b5cbba844be33ec1414f2afc49c5ab9c77b080a0ee1392336ec2c6895006e03fbf812f880e486032196266bfdfa78686c0c7e0047615a08bf770fef615118e9d36daaa576f5aa4"}}, @algo_auth_trunc={0xc0, 0x14, {{'sha256-ni\x00'}, 0x398, 0x0, "463197a6d210383e45b81906d17857082237122da17da27dcd51431f0113786897eda25dba9138564f47578fe927779b3375d1eff50cdb1217035316c5b82107964a10b0199ff89ca9a3194fc58b0f514b8d9ffc9723beee3935e315d73a254f44819429e41df074a1edeec6c235749f8d8ac2"}}, @offload={0xc, 0x1c, {0x0, 0xa228f8f812e7d6c1}}, @ipv4_hthresh={0x8, 0x3, {0xc, 0x15}}, @ipv6_hthresh={0x8, 0x4, {0x45, 0x60}}, @ipv6_hthresh={0x8, 0x4, {0x41, 0x41}}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x9}, 0x1c810) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:34:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7, 0x7, 0x61, 0x6, 0x3, 0x3e, 0xfffffff9, 0x2d2, 0x38, 0x2ae, 0x991f, 0x9, 0x20, 0x2, 0x5, 0x3ff}, [{0x60000005, 0xffffffff, 0x1, 0xc3eb, 0xdfc9, 0x3, 0x5, 0x400}], "45119d276d393cf217dde97f619d6fef8d4a52f9dbc7e646bad50bff69597ca5e39f12331383240f7a13bb769f792c853eb37c7356896db89c4e107fc92336ff4472d1c9580a3518fdf42b306e391f4833b8e7ee15987c2aa466888c08243d2811be0b48daa26b0ae64723923e82653323f761aa945191d4c5ff1ad975", [[], [], [], [], [], [], [], [], []]}, 0x9d5) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 954.024591] audit: type=1400 audit(1570401299.860:1589): avc: denied { map } for pid=19154 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 954.240215] net_ratelimit: 18 callbacks suppressed [ 954.240220] protocol 88fb is buggy, dev hsr_slave_0 [ 954.250224] protocol 88fb is buggy, dev hsr_slave_0 [ 954.250263] protocol 88fb is buggy, dev hsr_slave_1 [ 954.255276] protocol 88fb is buggy, dev hsr_slave_1 [ 954.265352] protocol 88fb is buggy, dev hsr_slave_0 [ 954.270462] protocol 88fb is buggy, dev hsr_slave_1 [ 954.275508] protocol 88fb is buggy, dev hsr_slave_0 [ 954.280575] protocol 88fb is buggy, dev hsr_slave_1 [ 954.421436] IPVS: ftp: loaded support on port[0] = 21 [ 955.200360] protocol 88fb is buggy, dev hsr_slave_0 [ 955.205435] protocol 88fb is buggy, dev hsr_slave_1 [ 955.457460] chnl_net:caif_netlink_parms(): no params data found [ 955.492838] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.499271] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.506427] device bridge_slave_0 entered promiscuous mode [ 955.513242] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.519609] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.526673] device bridge_slave_1 entered promiscuous mode [ 955.543036] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 955.551960] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 955.570331] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 955.577411] team0: Port device team_slave_0 added [ 955.582943] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 955.589970] team0: Port device team_slave_1 added [ 955.595308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 955.602832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 955.672334] device hsr_slave_0 entered promiscuous mode [ 955.750362] device hsr_slave_1 entered promiscuous mode [ 955.811663] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 955.818629] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 955.831628] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.837991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 955.844647] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.851031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 955.879653] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 955.886103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 955.895275] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 955.904363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 955.911894] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.928851] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.938620] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 955.944919] 8021q: adding VLAN 0 to HW filter on device team0 [ 955.953497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 955.961293] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.967744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 955.977110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 955.984879] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.991271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 956.015398] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 956.027266] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 956.036625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 956.048866] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 956.059511] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 956.070155] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 956.076480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 956.084735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 956.092914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 956.106464] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 956.116369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 956.450626] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 22:35:03 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x605, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_FSSETXATTR(r0, 0x6611, 0x0) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000000)={{0xb, 0x1}, 0x3e, 0x9, 0x1000, 0x1, &(0x7f00000002c0)="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"}) 22:35:03 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001780)='/dev/autofs\x00', 0x8000, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000017c0)={0x7, 0x28}) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/deg/loop0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, &(0x7f0000000200)=',\x00\x00\x9f\x9b2\x96\xd9k\xb2[@u\xab\xf6\xb1W\x10&h\x19\xe2\x98\xf1\x9a\x16\xf9\xf9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\xd3\xc4\x02\xfd\x8cpO3\xb2J\xad\x8d\xcd\'VAW\xb7\xcb\xf6\x02k\xfe\xc9\x16\xff5:\xaa\x93\x893$\xf6\xab\x00\x11\xca\x1d\xc7\xce\xf4J\xf5Rp\xf4\xff\xe8\xbc\xdf\xf0\xdc\x86\xa5I\"\xe9XF,\xca\xdc\x93p\x88\xdd\x9fZ<4@w\xd2\x05\x06z\xd8b\xf0\x95-\xfb\xf0\x12\x89\xa6\x1fl\x84?m\x1a\xe2\xc0\xc5\xb58\xed\x18Q\xdc\xb0\x84-Y\xc7\xcczh\xdb\xc5\x0ei\xc2\xd0\xdc\x8f}\x9b\xa0.b\xd7\xc3z2\xe8J\xe4\x01\xeau)x') pipe(&(0x7f0000000200)={0xffffffffffffffff}) close(r1) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(r1, r2, 0x0, 0x6) get_thread_area(&(0x7f0000000100)={0x4, 0x20000800, 0x4000, 0x1, 0x1}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x2000, 0x0) pwritev(r1, &(0x7f00000016c0)=[{&(0x7f00000002c0)="eeb4e48588170b581ebcec1413986326a26c1fcba4a016adc613360e1ee5e2aea86a92ad5c0595f8fead3d6bf117a9106dfc69d21dbbf17ff4518cbac4668628d04e9e56641f07377efb0eed9420ad001b853bdf6230a70fc332f252a4d59fbdb9498197f63e2f4f40e6592d7ba8269a1473b274a9ee9100c011ce2d7eaa0bfa009dcd511052a3496a6a2046340f2b2d49609488bb2c3c5a489edfd1baf57da8012a0acb5c0ba04b3a94a9002fef74a545fd337c6660d87cee1dc2e3501a9ffe73e7156fe751ba34f40b", 0xca}, {&(0x7f00000003c0)="05f73045383e5088ee5cebced33102316a19dc0c120a4ff32cdad0d951069a8ad522de316754285ee258f603663107aa55130b4234603bb10c9833fd1318d93e590ff8836733d83e6006dfc2af74003279654fa9313e0c1c1494bede7e9935d1049a462aa313a209b87121597acd50da1ae462dd11f644ac9e062f64f35b265ffa1cd27044200fc57577b3a080dee711756e217f34e4ab5e63ade571ed34acba3b426a3b5f4d82db984ac8f477ee9bb85cb7160cdfb4da0d7b76e221ab2f2cbbd6", 0xc1}, {&(0x7f0000000040)="1fb75dca91d05d89bd3e7cb3a4e9efbe9ed4b816c578e8c6bd366ffa383b7cc00e14a0", 0x23}, {&(0x7f00000004c0)="88f9688f9c75bb02c57f3af7b8cfdb2e0976fbc0d122e759c70f4ec2372fd6b5bcb31086411dd18cd9cbb454ab655c242208e955021fbef0cc7af2f2e0d3f11cd3674fc0", 0x44}, {&(0x7f0000000080)="613dad7090e5cb752de43fad6cbe84b03ed0716ee0f47f332ac357d32f566d", 0x1f}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="5fbeeafc5541ea0bc52e9d83656110da2c3d0252dfecd611f3086e39b5b1a460f66c6492602c038180a12a18585f45c2149f68a932cb25190903ebfabdc1c47920597c2f269efc203201850579b78a6f443a90cef504565377ebbf17a6f4530df831fc5bae600753ff5f1b8c6e4af9b257efba37057fc9c6b8f55a0194bbc3ca52c1", 0x82}, {&(0x7f0000001600)="476cd2336bac6e6266d7ed8785ac22c52fe2f2e2b0dc0c89518802a2c5541d234a573c02c88f78531819318b1e2bc9f2dec21f165c5bd2a682ca820bc5756ec0e57b947eb8b50bfcd5f6517269a8045489deb57b81a3cf314d5c31484b01888b6796726f557d19073c6c501e34948f8520ccf57bae5ae94bdb1f42c03123515221d3e9e950e4125f1ded3f1d2897990d62b37d7020a34989942feb1a8bba8b5877507a1bc8d9751af7300ffc70ba3f212df0ab3e39", 0xb5}], 0x8, 0x41) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f0000001740)=0x5, 0x4) 22:35:03 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000340)='./file0\x00', 0x0) write$nbd(r0, &(0x7f0000000740)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x247) r2 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$USBDEVFS_DISCARDURB(r3, 0x550b, &(0x7f0000000400)=0x4) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="d0435bebba1a3817020000000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x21120c10}, 0xc, &(0x7f0000001680)={0x0}}, 0x0) sched_rr_get_interval(0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, 0x0}, 0x4008) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x88109802}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="9398a8e70713c58f8461419dc1ae4563026efa7df488a62b8934408f6bd4a0f8faa17e40b837272ee5fb069e0f04588b29db4aa5566e4f9c8fc1e524b15ddebdecf1cad79f440911661373df894d58569c4e7f96a51ed5cf6b7b21e0af5b866c1398218111444f5639b0062cd78af0c84cc34c49b82e03bb3a757a82b06b57916a30203edf6654fbe2e7978a0997b8cd1ba4584c41d29b8df948f8deefe05a441829905d47523028b6d894e77bec59cbabef1faa7ccb4c109f46bac4b4a6a3075b763928aafa6b"], 0x3}, 0x1, 0x0, 0x0, 0x4040051}, 0x4000000) r6 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) prctl$PR_GET_THP_DISABLE(0x2a) write$nbd(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x7, 0x100, 0xf800}) userfaultfd(0x80400) 22:35:03 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(0xffffffffffffffff, 0x28007d) 22:35:03 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000004040000b7070000010000004877000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x2a4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_DOWNDELAY={0x8, 0x5, 0xffffffff}]}}}]}, 0x3c}}, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:03 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x60500, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(0xffffffffffffffff, r0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r2, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x202a, 0x23, 0x17, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r4 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r3, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000200)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 957.636332] devpts: called with bogus options [ 957.652337] (unnamed net_device) (uninitialized): option downdelay: invalid value (18446744073709551615) [ 957.662081] (unnamed net_device) (uninitialized): option downdelay: allowed values 0 - 2147483647 22:35:03 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x2, 0x1f}) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000200)={'system_u:object_r:console_device_t:s0', 0x20, 'system_u:object_r:v4l_device_t:s0', 0x20, 0xfffffffffffffffd, 0x20, '/usr/sbin/ntpd\x00'}, 0x6c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:03 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) execve(&(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000380)=[&(0x7f00000002c0)='fdinfo/3\x00'], &(0x7f0000000640)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)='lo@(bdevnodev\x00', &(0x7f0000000440)='ppp1posix_acl_access\\keyringeth0selinuxvmnet1\'trusted@4\x00', &(0x7f0000000480)='lo@(bdevnodev\x00', &(0x7f00000004c0)='os2.', &(0x7f0000000500)='lo@(bdevnodev\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='\'\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x00']) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) unshare(0x400) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x80000001}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x3dc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f00000006c0)={0x7d000, 0xffffffff, 0x2, 0x35, 0x7, 0x6}) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) getxattr(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000040)=@random={'os2.', 'lo@(bdevnodev\x00'}, &(0x7f0000000080)=""/167, 0xa7) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xe}}, 0x10) 22:35:04 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:35:04 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(0xffffffffffffffff, 0x28007d) 22:35:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x30200, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="000000007d6a86707707e824e62682a2826154412c33ce03dc1058719d044cdf8226eed0105c7f28b79046cff0ac1d922adea3bbed4f8d393209623a117f09e593fc50c77ae9d139651939f8e902768798f020aa5f424a27dbf62b9546095c90ab3ccb7af862c51c0e7c66ccc73a405f93d852040a3a7e993f20c495b6749e6d1b4c61819a71a48c959974a8108685f15968b6fd1eb37517b78a00792bdd7ad866c742ff3c126f8b3251afc939442d3f1f77ce4f42993e431dd8", @ANYRES32=0x0], &(0x7f0000003800)=0x8) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x2041, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000380)={r6, @in6={{0xa, 0x4e21, 0x401, @mcast1, 0xfffffffd}}, 0xfffffffffffffffd, 0x6e, 0x1, 0xea6f, 0x3}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x3f, 0x4, 0x8, 0x1f, r6}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r6, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)={r6, 0xb3, "027302ba1f25f13762986793d2090ca01f328cfc8aae296f5eb3f0e9747691e783b2f994cc31119b79ee44101cface715ef2a15446dddd38193e4994d4996d894eb451f1b2eb794ccfb393f5e0863326d3e3c8ddb9c1bf42f2b0637e8d091e50aa2418353fa3b34f425ab214c2993cca4221e8f42c5472d3aa10c339ecb83a680584e43e34f8aa40670f74027bd091df02a8ad57c4565f4c768a7abfe767823916748ec4036688e7c9981e15da59070bbee56e"}, &(0x7f0000000180)=0xbb) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r8, 0xffffffff, 0x20}, &(0x7f0000000300)=0xc) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x80000000, 0x8, 0x8, 0x9, 0x4, 0xff, 0x9, 0x0, 0x5, 0x1, 0xfffffffd, 0x101, 0x2, 0x8, 0x4, 0xdc, 0x7fffffff, 0x800, 0x6, 0x1, 0xfffffffe, 0x9, 0x8000, 0x400, 0x0, 0x0, 0x4, 0x0, 0xe, 0x2, 0x2, 0x7fffffff]}) 22:35:04 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nual\x00', 0x400000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) r4 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000180)={0x53, 0x0, 0x6, 0x5, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000240)="e46e3688b768", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa0000, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r5, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:35:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r2 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x3f) 22:35:04 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x0) [ 958.707971] devpts: called with bogus options [ 958.797385] sctp: [Deprecated]: syz-executor.4 (pid 19243) Use of int in max_burst socket option. [ 958.797385] Use struct sctp_assoc_value instead 22:35:04 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x0) 22:35:04 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000200)) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:04 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, "cff0ad7cd332099c46b7f308f14ae1fa81ab21cedb8d73582350a30c685f2c77"}) r1 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r1, 0x0, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) r8 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x200, @mcast1, 0xcb9}, @in6={0xa, 0x4e23, 0x3f, @loopback, 0x7fff}, @in6={0xa, 0x4e24, 0x0, @rand_addr="7ef1f5a4b557f07c5c33c6b47f782057", 0x9}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e24, @rand_addr=0x6}], 0x74) r9 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x400) signalfd4(r9, 0x0, 0x15a, 0x0) [ 959.078893] devpts: called with bogus options 22:35:05 executing program 1: socket(0x11, 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) chdir(0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x94331c6b254b5f04) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x482d40, 0x0) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f00000002c0)={0x2, @sdr={0x0, 0xfffffffb}}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r7, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r12, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f00000005c0)=ANY=[@ANYRES64=r8, @ANYRESHEX, @ANYRESOCT, @ANYRESDEC=r12, @ANYRES32, @ANYRESDEC, @ANYBLOB="12defc0cad3ff8aaee5a130e733cf07eb29897fce53e6569cec9e98abb5e450c7ab01ecb0a013a535bee9c91431650d33954761a09d7ab2a7c6183457dcef0fd449a4898bff0188b5835f86a1f194763cf7fb8c842f9496a32deb928c65fa163e567c429adbc603616845fbb04faed6e38856eed06c1ad1d4482ad7f50b0661af58fd1ca4b624fb155484679774f4c50a0c203b7ac4a1ec8b6e03658a4ce1ddd34d1edcd879a0337", @ANYRESDEC=r7, @ANYRESHEX=0x0, @ANYRESHEX=r10]) sendto$inet(r7, &(0x7f00000012c0)=' ', 0x64c8, 0x3, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES32, @ANYRES32=0x0, @ANYPTR64, @ANYRES32], 0x5}}, 0x0) 22:35:05 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x246, 0x4, 0x39, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 959.267757] audit: type=1800 audit(1570401305.100:1590): pid=19274 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=21698 res=0 [ 959.315348] devpts: called with bogus options [ 959.360331] net_ratelimit: 32 callbacks suppressed [ 959.360336] protocol 88fb is buggy, dev hsr_slave_0 [ 959.370409] protocol 88fb is buggy, dev hsr_slave_1 [ 959.414708] audit: type=1804 audit(1570401305.250:1591): pid=19286 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir646712221/syzkaller.3JNtNG/1014/file0" dev="sda1" ino=21698 res=1 22:35:05 executing program 4: ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="66b8ad008ed00f8d0808417b2c020f3548b800000100000000000f23c00f21f835010008000f23740fc778fc0f350fd8060f30", 0x33}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000440)=@mangle={'mangle\x00', 0x1f, 0x6, 0x800, 0x3d0, 0x288, 0x288, 0x4c0, 0x3d0, 0x730, 0x730, 0x730, 0x730, 0x730, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0x148, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={0x58, 'hashlimit\x00', 0x1, {'dummy0\x00', {0x46, 0x5, 0x6, 0x6, 0x7fff, 0x0, 0x5, 0x80, 0x80}, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @HL={0x28, 'HL\x00', 0x0, {0x4, 0x51}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x1d, 0x8, 0x6, 0x7, 0x3, 0x0, 0x722}}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x4}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x2}}}, {{@ipv6={@loopback, @rand_addr="f58db701e9303a073bfbd4a748a1bc4e", [0x807fffff, 0x244c507dd806840b, 0x0, 0xc614ad00658e21bd], [0x0, 0x0, 0xffffff00, 0xff], 'bridge0\x00', 'erspan0\x00', {0xff}, {0x6447726314d370bc}, 0x0, 0x6, 0x8, 0x8}, 0x0, 0x228, 0x270, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x3505, 0x7, 0x1, 0xb0, 0x20, 0xa, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @dev={0xfe, 0x80, [], 0xb}, @remote, @empty, @ipv4={[], [], @local}, @dev={0xfe, 0x80, [], 0x13}, @loopback, @empty, @local, @mcast2, @empty, @dev={0xfe, 0x80, [], 0x2a}], 0xe}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x2a2a10e7f1602ef2}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, 0xc, 0x2c}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x860) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 959.709584] audit: type=1804 audit(1570401305.300:1593): pid=19288 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir646712221/syzkaller.3JNtNG/1014/file0" dev="sda1" ino=21698 res=1 [ 959.762101] audit: type=1800 audit(1570401305.280:1592): pid=19286 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=21698 res=0 22:35:05 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x0) 22:35:05 executing program 4: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)=0x81) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x864020, 0x0) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@rand_addr="0000000000a900", @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cce}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in=@local, 0x0, 0x4, 0xbc6d1ed3becfb22e, 0x6}}, 0xe8) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r3 = socket$inet6(0xa, 0x2, 0x0) munlockall() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 22:35:05 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000340), 0x41395527) dup2(r7, r1) r8 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r8, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r9 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r9, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r9, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x2, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r9, 0x111, 0x4, 0x1, 0x4) bind$inet6(r10, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r11 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r10, 0x200000000002) r12 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r12, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r11, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 960.080158] protocol 88fb is buggy, dev hsr_slave_0 [ 960.085336] protocol 88fb is buggy, dev hsr_slave_1 [ 960.093826] audit: type=1804 audit(1570401305.930:1594): pid=19315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir646712221/syzkaller.3JNtNG/1014/file0" dev="sda1" ino=21698 res=1 [ 960.105961] devpts: called with bogus options 22:35:06 executing program 5 (fault-call:23 fault-nth:0): creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:35:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)={0x3, 0x2b}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100), 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9000000010003b2400"/20, @ANYRES32=0x0, @ANYBLOB="b56d08000000000008000a00", @ANYRES32=0x6, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 22:35:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000080)=""/11, 0xb}, 0x120) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) r3 = dup2(r2, r1) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x639e59e4c234ceb3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) connect$bt_sco(r3, &(0x7f0000000280)={0x1f, {0x2, 0xea, 0x8, 0x4d, 0x1, 0x1}}, 0x8) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f0000000180)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$netrom_NETROM_IDLE(r6, 0x103, 0x7, &(0x7f0000000240)=0x5, &(0x7f00000002c0)=0x4) set_robust_list(&(0x7f0000000340)={0x0, 0x7, &(0x7f0000000300)}, 0x18) 22:35:06 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 960.368280] devpts: called with bogus options [ 960.444214] FAULT_INJECTION: forcing a failure. [ 960.444214] name failslab, interval 1, probability 0, space 0, times 0 [ 960.455530] CPU: 0 PID: 19334 Comm: syz-executor.5 Not tainted 4.14.147 #0 [ 960.462555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.471920] Call Trace: [ 960.474531] dump_stack+0x138/0x197 [ 960.478229] should_fail.cold+0x10f/0x159 [ 960.481394] protocol 88fb is buggy, dev hsr_slave_0 [ 960.482389] should_failslab+0xdb/0x130 [ 960.487424] protocol 88fb is buggy, dev hsr_slave_1 [ 960.491355] __kmalloc_track_caller+0x2ec/0x790 [ 960.491368] ? __check_object_size+0x13b/0x2ac [ 960.491378] ? strndup_user+0x62/0xf0 [ 960.491389] memdup_user+0x26/0xa0 [ 960.491402] strndup_user+0x62/0xf0 [ 960.491414] SyS_request_key+0x8c/0x2c0 [ 960.491423] ? SyS_add_key+0x350/0x350 [ 960.491437] ? SyS_add_key+0x350/0x350 [ 960.496503] protocol 88fb is buggy, dev hsr_slave_0 [ 960.501620] do_syscall_64+0x1e8/0x640 [ 960.501629] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 960.501647] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 960.506508] protocol 88fb is buggy, dev hsr_slave_1 [ 960.510265] RIP: 0033:0x459a59 [ 960.510270] RSP: 002b:00007f17c06cac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 960.510280] RAX: ffffffffffffffda RBX: 00007f17c06cac90 RCX: 0000000000459a59 [ 960.510285] RDX: 00000000200003c0 RSI: 0000000020000380 RDI: 0000000020000340 [ 960.510292] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 960.513988] protocol 88fb is buggy, dev hsr_slave_0 [ 960.517499] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f17c06cb6d4 [ 960.521504] protocol 88fb is buggy, dev hsr_slave_1 [ 960.525319] R13: 00000000004c724c R14: 00000000004dcc60 R15: 0000000000000006 [ 960.717784] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 960.746862] device gre1 entered promiscuous mode 22:35:06 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x8000000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x802, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getpid() pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000100)) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 960.857294] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 22:35:06 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) write$P9_RSTAT(r2, &(0x7f0000000440)={0x6f, 0x7d, 0x1, {0x0, 0x68, 0x9, 0x0, {0x0, 0x4, 0x7}, 0x2000000, 0x98, 0x1f, 0x5, 0x0, '', 0x16, 'trusted.overlay.upper\x00', 0x1d, '/selinux/avc/cache_threshold\x00', 0x2, '/)'}}, 0x6f) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000200)=""/210, 0xd2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x50, 0x4, 0x0, "c29bc79b71004232151ed5dbf282987b", "d1cb43471a7e8a772b03267f33adfcdcb67f413997550efd0655d34a54dea66032b7109ff6e009b4e4e8a56aae199b0570fba688de6e527896b4ee"}, 0x50, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[]) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r3) ioctl$KDGKBMODE(r3, 0x4b44, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000400)='./bus\x00', 0x20) write(0xffffffffffffffff, &(0x7f0000000400), 0x0) close(r1) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x82, &(0x7f0000000040), 0x0) [ 960.907845] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 960.951243] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 960.972773] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 960.979551] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 960.992065] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 22:35:06 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 960.998848] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 961.008698] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 961.031933] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 22:35:06 executing program 4: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)=0x81) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x864020, 0x0) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@rand_addr="0000000000a900", @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cce}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in=@local, 0x0, 0x4, 0xbc6d1ed3becfb22e, 0x6}}, 0xe8) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r3 = socket$inet6(0xa, 0x2, 0x0) munlockall() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 961.052304] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 961.094344] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 22:35:07 executing program 5 (fault-call:23 fault-nth:1): creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:35:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0xf9, 0x1, 0x84, 0x2, 0x3a6, 0x1000}, &(0x7f0000000200)=0x20) r2 = semget(0x3, 0x2, 0x0) semctl$SETVAL(r2, 0x2, 0x10, &(0x7f00000000c0)=0x1) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000040)=[0x3, 0x4]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:07 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000140)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r5) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) tee(r6, 0xffffffffffffffff, 0x1, 0xc) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) [ 961.396071] devpts: called with bogus options [ 961.458205] hid-generic 0000:0000:0000.0002: unknown main item tag 0x6 22:35:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000076c4a5086ade5f3500625a3581e0cb71c807117fa12d962692c620c63f7fdb7a7c56ed38486b31d09988ea2ec0189409fb66fe2c3ff975c2bc3bd08e460844025017d3b27ef141fc82d6a442"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002f40)=[{{&(0x7f0000000280)=@l2, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000300)=""/67, 0x43}, {&(0x7f0000000380)=""/254, 0x461}, {&(0x7f0000000480)=""/73, 0x49}, {&(0x7f0000000040)=""/19, 0x13}, {&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/112, 0x70}, {&(0x7f0000001580)=""/253, 0xfd}, {&(0x7f0000001680)=""/36, 0x24}], 0x9, &(0x7f0000001780)=""/189, 0xbd}, 0x2}, {{&(0x7f0000001840)=@ipx, 0x80, &(0x7f0000002fc0)=[{&(0x7f00000018c0)=""/1, 0x1}, {&(0x7f0000001900)=""/203, 0xcb}, {&(0x7f0000001a00)=""/232, 0xe8}, {&(0x7f0000001b00)=""/177, 0xb1}, {&(0x7f0000001bc0)=""/253, 0xfd}, {&(0x7f0000001cc0)=""/250, 0xfa}, {&(0x7f0000001dc0)=""/171, 0xab}, {&(0x7f0000001e80)=""/4096, 0x1000}], 0x8, &(0x7f0000002f00)=""/35, 0x23}, 0x800}], 0x2, 0x0, 0x0) pipe(0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f0000002e80)={0x0, 0x0, [0x80000001, 0x3, 0x3f, 0x10001, 0x7, 0x8, 0x20, 0x6]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 961.612201] hid-generic 0000:0000:0000.0002: unknown main item tag 0x7 [ 961.671594] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 22:35:07 executing program 5: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r5) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r6, r7}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r8 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r9 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r7, r8, r9}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000000000002) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000600)={0x77359400}, 0x10) ftruncate(0xffffffffffffffff, 0x28007d) [ 961.780103] devpts: called with bogus options 22:35:07 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) chdir(&(0x7f00000000c0)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x1000, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) sendto$inet(r2, &(0x7f0000000cc0), 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) r3 = semget(0x3, 0x2, 0x0) semctl$SETVAL(r3, 0x2, 0x10, &(0x7f00000000c0)=0x1) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000280)=""/194) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000080)) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x7) 22:35:07 executing program 1: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x4, @broadcast, 'dummy0\x00'}}) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xc) listen(r1, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x30200, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000037c0)=ANY=[@ANYBLOB="f4f70000", @ANYRES32=0x0], &(0x7f0000003800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000003a40)={r6, @in6={{0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0x11}}}, 0xfffffffffffffffd, 0x6e, 0x1, 0xea6b, 0x401}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x3f, 0x4, 0x8, 0x1f, r6}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r6, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r6, 0x101, 0x9}, &(0x7f0000000240)=0x8) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) shutdown(r3, 0x1) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:35:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000040)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffe09, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 962.107287] devpts: called with bogus options 22:35:08 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x30200, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000a40)=ANY=[@ANYBLOB="0c00000013651f845e94a945a8c727340ec33c32fbf88838a4c4eef7cecf190dc190c7c1466a34a21b07034795496f2462bfffc98973a866d8b4b725e55967b6f33f9ebecd3fa5b57970aef4bcdd6852828d85d0ffcde14f977f918d8fb967498db4692ed8bab37a9e9267d7", @ANYRES32=0x0], &(0x7f0000003800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000003a40)={r7, @in6={{0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0x11}}}, 0xfffffffffffffffd, 0x6e, 0x1, 0xea6b, 0x401}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x3f, 0x4, 0x8, 0x1f, r7}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r7, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000001c0)={r7, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x84) r8 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x30200, 0x0) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="0100002827000000", @ANYRES32=0x0], &(0x7f0000003800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f0000003a40)={r10, @in6={{0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0x11}}}, 0xfffffffffffffffd, 0x6e, 0x1, 0xea6b, 0x401}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x3f, 0x4, 0x8, 0x1f, r10}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r10, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, &(0x7f00000001c0)={r10, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000800)={r7, 0xff, 0x7f, 0x4, 0x1, 0xfffe, 0xa82d, 0x401, {r10, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x4, 0x101, 0x9, 0x33506c78}}, &(0x7f0000000680)=0xb0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000980)={r11, @in6={{0xa, 0x4e24, 0xffffffff, @mcast2, 0x8}}, 0x8, 0x1, 0x9, 0x7, 0x20}, 0x98) r12 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r13 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r13, r12, r13}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r14 = request_key(&(0x7f0000000600)='c\x8bfr\xc0_2map\x00\xd8\"\\\xf9@\x9er+<\x02p\x8cj\x947\x06\x98\xac\xcba\x97p\xfa^\x9c\x13+#\x98;(\x10\x9aA\xfb\x16\xf9\xabX\x9cSAU\xac&\\\xcf\xf3VK+\xaa\xdb\xb6J\xdc\xca\xd5\x81p8\xb9\xc8}\xa5\xeb\x80w\x10\xf3b\x88\xb6\x9a\xd5\xe8\xcf\xeb;Z\x8f\xdb', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r15 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r13, r14, r15}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r16 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r16, 0x28007d) 22:35:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffe, 0x7ff}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() r3 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, 0x0) sendmmsg$unix(r1, &(0x7f0000008400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20}], 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0xc0c40) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x3, {0xa, 0x4e23, 0x8, @empty}, r7}}, 0x38) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000180)=""/6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0xe2) r8 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x480, 0x0) mmap$usbfs(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x10, r8, 0x33) 22:35:09 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x94f4d6a4ec1b385d, @perf_bp={&(0x7f0000000000), 0x8}, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x3457c2, 0x40) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 964.020613] devpts: called with bogus options [ 964.317485] audit: type=1400 audit(1570401310.150:1595): avc: denied { associate } for pid=19448 comm="syz-executor.4" name="mem" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 964.324601] overlayfs: filesystem on './file0' not supported as upperdir 22:35:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x8, 0x8001, 0x4, 0x0, 0x5}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 22:35:10 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000000)={r0, 0xcb, 0xd0}, &(0x7f0000000040)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613531322d73737365330000008b56fd4200"/79], &(0x7f0000000180)="d9635a65f1ae3fb12cbd7dd9854045c5f205d2b6627079dc590a0267434ed89301044180d3c00b1e69e90b4aff36a85856820739ae51a61ba11bb8fdb7dc40f39b1706c67230cee65f8201c47beee2509331f8f12e6ef6259e07d3942e18fe0ec23c738f41f3a1ea45db712f5bae0dd2fd20a75da33cc3749f714f6d6afd9f04171775b7b409e154cc3ee4c596c9fbbecdd8f87da790d8d2253ea98d6d19f03668d0de0bf1307c23a2973452b2970d7a310a7b394ce10cd4d0df030c071784697aee1fb736827a8097adfd", &(0x7f00000003c0)="7fe7d8968972bc1f7c0f2ae0b99721c58de86ae51496d04757ff706febc64906fbd40c5bb2dc1da961a53756cfc7701e05c2a0e4958d79b0f85797568ed5bccc1c0c57c696d1af1016457b00eae3ec3c5926eecb7e8ccb6d8babbec473e745b2ab056f4912794a4e1b118e429c763d58dca1720801815cd2071a8859b2eb1165799dc77e7572d9bddc2291d168710cc1e48faad89105819942cb17c4a8eb10bbc9907fe9f3c126073a07bf6fed16c1d2f313684571c4e0f7544531e3f9b6b6e038c035249d1d7eba82cbe27b5b28bfcd") r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc0585611, &(0x7f0000000340)={0x0, 0xb, 0x4, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eb182cf7"}, 0x0, 0x0, @userptr, 0x4}) 22:35:10 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x7fffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r1, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x3, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x10, 0x100, 0x7}, &(0x7f0000000140)=0x62, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x4}}, 0x10) r2 = socket$inet_dccp(0x2, 0x6, 0x0) read(r2, &(0x7f00000002c0)=""/203, 0xcb) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xe8, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa0d0}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xab}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x202}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x24}, 0x42804) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) connect$tipc(r4, &(0x7f0000000600)=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x2, 0x3}}, 0x10) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000640)={0x0, 0x80, 0x1, 0x4}) r5 = syz_open_dev$vbi(&(0x7f0000000680)='/dev/vbi#\x00', 0x3, 0x2) write$binfmt_elf32(r5, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x0, 0x3f, 0x8, 0xc17, 0x6, 0x3, 0x9, 0x3c4, 0x38, 0x34f, 0x7fff, 0x4, 0x20, 0x1, 0x0, 0x5, 0x5}, [{0x5, 0x3d24, 0x8000, 0x8000, 0x0, 0x7ff, 0x2ae8, 0x7c4}, {0x3, 0x9, 0x2, 0x765, 0x5, 0x5, 0x1f80000, 0x1}], "729eba6d771d7bb643be4d11bfb99992d0bca5a4847db77278410d29a28628c118d42dc5650b4030f16eee91127fa33b5f0c1613bf4b088c02e169d237d6018b01d9eb293cadf843d430b9e1d07ad3fbca46e72a4c837481ae63b7e81dcb22fce16fe8a0357d25b4fec5b9ba3c77742c5b545785803a985751193e7d337d2c1ef0644b5666a0eb2c56e093007b7c17be4c251ad22e83257ded6c7f472af495589ed679d799b075770b11", [[], [], [], []]}, 0x522) r6 = dup2(0xffffffffffffffff, r3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000c00)={0x0, 0x800}, &(0x7f0000000c40)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000c80)={r7, 0x7b, "84e47ecb5b7b21196737ef84aaa947e500e95d9270e9d8a055cc9ffd2bbdeb27635d635b876c97d97d1fe2f3c35fa10b7a051376aab19490acd13fe8e14a76741cf990c3f5e73a9f9cd03046a00745874c2a2e64b6f6287d99467e156527b8babc626bc5a23ee4c57ea003d0aaf480fbd024d4d51cff6e91c4836c"}, &(0x7f0000000d40)=0x83) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000d80)='sessionid\x00') write$binfmt_elf64(r8, &(0x7f0000000dc0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0xf8, 0x32df, 0x3, 0x6, 0x200, 0xb0, 0x40, 0x2e3, 0x0, 0x1, 0x38, 0x2, 0x0, 0x6, 0x2}, [{0xd, 0x8, 0x0, 0x9, 0x1ff, 0x4, 0x7, 0xffffffffffff0000}, {0x6, 0x7, 0x7, 0x9, 0x9, 0x800, 0x8, 0x4}], "77d14516a59e41da961f5b0cdebbfb306a39e18078b700e9ec4a27efe22a98ce458f6a4a3caa33d3b9e6113009164d035f15ca3d8514ef11154a7240d87401da9ba94324504e5eb35706df792ac6720d4c31fb8a350ae3eefd086b0bb3b5017b58ae485e7e95ef20ab3c4c09be624e86cd56190b09f35f118cdc03b24fa5d068f1a25889de4c", [[], [], [], []]}, 0x536) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000001300)='/dev/full\x00', 0x20000, 0x0) ioctl$KVM_SET_MP_STATE(r9, 0x4004ae99, &(0x7f0000001340)=0x5) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001380)='/selinux/enforce\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r10, 0x40045731, &(0x7f00000013c0)=0x5) r11 = syz_open_dev$radio(&(0x7f0000001400)='/dev/radio#\x00', 0x3, 0x2) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000001440)=r11, 0x4) r12 = accept(0xffffffffffffffff, &(0x7f0000001480)=@ax25={{0x3, @null}, [@rose, @remote, @bcast, @remote, @remote, @netrom, @default, @rose]}, &(0x7f0000001500)=0x80) sendmsg$alg(r12, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001540)="d94249872c3071b41e71c52b30d87d426b7069021784eb8edc945e89c92db720d292ce473757824556c7187416c194f531e0e41542412a3f3e4d1db1305e8e780863fb44db1e62ae1d8297203385ce6b16826a0343ff05351314f3838f34bc17788119e2b6a2d0fe12f5fb713b526e78a6faac704d7ff97d9d0783f15ad9b96b7d892bbf571edf8b1adcd5ac7effe88ecb61f2ee549d4c88f5e966c31d3b4ad9a002ffe7dfe7cc4b6b7f32c2ae1b74f8a1a5f1336b4e08f573027e5e4877390f4048236e12888f416a17286df4ed7dbb8d1478fff2de93ad5cd73bed99d05b4769155dd7eb5121b044ca1fd2e92c", 0xee}, {&(0x7f0000001640)="325dc634b631736268142651d64e22cf59ee5fee9706b45eb5bd39fd14ad51591c4cd26b9799b34d998114391a2ed945b94f68cbf0551f977477c5aeefb92c17ff5e12253f80b7a17fb3580b6af042f71afffea2068e26ed5f7ac9a21ebc54aad143059bbd0f4f4fcbc4021f2dc54a40c0fb1974fa42e91e26d30f7198e3f6934c2b47bcae23b57a930a53", 0x8b}, {&(0x7f0000001700)="6a3601e84cf7c5503f9443a5c5ccf0f815785b4526f0c257c00c9294d5956b4a0f7dad8b8abc9a2db6d231939996d7225c0aaa184dea3ffc9688f19421d3c465e6387a1af20e06f84c19c351dd129f7d18886b0f957c5eba8acba0220c5cf2f5e8c741ca797b4a8cdc0cda6d2a0d450ca8502777ac5db8a73bbc4ebe7ee4760921c4dbd82e2f25588afc41b4ba3a8c417a45cedab26bc347cb3d9bf9b40b66879f98995b20a2372c4e785b9440c6feeea3016b050fd57d6b5cd0c6bf59f18ccf8118825885ab5bcc282794fef1b1e03a536f24200f7d7b2042c185acfd55270c9597f3596f360c722dc015", 0xeb}], 0x3, &(0x7f0000001840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x800}, 0x8000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x800448d3, &(0x7f00000018c0)={{0x80, 0x80, 0x2d, 0x20, 0xe0, 0xff}, 0x1, 0x0, 0x81, 0x6, 0x400, "95539db5abb6cc0bfba2b32b67b45bead467a14ca00b4581c049b92f1e17c7d381c5729e8a66581fadab500f5793290312bbee106d9a586eaac7b50e437c371bcb8d7b9ffd31749b82c2693dec3bfb04b2e36608eea1892215b410984dfe36e58926b4492e10224557b85f42f060f72eb027f098a9860f9e5bb376498c3bddce"}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) splice(0xffffffffffffffff, &(0x7f0000001980), r13, &(0x7f00000019c0), 0x2, 0x8) r14 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/cachefiles\x00', 0x22000, 0x0) futimesat(r14, &(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={{0x0, 0x2710}, {0x77359400}}) [ 964.776340] devpts: called with bogus options 22:35:10 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000980)="76521ddb98d0329908f397e12cde9959b931c277714c52610ff3ae698a4364babc3c515c7ed0d0366e61689999e24bf036e68d16c2bfdb6e826b1c3c01db8acf6921f17e087ebefe0c24fa439444279fdec8bb43b8723940a40c0e64895424db7c262894823523afe42a61ac229563aedeb354b55388058d24104a456f635401917d8cd76ad2a15fb8800d23a33f0c2cbd30c1ae8f16dec0a5b7ddbae40674a0fb9c40f34a6d2694718988a6027446b82018ecb5c7df8529abb3a0b2bb0ce2db03709e79842bde6004b68864e1f2cf9f7ac570221dfc609ede43abcff59898ad291bc67e863ee9ed88911f91c8c04939089c494ec4d6437acc4188194f460cc2a54d28257b21620f93c45c60f4d0f44d860eb134c8bc30a72f41fc81d29835137828a7b2f57f1019bad0e69d91bcf8ae97ee77b535c0b37700d1012a4acf65ae4067c6af3a0855b0443388da850653f280eef6459736b72e00597082b9c53281a54e1d13f15519841a620dc1eb1f4ec122cd3e73bd63", 0x176}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/sm\xacinuxbools\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) 22:35:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000100)=0x4) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:11 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0xea6, 0x2) sendfile(r1, r1, 0x0, 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(0x0, &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x2000080000003f7c, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(r0, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0/file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x8000000001910824, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') [ 965.213810] devpts: called with bogus options 22:35:11 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x400, 0x2d001fdb5a82484b) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0300000000000000743d976e636f6e66696e43645f752c00"]) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 965.280670] net_ratelimit: 22 callbacks suppressed [ 965.280707] protocol 88fb is buggy, dev hsr_slave_0 [ 965.286185] protocol 88fb is buggy, dev hsr_slave_1 [ 965.296768] protocol 88fb is buggy, dev hsr_slave_0 [ 965.302349] protocol 88fb is buggy, dev hsr_slave_1 [ 965.308208] protocol 88fb is buggy, dev hsr_slave_0 [ 965.313818] protocol 88fb is buggy, dev hsr_slave_1 [ 965.319988] protocol 88fb is buggy, dev hsr_slave_0 [ 965.325549] protocol 88fb is buggy, dev hsr_slave_1 [ 965.461836] device bridge_slave_1 left promiscuous mode [ 965.467414] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.506906] audit: type=1400 audit(1570401311.330:1596): avc: denied { map } for pid=19522 comm="syz-executor.1" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=130126 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 965.536552] protocol 88fb is buggy, dev hsr_slave_0 [ 965.536596] protocol 88fb is buggy, dev hsr_slave_1 22:35:11 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)=0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 965.590901] device bridge_slave_0 left promiscuous mode [ 965.596627] bridge0: port 1(bridge_slave_0) entered disabled state 22:35:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, r1) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 965.912700] device hsr_slave_1 left promiscuous mode [ 965.976161] devpts: called with bogus options [ 965.995985] device hsr_slave_0 left promiscuous mode 22:35:11 executing program 5: creat(&(0x7f0000000300)='./file1\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0xa41, 0x20400) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 966.063202] team0 (unregistering): Port device team_slave_1 removed [ 966.200768] team0 (unregistering): Port device team_slave_0 removed 22:35:12 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001a40)=[{&(0x7f0000000600)="22194d91b892114cd316a809ae55505ab756fd36d5dcad262c33e28f08b3dc411eba96c381a26eb936746ce59f77ced39ef9cffe73a7fbe7af80f64bedbb26093bc91744b461e18b1465e4060cb60bbe3796e6a96abd4add16d4cabcece109c7bb2479df2dc654af27adf16a87f15c13d189302d56f40eeacb2eb36a27cd8022d9626d00f8e04c4e96804355b7b8d56636a0e2eca578", 0x96}, {&(0x7f0000000800)="c7ea2ec92a2bff12fd0cd8531621a261e7110065c9770bd90f4b4f118463b2be05cc98dcb6476ed20dba71716b8f5414ed591bf8fc29dc0bd7f295d3f266a039bc156dc5a673f09eb932614f18008a2f5e0f06571e24c3e854508b514a7e544dded729f0fbebe05c04f2725a5528ef9f4189955e49b5a84be9f8d3ba6346b2fe8e228be5b2c5eed33c82db97d993368b0d25b1", 0x93}, {&(0x7f0000000980)="4c643cb7f76160e619892c0d0492c99294522437b9ebfc381a7877404084f6576f58ffa05bbe80a36aa564acf1c9b20433e4b3b848b9fd82a63e0ba4be0973efbafb84e1aa875d075131f946277e001a04c6c609404710c5f5875debab18bfbcf7d70e232178f9b14d78e050a803f81f9c1571a8389de9ac", 0x78}, {&(0x7f00000006c0)="ce3e214a182244a934c406537091241aad44810a17941fcb64", 0x19}, {&(0x7f00000008c0)="e77073aa251b59fe8385e28f715696202346dc26ec9fb71e8fbcb093f216c2a47e2c3d1c6f1d13b40b1f7674", 0x2c}, {&(0x7f0000000a00)="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", 0x694}, {&(0x7f0000001a00)="6f6e513ee48381704f0a9a", 0xb}], 0x7, 0xc) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) write$P9_RXATTRCREATE(r8, &(0x7f0000001ac0)={0x7, 0x21, 0x2}, 0x7) r9 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r9}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r10, 0x28007d) [ 966.298328] bond0 (unregistering): Releasing backup interface bond_slave_1 22:35:12 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0xffffffffffffff6b) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 966.394707] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 966.408436] devpts: called with bogus options 22:35:12 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) prlimit64(r1, 0x6, &(0x7f0000000280)={0x2, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r5) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r6, r7}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r8 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)='\\\x00', 0xfffffffffffffffc) r9 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r7, r8, r9}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000000000002) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r10, 0x28007d) 22:35:12 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r7 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r8 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/status\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r7, r8}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r9, 0x28007d) [ 966.516270] devpts: called with bogus options [ 966.601611] bond0 (unregistering): Released all slaves [ 966.740832] devpts: called with bogus options [ 967.528871] devpts: called with bogus options [ 968.760926] IPVS: ftp: loaded support on port[0] = 21 [ 969.626839] chnl_net:caif_netlink_parms(): no params data found [ 969.658975] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.665463] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.672685] device bridge_slave_0 entered promiscuous mode [ 969.679415] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.686070] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.693093] device bridge_slave_1 entered promiscuous mode [ 969.711849] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 969.720832] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 969.736914] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 969.744216] team0: Port device team_slave_0 added [ 969.749622] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 969.756810] team0: Port device team_slave_1 added [ 969.762050] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 969.769201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 969.823749] device hsr_slave_0 entered promiscuous mode [ 969.890399] device hsr_slave_1 entered promiscuous mode [ 969.930637] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 969.937584] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 969.952055] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.958421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 969.965080] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.971476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 969.999631] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 970.005994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 970.014286] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 970.023854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 970.031854] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.038513] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.048606] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 970.054858] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.063306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 970.070986] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.077325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 970.089487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 970.097542] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.103934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 970.117657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 970.126377] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 970.135677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 970.147058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 970.156799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 970.167614] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 970.173897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 970.188247] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 970.198504] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 970.290386] net_ratelimit: 26 callbacks suppressed [ 970.290392] protocol 88fb is buggy, dev hsr_slave_0 [ 970.300433] protocol 88fb is buggy, dev hsr_slave_1 [ 970.410197] protocol 88fb is buggy, dev hsr_slave_0 [ 970.415301] protocol 88fb is buggy, dev hsr_slave_1 [ 970.490202] protocol 88fb is buggy, dev hsr_slave_0 [ 970.495316] protocol 88fb is buggy, dev hsr_slave_1 [ 970.540153] protocol 88fb is buggy, dev hsr_slave_0 [ 970.545262] protocol 88fb is buggy, dev hsr_slave_1 [ 970.611128] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 970.670173] protocol 88fb is buggy, dev hsr_slave_0 [ 970.675354] protocol 88fb is buggy, dev hsr_slave_1 22:35:17 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x8, 0x246001) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3b2, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x4, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xfe0a) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x4, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000280)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'vxcan1\x00'}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x10000) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000200)={[{0x4fcb, 0x3, 0xec, 0x5, 0xdb, 0x79, 0x0, 0x4, 0xbc, 0xe7, 0x1f, 0x7f, 0x7}, {0x3ff, 0x40, 0x8, 0x25, 0x72, 0x0, 0x80, 0x9, 0xff, 0x2, 0xfe, 0x9, 0x8}, {0x9, 0xb680, 0x0, 0x6, 0x20, 0x3, 0x80, 0xd9, 0x2, 0x8, 0x81, 0x5, 0x1}], 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x98, r1, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x21d}]}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x4014890) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x800, 0x800) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000240)) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x1c) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$netlink(r3, 0x10e, 0x8, &(0x7f0000000340)=""/65, &(0x7f00000003c0)=0x41) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x291dcf1e0cf4cf1e, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000440)={0x0, 0x3, 0xf6c39a07cbd574b3, 0x2, 0x4}, &(0x7f0000000480)=0x18) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000004c0)={r5, 0x3}, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000540), &(0x7f0000000580)=0x14) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/mixer\x00', 0x14500, 0x0) setsockopt$packet_buf(r7, 0x107, 0x6, &(0x7f0000000600)="382b17146afc49f02a881996f39377365dea08c9f2972a0b7975a214095b6200a734604901", 0x25) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000640)) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r8, 0x300, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x4}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x404001a) signalfd4(r0, &(0x7f00000007c0)={0x3f}, 0x8, 0x800) r9 = syz_open_dev$amidi(&(0x7f0000000800)='/dev/amidi#\x00', 0x2, 0x100) write$UHID_INPUT2(r9, &(0x7f0000000840)={0xc, 0xdd, "076c43299a5d9fe8e1aa97bc7b8c1df2e1c81a6672759d0609c72c53ae90e0efd0b64d06be85128325943a1cafd7d1fe0a67c99c6c28a1cb4f37e3dfe90ba7921be35c39dad73507b3fae63e7d966866c37f5153c6b1d414d9ee182e15819a5dc4ebd61725fc88658602ef8a14855a0b356aafd552558965da36aac01226787c3b1b2de9c4de85a2509ea2f02de9cc32909d04e94deb9c2b0f115d509e2be9116ca4246e18d89f2f0e26a71dbc86df272f8f90aa0f475e93bd36b4cddc3b334f425ea4069f1fd2c6454e0dc87aebb1f975f2e5f39707437ebbd554c2b3"}, 0xe3) r10 = syz_open_dev$vbi(&(0x7f0000000940)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_NMI(r10, 0xae9a) openat$null(0xffffffffffffff9c, &(0x7f0000000980)='/dev/null\x00', 0x202000, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000009c0), &(0x7f0000000a00)=0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000a40)='cdg\x00', 0x4) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x7fffffff, 0x404400) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/hwrng\x00', 0x4a0200, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r11, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x1c, r8, 0x10, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008011}, 0x40000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 22:35:17 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000002c0)=r2, 0x4) r3 = syz_open_dev$vivid(&(0x7f0000000680)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r3, 0xc040564a, &(0x7f00000006c0)={0xff, 0x0, 0x100a, 0x4, 0xffffff7f, 0xfffffffd, 0x4, 0x4f2ebb0b4dae25ec}) r4 = accept(r1, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4600090000080000000000000003000b3c0600000000000000000000004000000000000000270200000000000072000000ec0c38000100000000000000040000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff7f00"/319], 0x13f) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000180)={0x0, &(0x7f00000000c0)="c84f50d2346e948c4c69919dab37ed34bc84256be9fd7948ff7938e75579127a8b34dd5d63e78d949b2618122281f34dabba1a09963f4a64058872b445bf8bdc9ece3f0977491ef8508db2c75585216869765ed67db0011a71387da12dbbeb06647f91952ee1c9c89251381b4bc33a83d0ad45f74318637d859152e7238075a4336fe2b893877ba965fe3799203ae1971e7dcf54fd4ce69f3fde4a09950ee60df77b2e26c28befcd3486f7"}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000200)="cbbc87c9306931b6af7b1ebb80143a3fc05f806da981e772ff13eed61f944e1685420c176093513a7d12c4de42e8977a49b8a7c4bcb7c7103a3a445a6f55c0b3571d83bbb05b86c2e2a00f7a7dba1156b725ee7de0db3618a426df511186aa27856dd5839b0338b3c3acca52583de925ba65c758c9f85ec41db4f3ee26a220b077", 0x81}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="1a4e18ebab01d0e80a5a75be2e03c9ab5a77b93d26b0e6dbd122352bedff26a85daa1e4274d32d2f3a7b9858fdbdfa537a0b6be13bb259c796b9c367e58db9fb6fd31c1320a842810efa79b4824ce9737008a81d7eea0c8899cbcd4f66d7821d0db974597778ec1b8deb244633dc6bd5f3f2c8f4819e37c201233695eb8aafa7e473f686b8f11911d9444bcd883717c46c76721e635af14071b8029f46d9c7d9169cd467f3cc4daf6757d985760067fbb73d2097153f1862b53d26c9257ae7b51a9027ca81116b89b05b1d7f70dc73ad4f0c1d", 0xd3}], 0x3, &(0x7f0000000700)=[@ip_tos_u8={{0x11}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x0, 0x0, 0x7, [{[], 0x800}]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @ssrr={0x89, 0xb, 0x5, [@multicast2, @multicast1]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10}}], 0xa8}, 0x8010) 22:35:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0xa, 0x1, 0x0) r5 = socket(0x1000000010, 0x400000400080803, 0x0) r6 = dup(r5) write$cgroup_int(r6, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f'}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000003c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffffbfffffff, 0x42}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) writev(r7, &(0x7f0000001a00)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f00000015c0)="8ea893737a99f8528fc5ec7210dff4f8374bf0916cac39f875cb09e753174e5f3de73b5431a90faefbe0e0d6c82aba39f51fa1452f0e6052d1ad893ba88526ddaaccd42f842de5aa9cafaabdd71d87907301f8aa0ee850931457c56a9b2ae77e39228e47b9f4737a521017f6ef65f73b4baed7346a23c57133d3ec9967b980eec60444142cf69b4bf5562e9051875388797681d3d60c175ba90fc75c8ae7f9953f0ce899cb91d607a85ae59ff2", 0xad}, {&(0x7f0000000180)="3a094e21a23090e51681f86362694a98dee77e9c89049daa3f2973973649a6a2c78f52c5f82ac3c64044c4f2cc8dc16ff9", 0x31}, {&(0x7f0000001440)="d0528ab8dd7c008e6d91433bd8bfac057cfe7120c1f9453aba71372c7ad787a5bef4528c549a9b8d28516f2fecd81d2556d24a2f8548089fcaeee36a274689a8d6f5e571eb89696acc3a8d3ab876b6e653645dc39d63333a493428392d788c96deec913aa8", 0x65}, {&(0x7f0000001680)="071fe00b1c1913ab07143bd7f201f1e25dd8aa88df33a5f5eb924e3e2fae1eaafd2b3955d1a54f0e722a24410e6f234ba3d592203748b420baebc489987e44cfa90067fbc3835cf2cfb23810373f41dd3f67d5cfb673bda7d47b34ede15d65efddb6d845084a7113282203176b8cd2812d1be49934bd70ef692bf9c970ff60f6eab2dd4dc80c02604a7184e35d16b2e33c5eb6ce5adbd9cb562c6aa416c3d5466166ab20667a4c09c2eff39d3bbd6e143fe396dd864ef382f75aeecc237ff9eb8510489c", 0xc4}, {&(0x7f0000001780)="4de6e5d7a202dac1d1866a344b3e2f085e220b1e354b63f31a9ec1000a8e35a3cfa8f73a814d2396824326bc871ea32bff11505efdcbd6094c0242cf04ac8f46ab0d2a5769fc0d27f8561fcc6fb3af8d8d44ff66cb9cdf7301c252d0e1d4d0c412a2248ac309399672c24b8a773c0df981b782d9", 0x74}, {&(0x7f0000001800)="45eb765e0e8840d98ee42f1a3e953622baec54cfde12c798b3e01fb55cd5bfe1fd18fbc6f749d1ae1dcc90240e4844a6c7011ac535116796922a089c9d56278382c2e6245630470cf2db132e9d2c9d5c98c8b06aa0a4510d202e56e5bc7a3a8ca6046b8fe72f45dbafb0d76e8714b3dd1f5f2e5bfcea2c4f14179a98f79cf8205c60e92214d1e6d56f95b28840044d1ce35b55d0a82683391afe51848f16cc7672f71a2d0cfcda91f40188e5d25e7a0f56bfa85f30fadbd19a742132af17fd4eb2041486629547cba8a7fe837120f61011c4be3a6e49db3334049f5fb7ab04979b5049c64eb947d0d4e4608f2feb", 0xee}, {&(0x7f0000001900)="3ef0a5bcf7285d789b088895754d73a463ac508543eef3f34de51545768355298f209e973b00cc6f6cd1c055e79d5be6c20c35dafa2cdb44baf45b8d4ed6b0c45bf0a54fd77d77a4095ede623ef76350c42c541a06b6b7a505552cddabc64bce269779448e78fc2cacc6d7b835abe12b41c918656427aefff0e18ff5f3ba7b", 0x7f}, {&(0x7f0000001980)="405f9da30283832c0b5c687119cdfc1606a005359d633c3a9eb06228caa2897bcebb498e57c5d8c0ab51b004ae13cd0e331d71338599646fd668ed2d7e59ae56d1fc67d7b45c4b2df28ae8215056b826537f977528da5d6415d0ebd56c63f2e8ab63e9e33a4da002ec4f94", 0x6b}], 0x9) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 22:35:17 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r4) r6 = add_key$user(&(0x7f0000000200)='u\x8cRr\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0xfffffffffffffde4, r4) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r9}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f00000006c0)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000680)}) r10 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r11 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r6, r10, r11}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r12, 0x28007d) 22:35:17 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000005c0)={&(0x7f0000000200)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x3, 0x1, 0x8}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100), 0x1, 0x28d880) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 971.639566] devpts: called with bogus options [ 971.704476] QAT: Invalid ioctl 22:35:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="14bc420000000056b5000000000800000000080008000100000008020500ac14341b080003000800050f01"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaace6, 0x0, 0x0, 0xeb) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) lgetxattr(0x0, &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x400, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="0200000010000400040000faff00000000000000", @ANYRES32=r9, @ANYBLOB="000000000000000028001200ff0201007665746800000000140002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{0x4}}}}]}, 0x74}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000480)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x44400}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xdc, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r9}, {0x7c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x80}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xffff, 0x3ff, 0x10001}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x7, 0x2, 0x204, 0x7, 0x5, 0x8, 0x6, 0x8, r12}, 0x20) signalfd4(r2, &(0x7f0000000280)={0xd3a}, 0x8, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0xffffffffffffc14e, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r13, 0x227b, &(0x7f0000000400)=0x1) [ 971.851875] audit: type=1400 audit(1570401317.690:1597): avc: denied { syslog } for pid=19639 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 971.933395] audit: type=1400 audit(1570401317.770:1598): avc: denied { write } for pid=19628 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 [ 972.083769] IPVS: ftp: loaded support on port[0] = 21 [ 972.431120] devpts: called with bogus options 22:35:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0801ff0100000000000071") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f0000000280)="3092ec5f"}], 0x1000000000000288) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000002c0)=r3) writev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="4412104d8da12bd2efa344cb47787c97282a51f5c4543de1d8a48eaab96888b95b262a2e4ab286adc18623a84289462ee8a26c778dd5120fb7cc5713b0395d872e4cff990c364584a601856706e15bc7056dee5765ce8011a72a2dfdda8f1fa63d65b5d4b89465ac638a304cc1ce13a73b54a00e391ae7c24c18089cc8c76cd9d7f4d7e6ab8d89aed2fe03558032d9065dd7ef0c9d77c338afd76f7e53", 0x9d}, {&(0x7f0000000180)="2b51a279d482c53d3d004143866533bab5073ec540b08413233eabe6893f74f65cb1c80c31cd4d15fd7c4abf52cfff2842f19db0844c51677d2d5a64e14ed2a0798ece2ff8bd834fc7", 0x49}, {&(0x7f0000000200)="dd51b7dcc1dc3f89a5c5697c30eb8c1cc7404f53435a07324be80a6dedfe", 0x1e}], 0x3) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) [ 972.531827] QAT: Invalid ioctl 22:35:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) signalfd(r0, &(0x7f0000000040)={0x7}, 0x8) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000100)={0x10000, 0x0, 0xfffeffff, 0xbc, 0x3}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:18 executing program 4: open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x3c) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = dup(0xffffffffffffffff) r5 = openat(r4, 0x0, 0x420080, 0xe7) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = geteuid() fchownat(r5, &(0x7f00000001c0)='./file0/file0\x00', r6, 0x0, 0x1000) creat(&(0x7f0000000400)='./file0\x00', 0x0) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000001e80)={'vcan0\x00', r8}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r7, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) unlink(&(0x7f0000000040)='./file0\x00') 22:35:18 executing program 5: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f0000000800)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000840)='TIPC\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="78bbef60", @ANYRES16=r5, @ANYPTR64=&(0x7f0000000bc0)=ANY=[@ANYPTR=&(0x7f0000000b40)=ANY=[@ANYRES64=r0, @ANYRES32, @ANYRESDEC=r0], @ANYRESHEX=r1, @ANYRES64=r6, @ANYPTR=&(0x7f0000000b80)=ANY=[@ANYPTR, @ANYRESOCT=r4], @ANYRESHEX=r7, @ANYRESOCT=r8]], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x40) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000600)={{0x0, @name="54d5c5d5c666b19c0c8b8954233d9ec9dd51414883b2d27f1ec12fb1e11659e3"}, "5e6a424b93f8037b31991f91476e7b688a5f5f3a6b9945e5b3309398b8743243", 0x3}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r10 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r11 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r10) r12 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r12, r11, r12}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r13 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) r14 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r15 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r14) r16 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r16, r15, r16}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r17 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r17, 0xfffffffffffffffd) keyctl$describe(0x6, r17, 0x0, 0x0) r18 = add_key(&(0x7f0000000a00)='encrypted\x00', &(0x7f0000000a40)={'syz', 0x1}, &(0x7f0000000a80)="b2d7bc9ae83490b431e55d8bedcfd65de6544ab47a60c9a62a673a2a21f13edf63894d0e13c8b066dd98d85fc1884c93b1a4b09c5c82154911544c5d05125ecb55b7fe9db71ec1da21a06bffc4dca39ccc1dde09151ae1c2704829ac39009ba52e67b5b59d2d22d649d74d22ed168635ec61bfdd5b0fa9c9621ae07c1bd985d1d7c254d5db5215ee3b5efe56fdd750daad7176d7202ef33e435d290c986443d9d9ff9e94bc982419d1010d40f7220db1d5c7f64fbe62aff26767dd36212c99", 0xbf, r17) keyctl$dh_compute(0x17, &(0x7f0000000400)={r16, r13, r18}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000009c0)={&(0x7f0000000500)={'cbcmac-aes-ce\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r9, 0xffffffffffffffff, 0x0, 0x100000000000002) r19 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r19, 0x28007d) 22:35:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r4, r3) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x2}, 0x28, 0x2) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0x37) [ 972.938782] devpts: called with bogus options 22:35:18 executing program 1: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) link(0x0, &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x38}}, 0x0) flock(r1, 0x3) mount$overlay(0x0, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e23, 0xfffffffd, @ipv4={[], [], @broadcast}, 0x7fff}, r3}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0xfffffffffffffcf7) sendto$isdn(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0080000000000000b30c6d42c6dd9420cfaa5fc862ecb68fb26bd7903832b4c2f192fd922c129294c9c03a10d27d9784d72c9a39f100aaa46e294b52d7e86d8c128304c8b0941447c9b38c7b311a1e8a85c9253a57be7960ede1990d4026d6c72d4e5f507ba3c02bea07db7e4bc80a5af4b3d37c124ba04587887eabe25284ec41f8a787dd"], 0x8, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file2\x00', 0x80000, 0x2) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x38d00c92cff06ac5, &(0x7f0000000140)=""/170, 0x0) 22:35:19 executing program 0: r0 = perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r2, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r4 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r3, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 973.539113] overlayfs: filesystem on './file0' not supported as upperdir [ 973.598177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24940 sclass=netlink_route_socket pig=19711 comm=syz-executor.1 [ 973.693844] devpts: called with bogus options 22:35:19 executing program 4: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() timer_create(0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000fd8efc495c236c8d7faf0ac89d481e0f6783036fcb2634997cf8296d2d2cf90b34bdfbf03252"], 0x7, 0x1) waitid(0x1, r0, 0x0, 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_SET_KEEPCAPS(0x8, 0x1) syz_open_pts(0xffffffffffffffff, 0x0) r1 = socket(0x1, 0x3, 0x2) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r1, 0x1}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 22:35:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000140)={0x0, 0x1, 0x2, 0x5, 0x9}, 0xc) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, 0x0, "edda3c2b0e3d349af65b2baad9633e1048e92ec83fa5451a551d53d3707083e31c3612e13ecc863667e8d82d1352e101e511f5d78824b4a80229b1409f5177683119805d1bc8132574821ac6cebed875"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x4, 0x0, "93c1564bbaad1ad2cfa60013c433734367dafe2af8814082237963f0824ae8a890164a3f10719427bbd0ace39a251d2e37c36363307cd3b4f32494fd6c51501397fd87b6eeb8b6b5213982cb9fd3110e"}, 0xd8) dup2(r0, r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000001180)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x4004092b, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) getsockopt$bt_sco_SCO_OPTIONS(r6, 0x11, 0x1, &(0x7f0000000340)=""/201, &(0x7f00000001c0)=0xc9) 22:35:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0x800, 0x4, 0x0, 0x0, 0x4, 0x81, 0xcb40715, 0x4, 0x3de, 0x8119, 0xefaf, 0x20, 0x81, 0x3, 0x10, 0x26}}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f00000001c0)={0x10a0000, 0x1f, 0xc75, [], &(0x7f0000000180)={0x990a61, 0x0, [], @p_u32=&(0x7f0000000140)=0x3}}) fsync(r3) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007b00)=[{{&(0x7f00000026c0)=@hci, 0x80, &(0x7f0000002740)}, 0x49bf}, {{&(0x7f0000002780)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000002940)=[{0x0}, {&(0x7f0000002840)=""/143, 0x2ca}, {&(0x7f0000002900)=""/24, 0x18}], 0x3, &(0x7f0000002980)=""/97, 0x61}, 0x4}, {{&(0x7f0000002a00)=@xdp, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002a80)=""/47, 0x1d}, {&(0x7f0000002ac0)=""/250, 0xfa}, {&(0x7f0000002bc0)=""/33, 0x21}], 0x3, &(0x7f0000002c40)=""/167, 0xa7}}, {{&(0x7f0000002d00)=@x25={0x9, @remote}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002d80)=""/59, 0x3b}, {&(0x7f0000002dc0)=""/235, 0xeb}, {&(0x7f0000002ec0)=""/13, 0xd}, {&(0x7f0000002f00)=""/199, 0xc7}], 0x4}, 0x2}, {{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000003180)=""/227, 0xe3}, {&(0x7f0000003280)=""/117, 0x75}, {0x0}, {&(0x7f0000004300)=""/207, 0xcf}, {&(0x7f0000004400)}], 0x5, &(0x7f00000044c0)}, 0x3}, {{0x0, 0x0, &(0x7f0000006040)=[{&(0x7f0000005a40)=""/89, 0x59}, {&(0x7f0000005ac0)=""/223, 0xdf}, {&(0x7f0000005bc0)=""/245, 0xf5}, {0x0}, {&(0x7f0000005d40)=""/170, 0xaa}, {0x0}, {0x0}, {&(0x7f0000005f80)=""/183, 0xb7}], 0x8, &(0x7f00000060c0)=""/230, 0xe6}, 0x9}, {{0x0, 0x0, &(0x7f00000076c0)=[{&(0x7f00000061c0)=""/202, 0xca}, {0x0}, {&(0x7f0000007400)=""/20, 0x14}, {&(0x7f0000007440)=""/128, 0x80}, {&(0x7f00000074c0)=""/184, 0xb8}, {&(0x7f0000007580)=""/89, 0x59}, {&(0x7f0000007600)=""/46, 0x2e}, {&(0x7f0000007640)=""/98, 0x62}], 0x8}, 0x4}, {{&(0x7f0000007780)=@nl=@unspec, 0x80, &(0x7f0000007a00)=[{0x0}, {&(0x7f0000007980)=""/81, 0xfffffffffffffc6d}], 0x2, &(0x7f0000007a40)=""/132, 0x84}, 0xfffffffc}], 0x8, 0x2060, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x101000, 0x0) recvfrom$unix(r5, &(0x7f0000000280)=""/26, 0x1a, 0x140, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000001180), 0x0, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 22:35:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0/file0\x00') r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0/file0\x00', r2, &(0x7f0000000340)='./file0\x00', 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r3 = gettid() tkill(r3, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x3ba, r6) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r8, r7, r8}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) 22:35:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x5, 0x4, 0x80, 0x0, 0xffffffffffffffff, 0x4018, 0x89595d42bbb92408, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x32248, 0xffffffff, 0x6, 0x1, 0x5, 0x400, 0x80}, r1, 0xf, r2, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r3, 0xfffffffffffffffd) keyctl$describe(0x6, r3, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r4, 0xfffffffffffffffd) keyctl$describe(0x6, r4, 0x0, 0x0) request_key(&(0x7f00000002c0)='cifs.spnego\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='\x00', r4) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r5, 0xfffffffffffffffd) keyctl$describe(0x6, r5, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xff3c, 0xfffffffffffffffe) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 974.326437] devpts: called with bogus options 22:35:20 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r3, &(0x7f0000000000), 0x100000000000016d, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000980)=ANY=[@ANYRES32=0x0, @ANYBLOB="6c0000009d01b742c521a688f34f81bdf4c65f6df026875626a303c2f652e6fb0f4546ea0432a8446dcbd61f4c27667e50d4338d84b3965dd529d576942d2534a19e3b989c75d883a62078ef8eae8da4de499c61efb1a2d32197c0431768ec09a68ad9597efe60b4ccc553c357432fb26fcd6c93f05d956a746b23e12da5eeb125fc5eb9199492e923f48d49b1085f7df8ebf2716951f630403a73df19880e22cc398477675361d26216c298fbaf7214d680"], &(0x7f0000000680)=0x74) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000600)={0x0, 0x8000, 0x72, 0x986, 0x5, 0x7}, &(0x7f0000000640)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000800)={r7, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x7fff, 0x5, 0xffff, 0x81, 0xe0}, 0x98) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r9 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r10 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r9) r11 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r11, r10, r11}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r12 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r13 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r11, r12, r13}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r8, 0xffffffffffffffff, 0x0, 0x100000000000002) r14 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r14, 0x28007d) [ 974.538809] devpts: called with bogus options [ 974.544648] md0: error: bitmap file is already in use 22:35:20 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x6, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000004c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r3}}, 0x18) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_thread_area(&(0x7f0000000180)={0x0, 0x1f2521fe87437ff9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x20, r8, 0x439, 0x70bd25, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = open(&(0x7f0000000500)='./file0\x00', 0x40000, 0x25) ioctl$EVIOCGABS0(r9, 0x80184540, &(0x7f0000000540)=""/243) clock_settime(0x2, &(0x7f0000000100)={0x77359400}) [ 975.335502] devpts: called with bogus options [ 975.690135] net_ratelimit: 28 callbacks suppressed [ 975.690141] protocol 88fb is buggy, dev hsr_slave_0 [ 975.700217] protocol 88fb is buggy, dev hsr_slave_1 [ 975.705363] protocol 88fb is buggy, dev hsr_slave_0 [ 975.710495] protocol 88fb is buggy, dev hsr_slave_1 [ 975.715618] protocol 88fb is buggy, dev hsr_slave_0 [ 975.720742] protocol 88fb is buggy, dev hsr_slave_1 [ 975.725869] protocol 88fb is buggy, dev hsr_slave_0 [ 975.730991] protocol 88fb is buggy, dev hsr_slave_1 22:35:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x80000006}]}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfec8) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) timerfd_create(0x6, 0x0) [ 976.400162] protocol 88fb is buggy, dev hsr_slave_0 [ 976.405329] protocol 88fb is buggy, dev hsr_slave_1 22:35:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x400000) r1 = syz_open_dev$swradio(&(0x7f0000000640)='/dev/swradio#\x00', 0x1, 0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ubi_ctrl\x00', 0x30000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x0, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000008c0)={r3, 0x8, 0x30}, &(0x7f0000000900)=0xc) r4 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x6, 0x44ddb22b32c9c01d) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000200)={0x20000257, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000300)={r5, &(0x7f0000000480)=""/112}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000680)={r5, &(0x7f0000000900)=""/162}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000100)={r5, 0x2}) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:22 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f0000000600)={0x6, 0x100}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'s\xf9z'}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r5) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r6, r7}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r8 = request_key(&(0x7f0000000100)='cyfs.idmap\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000640)='\x00\x94\xea\f\xea\x1aq\f\xe7[\xe1\x8c\xd9\xd0\x17cA]\xf21\xdb\xce0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) r3 = memfd_create(&(0x7f0000000300)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x4) r4 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f00000000c0)={0x1, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) ioctl$VIDIOC_QUERY_EXT_CTRL(r4, 0xc0e85667, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f00000000c0), 0xeefffdef) socket(0x0, 0x0, 0xff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001640)={{{@in, @in=@dev}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xfffffe5d) 22:35:22 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='\x7f\x00]\a\x1b%\x8d|(\x00', 0x2, 0x0) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x3f, 0x5c913f942f881eef, 0x38000000000000, 0x9}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0)={r7, 0x0, 0x3}, &(0x7f0000000540)=0xffffffffffffffd3) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) [ 976.960673] devpts: called with bogus options 22:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x3, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, 0x0, 0xffffff73) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r7 = fcntl$dupfd(r6, 0x0, r6) fsetxattr$security_smack_entry(r5, &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='wlan0\x00', 0x6, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r7, &(0x7f0000000080)='./file0\x00') bind$bt_rfcomm(r7, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) write$P9_RXATTRWALK(r7, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r7, 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=""/38, 0x26, 0xffffffffffffffff}}, 0x10) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, 0x0, 0x0) 22:35:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = msgget(0x1, 0x0) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000001c0)=""/181) msgrcv(r3, &(0x7f0000000240)={0x0, ""/72}, 0x50, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r4, 0x12, 0x2, &(0x7f00000003c0)=""/121, &(0x7f0000000440)=0x79) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x715020) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffcc5}, 0x1, 0x0, 0x0, 0x2054}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x6}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x11, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8}]}, 0x20}}, 0x0) r10 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r10, 0x84, 0x2, &(0x7f0000000140)={0x4, 0x4, 0x800, 0x3}, 0x8) 22:35:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r1 = socket$inet(0x2, 0x88b91f227443479c, 0x2) r2 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x4c0402) tee(r1, r2, 0x6, 0x8) r3 = socket$packet(0x11, 0x3, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000000000000000000000000000c9500002c67d1ec00e98cf86589ccbf2e7844a6a76f33b602c94ed0bfc057f9fc51f18e2e7b8e73fffa503364df9ce9985357213a599f16b6ebccda06786628c7ef5905dfb81bb71f39a50ac097b749d957f29a13cc7decbccf7eb623679c8d73eed3578c54ddb3166ffdc0416e0c2359f842c23a35ee33f310d33af097cce6924220a962c4aec2586212b85ac4bd22853b4e5c288eca91225c4becef901388502301a0d91872c981b3891cce8b49539c785d8a2acfda644f72d1"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000288, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$l2tp(r4, &(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x2, 0x1, 0x1, 0x1, {0xa, 0x4e21, 0xffff5e13, @remote, 0x6}}}, 0x3a) [ 977.731751] devpts: called with bogus options 22:35:23 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x10101, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) symlinkat(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file1/file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r3, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x72800) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x1, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f0000000100)='/de\x8b#\x00', 0xc268, 0x80902) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) 22:35:23 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x1000000010, 0x400000400080803, 0x0) write(r3, &(0x7f0000000240)="240000001a0025f07e9451f68f2e9c920a0b49ffed000019806028000800100001000000", 0x24) tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$UHID_CREATE(r6, &(0x7f0000001980)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000980)=""/4096, 0x1000, 0x1f94, 0x80000001, 0x3, 0x0, 0x8}, 0x120) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r7) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r8, r9}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) 22:35:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950000000000000087ef70209729f47b69885235480c9e65c2a96609564b53cba88300201e5a6e60e4525175569b495196c71a5eb7e59a5083eb328730b211456775"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffd, 0x0, 0x0, 0x200}, 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd63) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 977.966408] devpts: called with bogus options 22:35:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000b400000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000001040)={0x0, 0x0, 0x2080}) getpid() sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xffffffa0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x6) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00', 0x10) r3 = open(&(0x7f0000000200)='./file0\x00', 0x110000141042, 0x111) ftruncate(r3, 0x10099b7) sendfile(r2, r3, 0x0, 0x88000fbfffffa) connect$unix(r2, &(0x7f0000000080)=@abs, 0x6e) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f0000000540)={0x0, 0x0, [], @bt={0x3a, 0x42, 0x2, 0x7ed, 0x1000, 0x5, 0xd, 0x6}}) 22:35:24 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x30200, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="d2c8c2dfd41d7ced33c86324edff7f4c63ae18cdcea37105f63853e063df4bf4a8a2bb3bf503f047e1ba", @ANYRES32=0x0], &(0x7f0000003800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000003a40)={r4, @in6={{0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0x11}}}, 0xfffffffffffffffd, 0x6e, 0x1, 0xea6b, 0x401}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x3f, 0x4, 0x8, 0x1f, r4}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r4, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={r4, 0x7, 0x3}, &(0x7f0000000040)=0x8) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xbf53e) syz_open_dev$usbfs(&(0x7f0000000640)='/dev/bus/usb/00#/00#\x00', 0xe, 0x0) 22:35:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x24000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000600)={0x1b7}, &(0x7f0000000200), 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x28f, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) [ 978.520288] [ 978.521962] ====================================================== [ 978.528278] WARNING: possible circular locking dependency detected [ 978.534602] 4.14.147 #0 Not tainted [ 978.538225] ------------------------------------------------------ [ 978.544547] syz-executor.3/19873 is trying to acquire lock: [ 978.550253] (&mm->mmap_sem){++++}, at: [] __might_fault+0xe0/0x1d0 [ 978.558242] [ 978.558242] but task is already holding lock: [ 978.564209] (&rp->fetch_lock){+.+.}, at: [] mon_bin_get_event+0x3c/0x430 [ 978.572711] [ 978.572711] which lock already depends on the new lock. [ 978.572711] [ 978.581034] [ 978.581034] the existing dependency chain (in reverse order) is: [ 978.588652] [ 978.588652] -> #1 (&rp->fetch_lock){+.+.}: [ 978.594378] lock_acquire+0x16f/0x430 [ 978.598701] __mutex_lock+0xe8/0x1470 [ 978.603015] mutex_lock_nested+0x16/0x20 [ 978.607589] mon_bin_vma_fault+0x6f/0x280 [ 978.612250] __do_fault+0x104/0x390 [ 978.616392] __handle_mm_fault+0xde1/0x3470 [ 978.621223] handle_mm_fault+0x293/0x7c0 [ 978.625797] __get_user_pages+0x465/0x1220 [ 978.630548] populate_vma_page_range+0x18e/0x230 [ 978.635816] __mm_populate+0x198/0x2c0 [ 978.640215] vm_mmap_pgoff+0x1be/0x1d0 [ 978.644621] SyS_mmap_pgoff+0x3ca/0x520 [ 978.649109] SyS_mmap+0x16/0x20 [ 978.653017] do_syscall_64+0x1e8/0x640 [ 978.657420] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 978.663116] [ 978.663116] -> #0 (&mm->mmap_sem){++++}: [ 978.668664] __lock_acquire+0x2cb3/0x4620 [ 978.673333] lock_acquire+0x16f/0x430 [ 978.677651] __might_fault+0x143/0x1d0 [ 978.682056] _copy_to_user+0x2c/0xd0 [ 978.686285] mon_bin_get_event+0x10a/0x430 [ 978.691030] mon_bin_ioctl+0x9b4/0xb50 [ 978.695430] do_vfs_ioctl+0x7ae/0x1060 [ 978.699833] SyS_ioctl+0x8f/0xc0 [ 978.703717] do_syscall_64+0x1e8/0x640 [ 978.708123] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 978.713823] [ 978.713823] other info that might help us debug this: [ 978.713823] [ 978.721957] Possible unsafe locking scenario: [ 978.721957] [ 978.728096] CPU0 CPU1 [ 978.732755] ---- ---- [ 978.737410] lock(&rp->fetch_lock); [ 978.741117] lock(&mm->mmap_sem); [ 978.747168] lock(&rp->fetch_lock); [ 978.753393] lock(&mm->mmap_sem); [ 978.756923] [ 978.756923] *** DEADLOCK *** [ 978.756923] [ 978.762975] 1 lock held by syz-executor.3/19873: [ 978.767718] #0: (&rp->fetch_lock){+.+.}, at: [] mon_bin_get_event+0x3c/0x430 [ 978.776652] [ 978.776652] stack backtrace: [ 978.781154] CPU: 0 PID: 19873 Comm: syz-executor.3 Not tainted 4.14.147 #0 [ 978.788162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.795979] devpts: called with bogus options [ 978.797517] Call Trace: [ 978.804590] dump_stack+0x138/0x197 [ 978.808912] ? vprintk_func+0x65/0x159 [ 978.812811] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 978.818181] __lock_acquire+0x2cb3/0x4620 [ 978.822330] ? remove_wait_queue+0x10f/0x190 [ 978.826747] ? trace_hardirqs_on+0x10/0x10 [ 978.830980] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 978.835918] lock_acquire+0x16f/0x430 [ 978.839716] ? __might_fault+0xe0/0x1d0 [ 978.843692] __might_fault+0x143/0x1d0 [ 978.847571] ? __might_fault+0xe0/0x1d0 [ 978.851539] _copy_to_user+0x2c/0xd0 [ 978.855252] mon_bin_get_event+0x10a/0x430 [ 978.859482] mon_bin_ioctl+0x9b4/0xb50 [ 978.863366] ? mon_bin_read+0x5e0/0x5e0 [ 978.867333] ? __might_sleep+0x93/0xb0 [ 978.871223] ? __fget+0x210/0x370 [ 978.874678] ? mon_bin_read+0x5e0/0x5e0 [ 978.878648] do_vfs_ioctl+0x7ae/0x1060 [ 978.882539] ? selinux_file_mprotect+0x5d0/0x5d0 [ 978.887303] ? lock_downgrade+0x740/0x740 [ 978.891095] kobject: 'loop1' (ffff8880a49e0920): kobject_uevent_env [ 978.891449] ? ioctl_preallocate+0x1c0/0x1c0 [ 978.902235] ? __fget+0x237/0x370 [ 978.904608] kobject: 'loop1' (ffff8880a49e0920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 978.905685] ? security_file_ioctl+0x89/0xb0 [ 978.905696] SyS_ioctl+0x8f/0xc0 [ 978.922880] ? do_vfs_ioctl+0x1060/0x1060 [ 978.927028] do_syscall_64+0x1e8/0x640 [ 978.930912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 978.935763] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 978.940948] RIP: 0033:0x459a59 [ 978.944130] RSP: 002b:00007f44b4df0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 978.951836] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 978.959105] RDX: 0000000020000140 RSI: 0000000040189206 RDI: 0000000000000003 22:35:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) socket$inet6(0xa, 0x80002, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000100)) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) [ 978.966376] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 978.973637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f44b4df16d4 [ 978.979679] audit: type=1400 audit(1570401324.360:1599): avc: denied { name_bind } for pid=19891 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 978.980895] R13: 00000000004c332e R14: 00000000004d6f30 R15: 00000000ffffffff 22:35:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) tkill(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000240)=""/154) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[0x1]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:35:24 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x30200, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000037c0)={0x1, [0x0]}, &(0x7f0000003800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000003a40)={r7, @in6={{0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0x11}}}, 0xfffffffffffffffd, 0x6e, 0x1, 0xea6b, 0x401}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x3f, 0x4, 0x8, 0x1f, r7}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r7, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000001c0)={r7, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000980)={r7, 0x1000, "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"}, &(0x7f0000000600)=0x1008) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571f", 0x5f, r8) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r11 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffb) r12 = request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/\x96vboxnet1!\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r10, r11, r12}, &(0x7f0000000440)=""/97, 0x61, &(0x7f00000005c0)={&(0x7f0000000500)={'crc32c\x00'}, &(0x7f0000000540)="eff41d38755c5e2e2ee0fb8fa2977a57cd139d4d35c1b2120408e278eccb24ba8e4b0b6278a4d129d024e50ae03b0373b8d111ccf08daf2161a6800dc1eda80c4ba66cde2b522b5f7db55b628f98022a9438a4c3", 0x54}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000000000002) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r13, 0x28007d) [ 979.025478] kobject: 'loop5' (ffff8880a4b40260): kobject_uevent_env [ 979.058303] kobject: 'loop5' (ffff8880a4b40260): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 979.148851] devpts: called with bogus options [ 979.183925] audit: type=1400 audit(1570401324.360:1600): avc: denied { node_bind } for pid=19891 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 979.256705] audit: type=1400 audit(1570401324.360:1601): avc: denied { name_connect } for pid=19891 comm="syz-executor.1" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 22:35:25 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = getpid() ptrace$getenv(0x4201, r1, 0x1, &(0x7f0000000000)) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = dup3(r2, r0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) [ 979.319971] kobject: 'loop1' (ffff8880a49e0920): kobject_uevent_env [ 979.337962] kobject: 'loop1' (ffff8880a49e0920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 979.443629] audit: type=1400 audit(1570401325.280:1602): avc: denied { map } for pid=19917 comm="syz-executor.1" path="/dev/dri/card0" dev="devtmpfs" ino=14254 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=1 22:35:25 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = getpid() ptrace$getenv(0x4201, r1, 0x1, &(0x7f0000000000)) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = dup3(r2, r0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) [ 979.499308] kobject: 'loop1' (ffff8880a49e0920): kobject_uevent_env [ 979.518538] kobject: 'loop1' (ffff8880a49e0920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 979.586575] kobject: 'loop0' (ffff8880523541a0): kobject_uevent_env [ 979.624807] kobject: 'loop0' (ffff8880523541a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 979.679481] kobject: 'loop1' (ffff8880a49e0920): kobject_uevent_env [ 979.704095] kobject: 'loop1' (ffff8880a49e0920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 979.876356] kobject: 'loop3' (ffff8880a4a752a0): kobject_uevent_env [ 979.885310] kobject: 'loop3' (ffff8880a4a752a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 979.920356] devpts: called with bogus options [ 979.939145] kobject: 'loop2' (ffff8880a49ed220): kobject_uevent_env [ 979.948244] kobject: 'loop2' (ffff8880a49ed220): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 979.980650] kobject: 'loop5' (ffff8880a4b40260): kobject_uevent_env [ 979.987115] kobject: 'loop5' (ffff8880a4b40260): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 980.052665] kobject: 'rx-0' (ffff8880a92ccf10): kobject_cleanup, parent ffff88809fcb7448 [ 980.061090] kobject: 'rx-0' (ffff8880a92ccf10): auto cleanup 'remove' event [ 980.068316] kobject: 'rx-0' (ffff8880a92ccf10): kobject_uevent_env [ 980.074707] kobject: 'rx-0' (ffff8880a92ccf10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.085041] kobject: 'rx-0' (ffff8880a92ccf10): auto cleanup kobject_del [ 980.092122] kobject: 'rx-0' (ffff8880a92ccf10): calling ktype release [ 980.098805] kobject: 'rx-0': free name [ 980.102755] kobject: 'tx-0' (ffff88805b4a7358): kobject_cleanup, parent ffff88809fcb7448 [ 980.111004] kobject: 'tx-0' (ffff88805b4a7358): auto cleanup 'remove' event [ 980.118088] kobject: 'tx-0' (ffff88805b4a7358): kobject_uevent_env [ 980.124435] kobject: 'tx-0' (ffff88805b4a7358): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.134533] kobject: 'tx-0' (ffff88805b4a7358): auto cleanup kobject_del [ 980.141427] kobject: 'tx-0' (ffff88805b4a7358): calling ktype release [ 980.148014] kobject: 'tx-0': free name [ 980.152187] kobject: 'queues' (ffff88809fcb7448): kobject_cleanup, parent (null) [ 980.160613] kobject: 'queues' (ffff88809fcb7448): calling ktype release [ 980.167364] kobject: 'queues' (ffff88809fcb7448): kset_release [ 980.173372] kobject: 'queues': free name [ 980.177582] kobject: 'ip6gre0' (ffff88805b4d47b0): kobject_uevent_env [ 980.184199] kobject: 'ip6gre0' (ffff88805b4d47b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.196091] kobject: 'batman_adv' (ffff888095477900): kobject_uevent_env [ 980.203020] kobject: 'batman_adv' (ffff888095477900): kobject_uevent_env: filter function caused the event to drop! [ 980.213623] kobject: 'batman_adv' (ffff888095477900): kobject_cleanup, parent (null) [ 980.222410] kobject: 'batman_adv' (ffff888095477900): calling ktype release [ 980.229584] kobject: (ffff888095477900): dynamic_kobj_release [ 980.235682] kobject: 'batman_adv': free name [ 980.240266] kobject: 'rx-0' (ffff8880a9152010): kobject_cleanup, parent ffff88809fb64c48 [ 980.248485] kobject: 'rx-0' (ffff8880a9152010): auto cleanup 'remove' event [ 980.255609] kobject: 'rx-0' (ffff8880a9152010): kobject_uevent_env [ 980.262052] kobject: 'rx-0' (ffff8880a9152010): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.272149] kobject: 'rx-0' (ffff8880a9152010): auto cleanup kobject_del [ 980.279004] kobject: 'rx-0' (ffff8880a9152010): calling ktype release [ 980.286013] kobject: 'rx-0': free name [ 980.289953] kobject: 'tx-0' (ffff8880986125d8): kobject_cleanup, parent ffff88809fb64c48 [ 980.298336] kobject: 'tx-0' (ffff8880986125d8): auto cleanup 'remove' event [ 980.305525] kobject: 'tx-0' (ffff8880986125d8): kobject_uevent_env [ 980.311868] kobject: 'tx-0' (ffff8880986125d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.321961] kobject: 'tx-0' (ffff8880986125d8): auto cleanup kobject_del [ 980.328898] kobject: 'tx-0' (ffff8880986125d8): calling ktype release [ 980.335502] kobject: 'tx-0': free name [ 980.339409] kobject: 'queues' (ffff88809fb64c48): kobject_cleanup, parent (null) [ 980.347938] kobject: 'queues' (ffff88809fb64c48): calling ktype release [ 980.354719] kobject: 'queues' (ffff88809fb64c48): kset_release [ 980.360818] kobject: 'queues': free name [ 980.365033] kobject: 'ip6gretap0' (ffff88805b71ed70): kobject_uevent_env [ 980.371894] kobject: 'ip6gretap0' (ffff88805b71ed70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.382655] kobject: 'ip6gre0' (ffff88805b4d47b0): kobject_cleanup, parent (null) [ 980.391188] kobject: 'ip6gre0' (ffff88805b4d47b0): calling ktype release [ 980.398067] kobject: 'ip6gre0': free name [ 980.402381] kobject: 'ip6gretap0' (ffff88805b71ed70): kobject_cleanup, parent (null) [ 980.411262] kobject: 'ip6gretap0' (ffff88805b71ed70): calling ktype release [ 980.418444] kobject: 'ip6gretap0': free name [ 980.424837] kobject: 'rx-0' (ffff8880a92cca90): kobject_cleanup, parent ffff88809fcb7748 [ 980.433258] kobject: 'rx-0' (ffff8880a92cca90): auto cleanup 'remove' event [ 980.440623] kobject: 'rx-0' (ffff8880a92cca90): kobject_uevent_env [ 980.446935] kobject: 'rx-0' (ffff8880a92cca90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.457016] kobject: 'rx-0' (ffff8880a92cca90): auto cleanup kobject_del [ 980.463895] kobject: 'rx-0' (ffff8880a92cca90): calling ktype release [ 980.470789] kobject: 'rx-0': free name [ 980.474694] kobject: 'tx-0' (ffff88805bbddd18): kobject_cleanup, parent ffff88809fcb7748 [ 980.483321] kobject: 'tx-0' (ffff88805bbddd18): auto cleanup 'remove' event [ 980.491229] kobject: 'tx-0' (ffff88805bbddd18): kobject_uevent_env [ 980.497545] kobject: 'tx-0' (ffff88805bbddd18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.509617] kobject: 'tx-0' (ffff88805bbddd18): auto cleanup kobject_del [ 980.516525] kobject: 'tx-0' (ffff88805bbddd18): calling ktype release [ 980.523140] kobject: 'tx-0': free name [ 980.527040] kobject: 'queues' (ffff88809fcb7748): kobject_cleanup, parent (null) [ 980.535465] kobject: 'queues' (ffff88809fcb7748): calling ktype release [ 980.542254] kobject: 'queues' (ffff88809fcb7748): kset_release [ 980.548303] kobject: 'queues': free name [ 980.552578] kobject: 'ip6tnl0' (ffff88805b4912b0): kobject_uevent_env [ 980.560109] kobject: 'ip6tnl0' (ffff88805b4912b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.570680] kobject: 'ip6tnl0' (ffff88805b4912b0): kobject_cleanup, parent (null) [ 980.579272] kobject: 'ip6tnl0' (ffff88805b4912b0): calling ktype release [ 980.586172] kobject: 'ip6tnl0': free name [ 980.591459] kobject: 'rx-0' (ffff8880a92ccc10): kobject_cleanup, parent ffff88809fcb7d48 [ 980.599951] kobject: 'rx-0' (ffff8880a92ccc10): auto cleanup 'remove' event [ 980.607077] kobject: 'rx-0' (ffff8880a92ccc10): kobject_uevent_env [ 980.615323] kobject: 'rx-0' (ffff8880a92ccc10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.625391] kobject: 'rx-0' (ffff8880a92ccc10): auto cleanup kobject_del [ 980.632452] kobject: 'rx-0' (ffff8880a92ccc10): calling ktype release [ 980.639020] kobject: 'rx-0': free name [ 980.643299] kobject: 'tx-0' (ffff88805bbd5d58): kobject_cleanup, parent ffff88809fcb7d48 [ 980.651529] kobject: 'tx-0' (ffff88805bbd5d58): auto cleanup 'remove' event [ 980.658827] kobject: 'tx-0' (ffff88805bbd5d58): kobject_uevent_env [ 980.665551] kobject: 'tx-0' (ffff88805bbd5d58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.675714] kobject: 'tx-0' (ffff88805bbd5d58): auto cleanup kobject_del [ 980.682611] kobject: 'tx-0' (ffff88805bbd5d58): calling ktype release [ 980.689221] kobject: 'tx-0': free name [ 980.693196] kobject: 'queues' (ffff88809fcb7d48): kobject_cleanup, parent (null) [ 980.701616] kobject: 'queues' (ffff88809fcb7d48): calling ktype release [ 980.708562] kobject: 'queues' (ffff88809fcb7d48): kset_release [ 980.714558] kobject: 'queues': free name [ 980.718783] kobject: 'sit0' (ffff88805b479070): kobject_uevent_env [ 980.725146] kobject: 'sit0' (ffff88805b479070): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.735850] kobject: 'rx-0' (ffff88807d81d9d0): kobject_cleanup, parent ffff88805a673d48 [ 980.744132] kobject: 'rx-0' (ffff88807d81d9d0): auto cleanup 'remove' event [ 980.751253] kobject: 'rx-0' (ffff88807d81d9d0): kobject_uevent_env [ 980.757546] kobject: 'rx-0' (ffff88807d81d9d0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.767637] kobject: 'rx-0' (ffff88807d81d9d0): auto cleanup kobject_del [ 980.774609] kobject: 'rx-0' (ffff88807d81d9d0): calling ktype release [ 980.781212] kobject: 'rx-0': free name [ 980.785112] kobject: 'tx-0' (ffff8880969a2798): kobject_cleanup, parent ffff88805a673d48 [ 980.793351] kobject: 'tx-0' (ffff8880969a2798): auto cleanup 'remove' event [ 980.800465] kobject: 'tx-0' (ffff8880969a2798): kobject_uevent_env [ 980.806768] kobject: 'tx-0' (ffff8880969a2798): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.816845] kobject: 'tx-0' (ffff8880969a2798): auto cleanup kobject_del [ 980.823711] kobject: 'tx-0' (ffff8880969a2798): calling ktype release [ 980.830300] kobject: 'tx-0': free name [ 980.834199] kobject: 'queues' (ffff88805a673d48): kobject_cleanup, parent (null) [ 980.842609] kobject: 'queues' (ffff88805a673d48): calling ktype release [ 980.849360] kobject: 'queues' (ffff88805a673d48): kset_release [ 980.855341] kobject: 'queues': free name [ 980.859563] kobject: 'sit1' (ffff888084e98d70): kobject_uevent_env [ 980.865904] kobject: 'sit1' (ffff888084e98d70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.890236] kobject: 'sit0' (ffff88805b479070): kobject_cleanup, parent (null) [ 980.898487] kobject: 'sit0' (ffff88805b479070): calling ktype release [ 980.906721] kobject: 'sit0': free name [ 980.910775] kobject: 'sit1' (ffff888084e98d70): kobject_cleanup, parent (null) [ 980.918980] kobject: 'sit1' (ffff888084e98d70): calling ktype release [ 980.927208] kobject: 'sit1': free name [ 980.932590] kobject: 'rx-0' (ffff8880a8f0e010): kobject_cleanup, parent ffff88809fcbe048 [ 980.942480] kobject: 'rx-0' (ffff8880a8f0e010): auto cleanup 'remove' event [ 980.949602] kobject: 'rx-0' (ffff8880a8f0e010): kobject_uevent_env [ 980.955962] kobject: 'rx-0' (ffff8880a8f0e010): kobject_uevent_env: uevent_suppress caused the event to drop! [ 980.966086] kobject: 'rx-0' (ffff8880a8f0e010): auto cleanup kobject_del [ 980.973220] kobject: 'rx-0' (ffff8880a8f0e010): calling ktype release [ 980.979801] kobject: 'rx-0': free name [ 980.983755] kobject: 'tx-0' (ffff88805bbc6518): kobject_cleanup, parent ffff88809fcbe048 [ 980.992009] kobject: 'tx-0' (ffff88805bbc6518): auto cleanup 'remove' event [ 980.999100] kobject: 'tx-0' (ffff88805bbc6518): kobject_uevent_env [ 981.005465] kobject: 'tx-0' (ffff88805bbc6518): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.016343] kobject: 'tx-0' (ffff88805bbc6518): auto cleanup kobject_del [ 981.023278] kobject: 'tx-0' (ffff88805bbc6518): calling ktype release [ 981.029852] kobject: 'tx-0': free name [ 981.033787] kobject: 'queues' (ffff88809fcbe048): kobject_cleanup, parent (null) [ 981.042811] kobject: 'queues' (ffff88809fcbe048): calling ktype release [ 981.050126] net_ratelimit: 28 callbacks suppressed [ 981.050130] protocol 88fb is buggy, dev hsr_slave_0 [ 981.050598] kobject: 'queues' (ffff88809fcbe048): kset_release [ 981.055512] protocol 88fb is buggy, dev hsr_slave_1 [ 981.060499] kobject: 'queues': free name [ 981.066510] protocol 88fb is buggy, dev hsr_slave_0 [ 981.071694] kobject: 'ip6_vti0' (ffff88805bbfa670): kobject_uevent_env [ 981.075528] protocol 88fb is buggy, dev hsr_slave_1 [ 981.080515] kobject: 'ip6_vti0' (ffff88805bbfa670): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.150293] kobject: 'ip6_vti0' (ffff88805bbfa670): kobject_cleanup, parent (null) [ 981.158903] kobject: 'ip6_vti0' (ffff88805bbfa670): calling ktype release [ 981.165904] kobject: 'ip6_vti0': free name [ 981.171540] kobject: 'rx-0' (ffff8880a8f0e310): kobject_cleanup, parent ffff88809fcbec48 [ 981.179772] kobject: 'rx-0' (ffff8880a8f0e310): auto cleanup 'remove' event [ 981.186903] kobject: 'rx-0' (ffff8880a8f0e310): kobject_uevent_env [ 981.193278] kobject: 'rx-0' (ffff8880a8f0e310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.204486] kobject: 'rx-0' (ffff8880a8f0e310): auto cleanup kobject_del [ 981.211772] kobject: 'rx-0' (ffff8880a8f0e310): calling ktype release [ 981.218684] kobject: 'rx-0': free name [ 981.222649] kobject: 'tx-0' (ffff88805bfae7d8): kobject_cleanup, parent ffff88809fcbec48 [ 981.230930] kobject: 'tx-0' (ffff88805bfae7d8): auto cleanup 'remove' event [ 981.238062] kobject: 'tx-0' (ffff88805bfae7d8): kobject_uevent_env [ 981.244436] kobject: 'tx-0' (ffff88805bfae7d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.254528] kobject: 'tx-0' (ffff88805bfae7d8): auto cleanup kobject_del [ 981.261414] kobject: 'tx-0' (ffff88805bfae7d8): calling ktype release [ 981.267985] kobject: 'tx-0': free name [ 981.271931] kobject: 'queues' (ffff88809fcbec48): kobject_cleanup, parent (null) [ 981.280396] kobject: 'queues' (ffff88809fcbec48): calling ktype release [ 981.287136] kobject: 'queues' (ffff88809fcbec48): kset_release [ 981.293133] kobject: 'queues': free name [ 981.297377] kobject: 'ip_vti0' (ffff88805bbbf270): kobject_uevent_env [ 981.303999] kobject: 'ip_vti0' (ffff88805bbbf270): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.315013] kobject: 'rx-0' (ffff88807fe67910): kobject_cleanup, parent ffff8880825ade48 [ 981.323275] kobject: 'rx-0' (ffff88807fe67910): auto cleanup 'remove' event [ 981.330408] kobject: 'rx-0' (ffff88807fe67910): kobject_uevent_env [ 981.336704] kobject: 'rx-0' (ffff88807fe67910): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.347052] kobject: 'rx-0' (ffff88807fe67910): auto cleanup kobject_del [ 981.354035] kobject: 'rx-0' (ffff88807fe67910): calling ktype release [ 981.360632] kobject: 'rx-0': free name [ 981.364531] kobject: 'tx-0' (ffff888078dc9358): kobject_cleanup, parent ffff8880825ade48 [ 981.372792] kobject: 'tx-0' (ffff888078dc9358): auto cleanup 'remove' event [ 981.379875] kobject: 'tx-0' (ffff888078dc9358): kobject_uevent_env [ 981.386289] kobject: 'tx-0' (ffff888078dc9358): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.396546] kobject: 'tx-0' (ffff888078dc9358): auto cleanup kobject_del [ 981.403447] kobject: 'tx-0' (ffff888078dc9358): calling ktype release [ 981.410064] kobject: 'tx-0': free name [ 981.413951] kobject: 'queues' (ffff8880825ade48): kobject_cleanup, parent (null) [ 981.422362] kobject: 'queues' (ffff8880825ade48): calling ktype release [ 981.429105] kobject: 'queues' (ffff8880825ade48): kset_release [ 981.435094] kobject: 'queues': free name [ 981.439314] kobject: 'vti0' (ffff88809e038fb0): kobject_uevent_env [ 981.445743] kobject: 'vti0' (ffff88809e038fb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.490327] kobject: 'ip_vti0' (ffff88805bbbf270): kobject_cleanup, parent (null) [ 981.498839] kobject: 'ip_vti0' (ffff88805bbbf270): calling ktype release [ 981.507453] kobject: 'ip_vti0': free name [ 981.511748] kobject: 'vti0' (ffff88809e038fb0): kobject_cleanup, parent (null) [ 981.519952] kobject: 'vti0' (ffff88809e038fb0): calling ktype release [ 981.528213] kobject: 'vti0': free name [ 981.533671] kobject: 'batman_adv' (ffff888099863d00): kobject_uevent_env [ 981.540594] kobject: 'batman_adv' (ffff888099863d00): kobject_uevent_env: filter function caused the event to drop! [ 981.551223] kobject: 'batman_adv' (ffff888099863d00): kobject_cleanup, parent (null) [ 981.559949] kobject: 'batman_adv' (ffff888099863d00): calling ktype release [ 981.567067] kobject: (ffff888099863d00): dynamic_kobj_release [ 981.573226] kobject: 'batman_adv': free name [ 981.577722] kobject: 'rx-0' (ffff8880a6e3dd90): kobject_cleanup, parent ffff88809ffff948 [ 981.585964] kobject: 'rx-0' (ffff8880a6e3dd90): auto cleanup 'remove' event [ 981.593144] kobject: 'rx-0' (ffff8880a6e3dd90): kobject_uevent_env [ 981.599466] kobject: 'rx-0' (ffff8880a6e3dd90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.610099] kobject: 'rx-0' (ffff8880a6e3dd90): auto cleanup kobject_del [ 981.616968] kobject: 'rx-0' (ffff8880a6e3dd90): calling ktype release [ 981.623605] kobject: 'rx-0': free name [ 981.627497] kobject: 'tx-0' (ffff888096466d58): kobject_cleanup, parent ffff88809ffff948 [ 981.635847] kobject: 'tx-0' (ffff888096466d58): auto cleanup 'remove' event [ 981.642976] kobject: 'tx-0' (ffff888096466d58): kobject_uevent_env [ 981.649269] kobject: 'tx-0' (ffff888096466d58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.659436] kobject: 'tx-0' (ffff888096466d58): auto cleanup kobject_del [ 981.666312] kobject: 'tx-0' (ffff888096466d58): calling ktype release [ 981.672896] kobject: 'tx-0': free name [ 981.676794] kobject: 'queues' (ffff88809ffff948): kobject_cleanup, parent (null) [ 981.685237] kobject: 'queues' (ffff88809ffff948): calling ktype release [ 981.692002] kobject: 'queues' (ffff88809ffff948): kset_release [ 981.697962] kobject: 'queues': free name [ 981.702289] kobject: 'erspan0' (ffff88805bb70a70): kobject_uevent_env [ 981.708857] kobject: 'erspan0' (ffff88805bb70a70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.740644] kobject: 'erspan0' (ffff88805bb70a70): kobject_cleanup, parent (null) [ 981.749274] kobject: 'erspan0' (ffff88805bb70a70): calling ktype release [ 981.756192] kobject: 'erspan0': free name [ 981.761882] kobject: 'batman_adv' (ffff888099863180): kobject_uevent_env [ 981.768760] kobject: 'batman_adv' (ffff888099863180): kobject_uevent_env: filter function caused the event to drop! [ 981.779422] kobject: 'batman_adv' (ffff888099863180): kobject_cleanup, parent (null) [ 981.788218] kobject: 'batman_adv' (ffff888099863180): calling ktype release [ 981.795371] kobject: (ffff888099863180): dynamic_kobj_release [ 981.801590] kobject: 'batman_adv': free name [ 981.806091] kobject: 'rx-0' (ffff8880a6e3db50): kobject_cleanup, parent ffff8880a04f6248 [ 981.814373] kobject: 'rx-0' (ffff8880a6e3db50): auto cleanup 'remove' event [ 981.821495] kobject: 'rx-0' (ffff8880a6e3db50): kobject_uevent_env [ 981.827800] kobject: 'rx-0' (ffff8880a6e3db50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.837938] kobject: 'rx-0' (ffff8880a6e3db50): auto cleanup kobject_del [ 981.844834] kobject: 'rx-0' (ffff8880a6e3db50): calling ktype release [ 981.851670] kobject: 'rx-0': free name [ 981.855582] kobject: 'tx-0' (ffff88807babbc98): kobject_cleanup, parent ffff8880a04f6248 [ 981.863831] kobject: 'tx-0' (ffff88807babbc98): auto cleanup 'remove' event [ 981.871129] kobject: 'tx-0' (ffff88807babbc98): kobject_uevent_env [ 981.877447] kobject: 'tx-0' (ffff88807babbc98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.887508] kobject: 'tx-0' (ffff88807babbc98): auto cleanup kobject_del [ 981.894396] kobject: 'tx-0' (ffff88807babbc98): calling ktype release [ 981.901088] kobject: 'tx-0': free name [ 981.904972] kobject: 'queues' (ffff8880a04f6248): kobject_cleanup, parent (null) [ 981.913396] kobject: 'queues' (ffff8880a04f6248): calling ktype release [ 981.920174] kobject: 'queues' (ffff8880a04f6248): kset_release [ 981.926145] kobject: 'queues': free name [ 981.930109] protocol 88fb is buggy, dev hsr_slave_0 [ 981.930501] kobject: 'gretap0' (ffff88805bb5c870): kobject_uevent_env [ 981.935247] protocol 88fb is buggy, dev hsr_slave_1 [ 981.941885] kobject: 'gretap0' (ffff88805bb5c870): kobject_uevent_env: uevent_suppress caused the event to drop! [ 981.947018] protocol 88fb is buggy, dev hsr_slave_0 [ 981.962352] protocol 88fb is buggy, dev hsr_slave_1 [ 981.967415] protocol 88fb is buggy, dev hsr_slave_0 [ 981.972445] protocol 88fb is buggy, dev hsr_slave_1 [ 982.000319] kobject: 'gretap0' (ffff88805bb5c870): kobject_cleanup, parent (null) [ 982.008854] kobject: 'gretap0' (ffff88805bb5c870): calling ktype release [ 982.015804] kobject: 'gretap0': free name [ 982.021389] kobject: 'rx-0' (ffff8880a4c38a90): kobject_cleanup, parent ffff88809fe4e548 [ 982.029634] kobject: 'rx-0' (ffff8880a4c38a90): auto cleanup 'remove' event [ 982.036781] kobject: 'rx-0' (ffff8880a4c38a90): kobject_uevent_env [ 982.043127] kobject: 'rx-0' (ffff8880a4c38a90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.053889] kobject: 'rx-0' (ffff8880a4c38a90): auto cleanup kobject_del [ 982.060759] kobject: 'rx-0' (ffff8880a4c38a90): calling ktype release [ 982.067335] kobject: 'rx-0': free name [ 982.071268] kobject: 'tx-0' (ffff888097970818): kobject_cleanup, parent ffff88809fe4e548 [ 982.079552] kobject: 'tx-0' (ffff888097970818): auto cleanup 'remove' event [ 982.087916] kobject: 'tx-0' (ffff888097970818): kobject_uevent_env [ 982.094302] kobject: 'tx-0' (ffff888097970818): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.104412] kobject: 'tx-0' (ffff888097970818): auto cleanup kobject_del [ 982.111317] kobject: 'tx-0' (ffff888097970818): calling ktype release [ 982.117886] kobject: 'tx-0': free name [ 982.121834] kobject: 'queues' (ffff88809fe4e548): kobject_cleanup, parent (null) [ 982.130274] kobject: 'queues' (ffff88809fe4e548): calling ktype release [ 982.137183] kobject: 'queues' (ffff88809fe4e548): kset_release [ 982.143194] kobject: 'queues': free name [ 982.147429] kobject: 'gre0' (ffff88805badcbf0): kobject_uevent_env [ 982.153775] kobject: 'gre0' (ffff88805badcbf0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.180230] kobject: 'gre0' (ffff88805badcbf0): kobject_cleanup, parent (null) [ 982.188596] kobject: 'gre0' (ffff88805badcbf0): calling ktype release [ 982.196868] kobject: 'gre0': free name [ 982.202316] kobject: 'rx-0' (ffff8880a6e3dcd0): kobject_cleanup, parent ffff8880a0464448 [ 982.212274] kobject: 'rx-0' (ffff8880a6e3dcd0): auto cleanup 'remove' event [ 982.219371] kobject: 'rx-0' (ffff8880a6e3dcd0): kobject_uevent_env [ 982.225728] kobject: 'rx-0' (ffff8880a6e3dcd0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.235853] kobject: 'rx-0' (ffff8880a6e3dcd0): auto cleanup kobject_del [ 982.243421] kobject: 'rx-0' (ffff8880a6e3dcd0): calling ktype release [ 982.249994] kobject: 'rx-0': free name [ 982.253950] kobject: 'tx-0' (ffff88809f5d5058): kobject_cleanup, parent ffff8880a0464448 [ 982.262201] kobject: 'tx-0' (ffff88809f5d5058): auto cleanup 'remove' event [ 982.269306] kobject: 'tx-0' (ffff88809f5d5058): kobject_uevent_env [ 982.275650] kobject: 'tx-0' (ffff88809f5d5058): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.285992] kobject: 'tx-0' (ffff88809f5d5058): auto cleanup kobject_del [ 982.292880] kobject: 'tx-0' (ffff88809f5d5058): calling ktype release [ 982.299457] kobject: 'tx-0': free name [ 982.303407] kobject: 'queues' (ffff8880a0464448): kobject_cleanup, parent (null) [ 982.311819] kobject: 'queues' (ffff8880a0464448): calling ktype release [ 982.318552] kobject: 'queues' (ffff8880a0464448): kset_release [ 982.324548] kobject: 'queues': free name [ 982.328769] kobject: 'tunl0' (ffff88805ba44f30): kobject_uevent_env [ 982.335199] kobject: 'tunl0' (ffff88805ba44f30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.360201] kobject: 'tunl0' (ffff88805ba44f30): kobject_cleanup, parent (null) [ 982.368544] kobject: 'tunl0' (ffff88805ba44f30): calling ktype release [ 982.375392] kobject: 'tunl0': free name [ 982.410320] kobject: 'brif' (ffff8880a151ab00): kobject_cleanup, parent ffff888053cee3b0 [ 982.418587] kobject: 'brif' (ffff8880a151ab00): auto cleanup kobject_del [ 982.425504] kobject: 'brif' (ffff8880a151ab00): calling ktype release [ 982.432103] kobject: (ffff8880a151ab00): dynamic_kobj_release [ 982.437980] kobject: 'brif': free name [ 982.442160] kobject: 'mesh' (ffff8880a84ee480): kobject_uevent_env [ 982.448475] kobject: 'mesh' (ffff8880a84ee480): kobject_uevent_env: filter function caused the event to drop! [ 982.458624] device bridge_slave_1 left promiscuous mode [ 982.464118] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.510607] kobject: 'brport' (ffff88807866d350): kobject_uevent_env [ 982.517174] kobject: 'brport' (ffff88807866d350): kobject_uevent_env: filter function caused the event to drop! [ 982.527792] device bridge_slave_0 left promiscuous mode [ 982.533259] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.570133] kobject: 'brport' (ffff88807866d350): kobject_cleanup, parent (null) [ 982.579353] kobject: 'brport' (ffff88807866d350): calling ktype release [ 982.586161] kobject: 'brport': free name [ 982.590815] kobject: 'brport' (ffff8880a5060a50): kobject_uevent_env [ 982.597312] kobject: 'brport' (ffff8880a5060a50): kobject_uevent_env: filter function caused the event to drop! [ 982.607767] kobject: 'brif' (ffff8880a5576d00): kobject_cleanup, parent ffff88805b7562b0 [ 982.616144] kobject: 'brif' (ffff8880a5576d00): auto cleanup kobject_del [ 982.623023] kobject: 'brif' (ffff8880a5576d00): calling ktype release [ 982.629596] kobject: (ffff8880a5576d00): dynamic_kobj_release [ 982.635533] kobject: 'brif': free name [ 982.649156] kobject: 'vlan0' (ffff88809f431c00): kobject_uevent_env [ 982.655625] kobject: 'brport' (ffff8880a5060a50): kobject_cleanup, parent (null) [ 982.655628] kobject: 'brport' (ffff8880a5060a50): calling ktype release [ 982.655635] kobject: 'brport': free name [ 982.675053] kobject: 'vlan0' (ffff88809f431c00): kobject_uevent_env: attempted to send uevent without kset! [ 982.685580] kobject: 'mesh' (ffff8880a84ee480): kobject_cleanup, parent (null) [ 982.695074] kobject: 'mesh' (ffff8880a84ee480): calling ktype release [ 982.701687] kobject: (ffff8880a84ee480): dynamic_kobj_release [ 982.707567] kobject: 'mesh': free name [ 982.711585] kobject: 'vlan0' (ffff88809f431c00): kobject_cleanup, parent (null) [ 982.719899] kobject: 'vlan0' (ffff88809f431c00): calling ktype release [ 982.726728] kobject: (ffff88809f431c00): dynamic_kobj_release [ 982.732898] kobject: 'vlan0': free name [ 982.742676] kobject: 'batman_adv' (ffff8880978f5b00): kobject_uevent_env [ 982.749528] kobject: 'batman_adv' (ffff8880978f5b00): kobject_uevent_env: filter function caused the event to drop! [ 982.760160] kobject: 'batman_adv' (ffff8880978f5b00): kobject_cleanup, parent (null) [ 982.768896] kobject: 'batman_adv' (ffff8880978f5b00): calling ktype release [ 982.776013] kobject: (ffff8880978f5b00): dynamic_kobj_release [ 982.781923] kobject: 'batman_adv': free name [ 982.786426] kobject: 'rx-0' (ffff88807e6be490): kobject_cleanup, parent ffff8880a0fc3d48 [ 982.795630] kobject: 'rx-0' (ffff88807e6be490): auto cleanup 'remove' event [ 982.803012] kobject: 'rx-0' (ffff88807e6be490): kobject_uevent_env [ 982.809332] kobject: 'rx-0' (ffff88807e6be490): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.819630] kobject: 'rx-0' (ffff88807e6be490): auto cleanup kobject_del [ 982.826559] kobject: 'rx-0' (ffff88807e6be490): calling ktype release [ 982.833170] kobject: 'rx-0': free name [ 982.837080] kobject: 'tx-0' (ffff888084d41a18): kobject_cleanup, parent ffff8880a0fc3d48 [ 982.845344] kobject: 'tx-0' (ffff888084d41a18): auto cleanup 'remove' event [ 982.852485] kobject: 'tx-0' (ffff888084d41a18): kobject_uevent_env [ 982.858787] kobject: 'tx-0' (ffff888084d41a18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.868854] kobject: 'tx-0' (ffff888084d41a18): auto cleanup kobject_del [ 982.875731] kobject: 'tx-0' (ffff888084d41a18): calling ktype release [ 982.882655] kobject: 'tx-0': free name [ 982.886564] kobject: 'queues' (ffff8880a0fc3d48): kobject_cleanup, parent (null) [ 982.894997] kobject: 'queues' (ffff8880a0fc3d48): calling ktype release [ 982.901777] kobject: 'queues' (ffff8880a0fc3d48): kset_release [ 982.907729] kobject: 'queues': free name [ 982.912066] kobject: 'veth11' (ffff88808246ca30): kobject_uevent_env [ 982.918559] kobject: 'veth11' (ffff88808246ca30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 982.929416] kobject: 'batman_adv' (ffff888096d84300): kobject_uevent_env [ 982.936484] kobject: 'batman_adv' (ffff888096d84300): kobject_uevent_env: filter function caused the event to drop! [ 982.947123] kobject: 'batman_adv' (ffff888096d84300): kobject_cleanup, parent (null) [ 982.955982] kobject: 'batman_adv' (ffff888096d84300): calling ktype release [ 982.963269] kobject: (ffff888096d84300): dynamic_kobj_release [ 982.969159] kobject: 'batman_adv': free name [ 982.973720] kobject: 'rx-0' (ffff8880a9963850): kobject_cleanup, parent ffff88805a5c2948 [ 982.982069] kobject: 'rx-0' (ffff8880a9963850): auto cleanup 'remove' event [ 982.989159] kobject: 'rx-0' (ffff8880a9963850): kobject_uevent_env [ 982.995605] kobject: 'rx-0' (ffff8880a9963850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.005688] kobject: 'rx-0' (ffff8880a9963850): auto cleanup kobject_del [ 983.012561] kobject: 'rx-0' (ffff8880a9963850): calling ktype release [ 983.019139] kobject: 'rx-0': free name [ 983.023120] kobject: 'tx-0' (ffff88808f94d018): kobject_cleanup, parent ffff88805a5c2948 [ 983.031381] kobject: 'tx-0' (ffff88808f94d018): auto cleanup 'remove' event [ 983.038466] kobject: 'tx-0' (ffff88808f94d018): kobject_uevent_env [ 983.044806] kobject: 'tx-0' (ffff88808f94d018): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.054895] kobject: 'tx-0' (ffff88808f94d018): auto cleanup kobject_del [ 983.062072] kobject: 'tx-0' (ffff88808f94d018): calling ktype release [ 983.068642] kobject: 'tx-0': free name [ 983.072567] kobject: 'queues' (ffff88805a5c2948): kobject_cleanup, parent (null) [ 983.081283] kobject: 'queues' (ffff88805a5c2948): calling ktype release [ 983.088017] kobject: 'queues' (ffff88805a5c2948): kset_release [ 983.094022] kobject: 'queues': free name [ 983.098282] kobject: 'veth10' (ffff888054ee33f0): kobject_uevent_env [ 983.104819] kobject: 'veth10' (ffff888054ee33f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.115643] kobject: 'batman_adv' (ffff88808c255e00): kobject_uevent_env [ 983.122841] kobject: 'batman_adv' (ffff88808c255e00): kobject_uevent_env: filter function caused the event to drop! [ 983.133489] kobject: 'batman_adv' (ffff88808c255e00): kobject_cleanup, parent (null) [ 983.142278] kobject: 'batman_adv' (ffff88808c255e00): calling ktype release [ 983.149366] kobject: (ffff88808c255e00): dynamic_kobj_release [ 983.155458] kobject: 'batman_adv': free name [ 983.159989] kobject: 'rx-0' (ffff8880904ccc10): kobject_cleanup, parent ffff88809049e748 [ 983.168420] kobject: 'rx-0' (ffff8880904ccc10): auto cleanup 'remove' event [ 983.175566] kobject: 'rx-0' (ffff8880904ccc10): kobject_uevent_env [ 983.181896] kobject: 'rx-0' (ffff8880904ccc10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.192240] kobject: 'rx-0' (ffff8880904ccc10): auto cleanup kobject_del [ 983.199079] kobject: 'rx-0' (ffff8880904ccc10): calling ktype release [ 983.205914] kobject: 'rx-0': free name [ 983.209820] kobject: 'tx-0' (ffff8880a8cfa7d8): kobject_cleanup, parent ffff88809049e748 [ 983.218082] kobject: 'tx-0' (ffff8880a8cfa7d8): auto cleanup 'remove' event [ 983.225213] kobject: 'tx-0' (ffff8880a8cfa7d8): kobject_uevent_env [ 983.231972] kobject: 'tx-0' (ffff8880a8cfa7d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.242043] kobject: 'tx-0' (ffff8880a8cfa7d8): auto cleanup kobject_del [ 983.248882] kobject: 'tx-0' (ffff8880a8cfa7d8): calling ktype release [ 983.255468] kobject: 'tx-0': free name [ 983.259353] kobject: 'queues' (ffff88809049e748): kobject_cleanup, parent (null) [ 983.267773] kobject: 'queues' (ffff88809049e748): calling ktype release [ 983.274554] kobject: 'queues' (ffff88809049e748): kset_release [ 983.280547] kobject: 'queues': free name [ 983.284761] kobject: 'veth9' (ffff888053e1efb0): kobject_uevent_env [ 983.291300] kobject: 'veth9' (ffff888053e1efb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.302115] kobject: 'batman_adv' (ffff88809455d900): kobject_uevent_env [ 983.308957] kobject: 'batman_adv' (ffff88809455d900): kobject_uevent_env: filter function caused the event to drop! [ 983.320460] kobject: 'batman_adv' (ffff88809455d900): kobject_cleanup, parent (null) [ 983.329211] kobject: 'batman_adv' (ffff88809455d900): calling ktype release [ 983.336348] kobject: (ffff88809455d900): dynamic_kobj_release [ 983.342260] kobject: 'batman_adv': free name [ 983.346771] kobject: 'rx-0' (ffff888091352f10): kobject_cleanup, parent ffff8880a1ac4a48 [ 983.355148] kobject: 'rx-0' (ffff888091352f10): auto cleanup 'remove' event [ 983.362283] kobject: 'rx-0' (ffff888091352f10): kobject_uevent_env [ 983.368590] kobject: 'rx-0' (ffff888091352f10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.378658] kobject: 'rx-0' (ffff888091352f10): auto cleanup kobject_del [ 983.385547] kobject: 'rx-0' (ffff888091352f10): calling ktype release [ 983.392215] kobject: 'rx-0': free name [ 983.396140] kobject: 'tx-0' (ffff8880947cec98): kobject_cleanup, parent ffff8880a1ac4a48 [ 983.404396] kobject: 'tx-0' (ffff8880947cec98): auto cleanup 'remove' event [ 983.411509] kobject: 'tx-0' (ffff8880947cec98): kobject_uevent_env [ 983.417812] kobject: 'tx-0' (ffff8880947cec98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.427875] kobject: 'tx-0' (ffff8880947cec98): auto cleanup kobject_del [ 983.434757] kobject: 'tx-0' (ffff8880947cec98): calling ktype release [ 983.441367] kobject: 'tx-0': free name [ 983.445257] kobject: 'queues' (ffff8880a1ac4a48): kobject_cleanup, parent (null) [ 983.453947] kobject: 'queues' (ffff8880a1ac4a48): calling ktype release [ 983.460734] kobject: 'queues' (ffff8880a1ac4a48): kset_release [ 983.466695] kobject: 'queues': free name [ 983.471037] kobject: 'veth8' (ffff8880a909af70): kobject_uevent_env [ 983.477437] kobject: 'veth8' (ffff8880a909af70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.488156] kobject: 'batman_adv' (ffff88808b3e3000): kobject_uevent_env [ 983.495022] kobject: 'batman_adv' (ffff88808b3e3000): kobject_uevent_env: filter function caused the event to drop! [ 983.505723] kobject: 'batman_adv' (ffff88808b3e3000): kobject_cleanup, parent (null) [ 983.514511] kobject: 'batman_adv' (ffff88808b3e3000): calling ktype release [ 983.522089] kobject: (ffff88808b3e3000): dynamic_kobj_release [ 983.527981] kobject: 'batman_adv': free name [ 983.570203] kobject: 'rx-0' (ffff88809cd1e9d0): kobject_cleanup, parent ffff888093c21348 [ 983.578444] kobject: 'rx-0' (ffff88809cd1e9d0): auto cleanup 'remove' event [ 983.587417] kobject: 'rx-0' (ffff88809cd1e9d0): kobject_uevent_env [ 983.593759] kobject: 'rx-0' (ffff88809cd1e9d0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.605558] kobject: 'rx-0' (ffff88809cd1e9d0): auto cleanup kobject_del [ 983.612448] kobject: 'rx-0' (ffff88809cd1e9d0): calling ktype release [ 983.619003] kobject: 'rx-0': free name [ 983.624562] kobject: 'tx-0' (ffff88809fa565d8): kobject_cleanup, parent ffff888093c21348 [ 983.632829] kobject: 'tx-0' (ffff88809fa565d8): auto cleanup 'remove' event [ 983.639913] kobject: 'tx-0' (ffff88809fa565d8): kobject_uevent_env [ 983.646292] kobject: 'tx-0' (ffff88809fa565d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.656374] kobject: 'tx-0' (ffff88809fa565d8): auto cleanup kobject_del [ 983.663277] kobject: 'tx-0' (ffff88809fa565d8): calling ktype release [ 983.669855] kobject: 'tx-0': free name [ 983.674274] kobject: 'queues' (ffff888093c21348): kobject_cleanup, parent (null) [ 983.682705] kobject: 'queues' (ffff888093c21348): calling ktype release [ 983.689438] kobject: 'queues' (ffff888093c21348): kset_release [ 983.695432] kobject: 'queues': free name [ 983.699661] kobject: 'þ€' (ffff888053cee3b0): kobject_uevent_env [ 983.705852] kobject: 'þ€' (ffff888053cee3b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.716527] kobject: 'batman_adv' (ffff888099d9dc00): kobject_uevent_env [ 983.723409] kobject: 'batman_adv' (ffff888099d9dc00): kobject_uevent_env: filter function caused the event to drop! [ 983.734026] kobject: 'batman_adv' (ffff888099d9dc00): kobject_cleanup, parent (null) [ 983.742791] kobject: 'batman_adv' (ffff888099d9dc00): calling ktype release [ 983.749890] kobject: (ffff888099d9dc00): dynamic_kobj_release [ 983.755945] kobject: 'batman_adv': free name [ 983.760528] kobject: 'rx-0' (ffff88809f95bcd0): kobject_cleanup, parent ffff8880954c8948 [ 983.768740] kobject: 'rx-0' (ffff88809f95bcd0): auto cleanup 'remove' event [ 983.775864] kobject: 'rx-0' (ffff88809f95bcd0): kobject_uevent_env [ 983.782192] kobject: 'rx-0' (ffff88809f95bcd0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.792265] kobject: 'rx-0' (ffff88809f95bcd0): auto cleanup kobject_del [ 983.799111] kobject: 'rx-0' (ffff88809f95bcd0): calling ktype release [ 983.805779] kobject: 'rx-0': free name [ 983.809675] kobject: 'tx-0' (ffff88807cf8cd18): kobject_cleanup, parent ffff8880954c8948 [ 983.817926] kobject: 'tx-0' (ffff88807cf8cd18): auto cleanup 'remove' event [ 983.825045] kobject: 'tx-0' (ffff88807cf8cd18): kobject_uevent_env [ 983.831376] kobject: 'tx-0' (ffff88807cf8cd18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.841644] kobject: 'tx-0' (ffff88807cf8cd18): auto cleanup kobject_del [ 983.848494] kobject: 'tx-0' (ffff88807cf8cd18): calling ktype release [ 983.855094] kobject: 'tx-0': free name [ 983.858997] kobject: 'queues' (ffff8880954c8948): kobject_cleanup, parent (null) [ 983.867427] kobject: 'queues' (ffff8880954c8948): calling ktype release [ 983.874193] kobject: 'queues' (ffff8880954c8948): kset_release [ 983.880192] kobject: 'queues': free name [ 983.884424] kobject: 'veth7' (ffff88804aa3ab30): kobject_uevent_env [ 983.890874] kobject: 'veth7' (ffff88804aa3ab30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.901595] kobject: 'batman_adv' (ffff8880a1951280): kobject_uevent_env [ 983.908429] kobject: 'batman_adv' (ffff8880a1951280): kobject_uevent_env: filter function caused the event to drop! [ 983.919055] kobject: 'batman_adv' (ffff8880a1951280): kobject_cleanup, parent (null) [ 983.928030] kobject: 'batman_adv' (ffff8880a1951280): calling ktype release [ 983.936727] kobject: (ffff8880a1951280): dynamic_kobj_release [ 983.943070] kobject: 'batman_adv': free name [ 983.947565] kobject: 'rx-0' (ffff88809c3fbd90): kobject_cleanup, parent ffff88809f045f48 [ 983.955820] kobject: 'rx-0' (ffff88809c3fbd90): auto cleanup 'remove' event [ 983.962932] kobject: 'rx-0' (ffff88809c3fbd90): kobject_uevent_env [ 983.969226] kobject: 'rx-0' (ffff88809c3fbd90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 983.980607] kobject: 'rx-0' (ffff88809c3fbd90): auto cleanup kobject_del [ 983.987799] kobject: 'rx-0' (ffff88809c3fbd90): calling ktype release [ 983.994473] kobject: 'rx-0': free name [ 983.998385] kobject: 'tx-0' (ffff888097ae10d8): kobject_cleanup, parent ffff88809f045f48 [ 984.007429] kobject: 'tx-0' (ffff888097ae10d8): auto cleanup 'remove' event [ 984.014559] kobject: 'tx-0' (ffff888097ae10d8): kobject_uevent_env [ 984.020891] kobject: 'tx-0' (ffff888097ae10d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.030964] kobject: 'tx-0' (ffff888097ae10d8): auto cleanup kobject_del [ 984.037818] kobject: 'tx-0' (ffff888097ae10d8): calling ktype release [ 984.044424] kobject: 'tx-0': free name [ 984.048323] kobject: 'queues' (ffff88809f045f48): kobject_cleanup, parent (null) [ 984.056737] kobject: 'queues' (ffff88809f045f48): calling ktype release [ 984.063512] kobject: 'queues' (ffff88809f045f48): kset_release [ 984.069465] kobject: 'queues': free name [ 984.073775] kobject: 'veth6' (ffff88809116eb70): kobject_uevent_env [ 984.080670] kobject: 'veth6' (ffff88809116eb70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.091440] kobject: 'batman_adv' (ffff88808b3cc280): kobject_uevent_env [ 984.098269] kobject: 'batman_adv' (ffff88808b3cc280): kobject_uevent_env: filter function caused the event to drop! [ 984.108928] kobject: 'batman_adv' (ffff88808b3cc280): kobject_cleanup, parent (null) [ 984.117915] kobject: 'batman_adv' (ffff88808b3cc280): calling ktype release [ 984.125040] kobject: (ffff88808b3cc280): dynamic_kobj_release [ 984.131177] kobject: 'batman_adv': free name [ 984.135770] kobject: 'rx-0' (ffff8880a4cf0c10): kobject_cleanup, parent ffff888079de6c48 [ 984.144047] kobject: 'rx-0' (ffff8880a4cf0c10): auto cleanup 'remove' event [ 984.151163] kobject: 'rx-0' (ffff8880a4cf0c10): kobject_uevent_env [ 984.157469] kobject: 'rx-0' (ffff8880a4cf0c10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.167968] kobject: 'rx-0' (ffff8880a4cf0c10): auto cleanup kobject_del [ 984.174912] kobject: 'rx-0' (ffff8880a4cf0c10): calling ktype release [ 984.181538] kobject: 'rx-0': free name [ 984.185454] kobject: 'tx-0' (ffff8880543be0d8): kobject_cleanup, parent ffff888079de6c48 [ 984.193753] kobject: 'tx-0' (ffff8880543be0d8): auto cleanup 'remove' event [ 984.200888] kobject: 'tx-0' (ffff8880543be0d8): kobject_uevent_env [ 984.207190] kobject: 'tx-0' (ffff8880543be0d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.217261] kobject: 'tx-0' (ffff8880543be0d8): auto cleanup kobject_del [ 984.224157] kobject: 'tx-0' (ffff8880543be0d8): calling ktype release [ 984.230757] kobject: 'tx-0': free name [ 984.234645] kobject: 'queues' (ffff888079de6c48): kobject_cleanup, parent (null) [ 984.243340] kobject: 'queues' (ffff888079de6c48): calling ktype release [ 984.250112] kobject: 'queues' (ffff888079de6c48): kset_release [ 984.256079] kobject: 'queues': free name [ 984.260421] kobject: 'veth5' (ffff88807d644870): kobject_uevent_env [ 984.266813] kobject: 'veth5' (ffff88807d644870): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.277769] kobject: 'batman_adv' (ffff8880a706d580): kobject_uevent_env [ 984.284755] kobject: 'batman_adv' (ffff8880a706d580): kobject_uevent_env: filter function caused the event to drop! [ 984.295375] kobject: 'batman_adv' (ffff8880a706d580): kobject_cleanup, parent (null) [ 984.304155] kobject: 'batman_adv' (ffff8880a706d580): calling ktype release [ 984.311437] kobject: (ffff8880a706d580): dynamic_kobj_release [ 984.317319] kobject: 'batman_adv': free name [ 984.321939] kobject: 'rx-0' (ffff88809657cd90): kobject_cleanup, parent ffff8880928fa048 [ 984.330200] kobject: 'rx-0' (ffff88809657cd90): auto cleanup 'remove' event [ 984.337284] kobject: 'rx-0' (ffff88809657cd90): kobject_uevent_env [ 984.343706] kobject: 'rx-0' (ffff88809657cd90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.353795] kobject: 'rx-0' (ffff88809657cd90): auto cleanup kobject_del [ 984.360733] kobject: 'rx-0' (ffff88809657cd90): calling ktype release [ 984.367312] kobject: 'rx-0': free name [ 984.371496] kobject: 'tx-0' (ffff8880543be358): kobject_cleanup, parent ffff8880928fa048 [ 984.379716] kobject: 'tx-0' (ffff8880543be358): auto cleanup 'remove' event [ 984.386846] kobject: 'tx-0' (ffff8880543be358): kobject_uevent_env [ 984.393206] kobject: 'tx-0' (ffff8880543be358): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.403272] kobject: 'tx-0' (ffff8880543be358): auto cleanup kobject_del [ 984.410170] kobject: 'tx-0' (ffff8880543be358): calling ktype release [ 984.416734] kobject: 'tx-0': free name [ 984.420659] kobject: 'queues' (ffff8880928fa048): kobject_cleanup, parent (null) [ 984.429044] kobject: 'queues' (ffff8880928fa048): calling ktype release [ 984.435810] kobject: 'queues' (ffff8880928fa048): kset_release [ 984.441803] kobject: 'queues': free name [ 984.446030] kobject: 'veth4' (ffff88809c1268b0): kobject_uevent_env [ 984.452450] kobject: 'veth4' (ffff88809c1268b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.463159] kobject: 'batman_adv' (ffff888096752280): kobject_uevent_env [ 984.470088] kobject: 'batman_adv' (ffff888096752280): kobject_uevent_env: filter function caused the event to drop! [ 984.480758] kobject: 'batman_adv' (ffff888096752280): kobject_cleanup, parent (null) [ 984.489492] kobject: 'batman_adv' (ffff888096752280): calling ktype release [ 984.496613] kobject: (ffff888096752280): dynamic_kobj_release [ 984.502861] kobject: 'batman_adv': free name [ 984.507346] bond2 (unregistering): Released all slaves [ 984.512660] kobject: 'rx-15' (ffff88809745fa10): kobject_cleanup, parent ffff88809fc76148 [ 984.521005] kobject: 'rx-15' (ffff88809745fa10): auto cleanup 'remove' event [ 984.528190] kobject: 'rx-15' (ffff88809745fa10): kobject_uevent_env [ 984.534615] kobject: 'rx-15' (ffff88809745fa10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.544828] kobject: 'rx-15' (ffff88809745fa10): auto cleanup kobject_del [ 984.551792] kobject: 'rx-15' (ffff88809745fa10): calling ktype release [ 984.558462] kobject: 'rx-15': free name [ 984.562463] kobject: 'rx-14' (ffff88809745f990): kobject_cleanup, parent ffff88809fc76148 [ 984.570794] kobject: 'rx-14' (ffff88809745f990): auto cleanup 'remove' event [ 984.577966] kobject: 'rx-14' (ffff88809745f990): kobject_uevent_env [ 984.585918] kobject: 'rx-14' (ffff88809745f990): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.596095] kobject: 'rx-14' (ffff88809745f990): auto cleanup kobject_del [ 984.603067] kobject: 'rx-14' (ffff88809745f990): calling ktype release [ 984.609771] kobject: 'rx-14': free name [ 984.613786] kobject: 'rx-13' (ffff88809745f910): kobject_cleanup, parent ffff88809fc76148 [ 984.622134] kobject: 'rx-13' (ffff88809745f910): auto cleanup 'remove' event [ 984.629304] kobject: 'rx-13' (ffff88809745f910): kobject_uevent_env [ 984.636143] kobject: 'rx-13' (ffff88809745f910): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.646306] kobject: 'rx-13' (ffff88809745f910): auto cleanup kobject_del [ 984.653273] kobject: 'rx-13' (ffff88809745f910): calling ktype release [ 984.659971] kobject: 'rx-13': free name [ 984.664038] kobject: 'rx-12' (ffff88809745f890): kobject_cleanup, parent ffff88809fc76148 [ 984.672360] kobject: 'rx-12' (ffff88809745f890): auto cleanup 'remove' event [ 984.679627] kobject: 'rx-12' (ffff88809745f890): kobject_uevent_env [ 984.686096] kobject: 'rx-12' (ffff88809745f890): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.696261] kobject: 'rx-12' (ffff88809745f890): auto cleanup kobject_del [ 984.703244] kobject: 'rx-12' (ffff88809745f890): calling ktype release [ 984.709903] kobject: 'rx-12': free name [ 984.713907] kobject: 'rx-11' (ffff88809745f810): kobject_cleanup, parent ffff88809fc76148 [ 984.722346] kobject: 'rx-11' (ffff88809745f810): auto cleanup 'remove' event [ 984.729512] kobject: 'rx-11' (ffff88809745f810): kobject_uevent_env [ 984.735939] kobject: 'rx-11' (ffff88809745f810): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.746107] kobject: 'rx-11' (ffff88809745f810): auto cleanup kobject_del [ 984.753068] kobject: 'rx-11' (ffff88809745f810): calling ktype release [ 984.759719] kobject: 'rx-11': free name [ 984.763971] kobject: 'rx-10' (ffff88809745f790): kobject_cleanup, parent ffff88809fc76148 [ 984.772307] kobject: 'rx-10' (ffff88809745f790): auto cleanup 'remove' event [ 984.779472] kobject: 'rx-10' (ffff88809745f790): kobject_uevent_env [ 984.785890] kobject: 'rx-10' (ffff88809745f790): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.796081] kobject: 'rx-10' (ffff88809745f790): auto cleanup kobject_del [ 984.804110] kobject: 'rx-10' (ffff88809745f790): calling ktype release [ 984.810821] kobject: 'rx-10': free name [ 984.814789] kobject: 'rx-9' (ffff88809745f710): kobject_cleanup, parent ffff88809fc76148 [ 984.823038] kobject: 'rx-9' (ffff88809745f710): auto cleanup 'remove' event [ 984.830168] kobject: 'rx-9' (ffff88809745f710): kobject_uevent_env [ 984.836815] kobject: 'rx-9' (ffff88809745f710): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.846951] kobject: 'rx-9' (ffff88809745f710): auto cleanup kobject_del [ 984.853842] kobject: 'rx-9' (ffff88809745f710): calling ktype release [ 984.860443] kobject: 'rx-9': free name [ 984.864321] kobject: 'rx-8' (ffff88809745f690): kobject_cleanup, parent ffff88809fc76148 [ 984.872571] kobject: 'rx-8' (ffff88809745f690): auto cleanup 'remove' event [ 984.879654] kobject: 'rx-8' (ffff88809745f690): kobject_uevent_env [ 984.885993] kobject: 'rx-8' (ffff88809745f690): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.896242] kobject: 'rx-8' (ffff88809745f690): auto cleanup kobject_del [ 984.903114] kobject: 'rx-8' (ffff88809745f690): calling ktype release [ 984.909683] kobject: 'rx-8': free name [ 984.913597] kobject: 'rx-7' (ffff88809745f610): kobject_cleanup, parent ffff88809fc76148 [ 984.921857] kobject: 'rx-7' (ffff88809745f610): auto cleanup 'remove' event [ 984.928946] kobject: 'rx-7' (ffff88809745f610): kobject_uevent_env [ 984.935354] kobject: 'rx-7' (ffff88809745f610): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.945471] kobject: 'rx-7' (ffff88809745f610): auto cleanup kobject_del [ 984.952364] kobject: 'rx-7' (ffff88809745f610): calling ktype release [ 984.958931] kobject: 'rx-7': free name [ 984.962861] kobject: 'rx-6' (ffff88809745f590): kobject_cleanup, parent ffff88809fc76148 [ 984.971115] kobject: 'rx-6' (ffff88809745f590): auto cleanup 'remove' event [ 984.978203] kobject: 'rx-6' (ffff88809745f590): kobject_uevent_env [ 984.984546] kobject: 'rx-6' (ffff88809745f590): kobject_uevent_env: uevent_suppress caused the event to drop! [ 984.994620] kobject: 'rx-6' (ffff88809745f590): auto cleanup kobject_del [ 985.001527] kobject: 'rx-6' (ffff88809745f590): calling ktype release [ 985.008095] kobject: 'rx-6': free name [ 985.012003] kobject: 'rx-5' (ffff88809745f510): kobject_cleanup, parent ffff88809fc76148 [ 985.020587] kobject: 'rx-5' (ffff88809745f510): auto cleanup 'remove' event [ 985.027677] kobject: 'rx-5' (ffff88809745f510): kobject_uevent_env [ 985.034005] kobject: 'rx-5' (ffff88809745f510): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.044075] kobject: 'rx-5' (ffff88809745f510): auto cleanup kobject_del [ 985.050959] kobject: 'rx-5' (ffff88809745f510): calling ktype release [ 985.057532] kobject: 'rx-5': free name [ 985.061465] kobject: 'rx-4' (ffff88809745f490): kobject_cleanup, parent ffff88809fc76148 [ 985.069690] kobject: 'rx-4' (ffff88809745f490): auto cleanup 'remove' event [ 985.076934] kobject: 'rx-4' (ffff88809745f490): kobject_uevent_env [ 985.083297] kobject: 'rx-4' (ffff88809745f490): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.093365] kobject: 'rx-4' (ffff88809745f490): auto cleanup kobject_del [ 985.100254] kobject: 'rx-4' (ffff88809745f490): calling ktype release [ 985.106807] kobject: 'rx-4': free name [ 985.110708] kobject: 'rx-3' (ffff88809745f410): kobject_cleanup, parent ffff88809fc76148 [ 985.118949] kobject: 'rx-3' (ffff88809745f410): auto cleanup 'remove' event [ 985.126243] kobject: 'rx-3' (ffff88809745f410): kobject_uevent_env [ 985.132599] kobject: 'rx-3' (ffff88809745f410): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.142685] kobject: 'rx-3' (ffff88809745f410): auto cleanup kobject_del [ 985.149552] kobject: 'rx-3' (ffff88809745f410): calling ktype release [ 985.156420] kobject: 'rx-3': free name [ 985.160336] kobject: 'rx-2' (ffff88809745f390): kobject_cleanup, parent ffff88809fc76148 [ 985.168639] kobject: 'rx-2' (ffff88809745f390): auto cleanup 'remove' event [ 985.175767] kobject: 'rx-2' (ffff88809745f390): kobject_uevent_env [ 985.182100] kobject: 'rx-2' (ffff88809745f390): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.192277] kobject: 'rx-2' (ffff88809745f390): auto cleanup kobject_del [ 985.199121] kobject: 'rx-2' (ffff88809745f390): calling ktype release [ 985.205948] kobject: 'rx-2': free name [ 985.209830] kobject: 'rx-1' (ffff88809745f310): kobject_cleanup, parent ffff88809fc76148 [ 985.218070] kobject: 'rx-1' (ffff88809745f310): auto cleanup 'remove' event [ 985.225204] kobject: 'rx-1' (ffff88809745f310): kobject_uevent_env [ 985.231534] kobject: 'rx-1' (ffff88809745f310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.241625] kobject: 'rx-1' (ffff88809745f310): auto cleanup kobject_del [ 985.248465] kobject: 'rx-1' (ffff88809745f310): calling ktype release [ 985.255088] kobject: 'rx-1': free name [ 985.258999] kobject: 'rx-0' (ffff88809745f290): kobject_cleanup, parent ffff88809fc76148 [ 985.267272] kobject: 'rx-0' (ffff88809745f290): auto cleanup 'remove' event [ 985.274423] kobject: 'rx-0' (ffff88809745f290): kobject_uevent_env [ 985.281108] kobject: 'rx-0' (ffff88809745f290): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.291220] kobject: 'rx-0' (ffff88809745f290): auto cleanup kobject_del [ 985.298084] kobject: 'rx-0' (ffff88809745f290): calling ktype release [ 985.304697] kobject: 'rx-0': free name [ 985.308603] kobject: 'tx-15' (ffff88805b627298): kobject_cleanup, parent ffff88809fc76148 [ 985.316945] kobject: 'tx-15' (ffff88805b627298): auto cleanup 'remove' event [ 985.324155] kobject: 'tx-15' (ffff88805b627298): kobject_uevent_env [ 985.330578] kobject: 'tx-15' (ffff88805b627298): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.340763] kobject: 'tx-15' (ffff88805b627298): auto cleanup kobject_del [ 985.347702] kobject: 'tx-15' (ffff88805b627298): calling ktype release [ 985.354391] kobject: 'tx-15': free name [ 985.358379] kobject: 'tx-14' (ffff88805b627118): kobject_cleanup, parent ffff88809fc76148 [ 985.366717] kobject: 'tx-14' (ffff88805b627118): auto cleanup 'remove' event [ 985.373916] kobject: 'tx-14' (ffff88805b627118): kobject_uevent_env [ 985.380338] kobject: 'tx-14' (ffff88805b627118): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.390584] kobject: 'tx-14' (ffff88805b627118): auto cleanup kobject_del [ 985.397521] kobject: 'tx-14' (ffff88805b627118): calling ktype release [ 985.404201] kobject: 'tx-14': free name [ 985.408184] kobject: 'tx-13' (ffff88805b626f98): kobject_cleanup, parent ffff88809fc76148 [ 985.416766] kobject: 'tx-13' (ffff88805b626f98): auto cleanup 'remove' event [ 985.423982] kobject: 'tx-13' (ffff88805b626f98): kobject_uevent_env [ 985.430395] kobject: 'tx-13' (ffff88805b626f98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.441649] kobject: 'tx-13' (ffff88805b626f98): auto cleanup kobject_del [ 985.448619] kobject: 'tx-13' (ffff88805b626f98): calling ktype release [ 985.455340] kobject: 'tx-13': free name [ 985.459337] kobject: 'tx-12' (ffff88805b626e18): kobject_cleanup, parent ffff88809fc76148 [ 985.467681] kobject: 'tx-12' (ffff88805b626e18): auto cleanup 'remove' event [ 985.474907] kobject: 'tx-12' (ffff88805b626e18): kobject_uevent_env [ 985.481362] kobject: 'tx-12' (ffff88805b626e18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.491518] kobject: 'tx-12' (ffff88805b626e18): auto cleanup kobject_del [ 985.498453] kobject: 'tx-12' (ffff88805b626e18): calling ktype release [ 985.505146] kobject: 'tx-12': free name [ 985.509146] kobject: 'tx-11' (ffff88805b626c98): kobject_cleanup, parent ffff88809fc76148 [ 985.517491] kobject: 'tx-11' (ffff88805b626c98): auto cleanup 'remove' event [ 985.524722] kobject: 'tx-11' (ffff88805b626c98): kobject_uevent_env [ 985.531150] kobject: 'tx-11' (ffff88805b626c98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.541514] kobject: 'tx-11' (ffff88805b626c98): auto cleanup kobject_del [ 985.548468] kobject: 'tx-11' (ffff88805b626c98): calling ktype release [ 985.555154] kobject: 'tx-11': free name [ 985.559153] kobject: 'tx-10' (ffff88805b626b18): kobject_cleanup, parent ffff88809fc76148 [ 985.567492] kobject: 'tx-10' (ffff88805b626b18): auto cleanup 'remove' event [ 985.574709] kobject: 'tx-10' (ffff88805b626b18): kobject_uevent_env [ 985.581134] kobject: 'tx-10' (ffff88805b626b18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.591283] kobject: 'tx-10' (ffff88805b626b18): auto cleanup kobject_del [ 985.598223] kobject: 'tx-10' (ffff88805b626b18): calling ktype release [ 985.604905] kobject: 'tx-10': free name [ 985.608892] kobject: 'tx-9' (ffff88805b626998): kobject_cleanup, parent ffff88809fc76148 [ 985.617150] kobject: 'tx-9' (ffff88805b626998): auto cleanup 'remove' event [ 985.624263] kobject: 'tx-9' (ffff88805b626998): kobject_uevent_env [ 985.630590] kobject: 'tx-9' (ffff88805b626998): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.640794] kobject: 'tx-9' (ffff88805b626998): auto cleanup kobject_del [ 985.647644] kobject: 'tx-9' (ffff88805b626998): calling ktype release [ 985.654245] kobject: 'tx-9': free name [ 985.658158] kobject: 'tx-8' (ffff88805b626818): kobject_cleanup, parent ffff88809fc76148 [ 985.666427] kobject: 'tx-8' (ffff88805b626818): auto cleanup 'remove' event [ 985.673734] kobject: 'tx-8' (ffff88805b626818): kobject_uevent_env [ 985.680065] kobject: 'tx-8' (ffff88805b626818): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.690149] kobject: 'tx-8' (ffff88805b626818): auto cleanup kobject_del [ 985.696990] kobject: 'tx-8' (ffff88805b626818): calling ktype release [ 985.703596] kobject: 'tx-8': free name [ 985.707668] kobject: 'tx-7' (ffff88805b626698): kobject_cleanup, parent ffff88809fc76148 [ 985.715932] kobject: 'tx-7' (ffff88805b626698): auto cleanup 'remove' event [ 985.723050] kobject: 'tx-7' (ffff88805b626698): kobject_uevent_env [ 985.729360] kobject: 'tx-7' (ffff88805b626698): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.739432] kobject: 'tx-7' (ffff88805b626698): auto cleanup kobject_del [ 985.746334] kobject: 'tx-7' (ffff88805b626698): calling ktype release [ 985.752944] kobject: 'tx-7': free name [ 985.756858] kobject: 'tx-6' (ffff88805b626518): kobject_cleanup, parent ffff88809fc76148 [ 985.765116] kobject: 'tx-6' (ffff88805b626518): auto cleanup 'remove' event [ 985.772253] kobject: 'tx-6' (ffff88805b626518): kobject_uevent_env [ 985.778902] kobject: 'tx-6' (ffff88805b626518): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.788988] kobject: 'tx-6' (ffff88805b626518): auto cleanup kobject_del [ 985.795889] kobject: 'tx-6' (ffff88805b626518): calling ktype release [ 985.802721] kobject: 'tx-6': free name [ 985.806613] kobject: 'tx-5' (ffff88805b626398): kobject_cleanup, parent ffff88809fc76148 [ 985.814846] kobject: 'tx-5' (ffff88805b626398): auto cleanup 'remove' event [ 985.821954] kobject: 'tx-5' (ffff88805b626398): kobject_uevent_env [ 985.828248] kobject: 'tx-5' (ffff88805b626398): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.838307] kobject: 'tx-5' (ffff88805b626398): auto cleanup kobject_del [ 985.845178] kobject: 'tx-5' (ffff88805b626398): calling ktype release [ 985.851765] kobject: 'tx-5': free name [ 985.855673] kobject: 'tx-4' (ffff88805b626218): kobject_cleanup, parent ffff88809fc76148 [ 985.863913] kobject: 'tx-4' (ffff88805b626218): auto cleanup 'remove' event [ 985.871022] kobject: 'tx-4' (ffff88805b626218): kobject_uevent_env [ 985.877324] kobject: 'tx-4' (ffff88805b626218): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.887660] kobject: 'tx-4' (ffff88805b626218): auto cleanup kobject_del [ 985.894545] kobject: 'tx-4' (ffff88805b626218): calling ktype release [ 985.901149] kobject: 'tx-4': free name [ 985.905044] kobject: 'tx-3' (ffff88805b626098): kobject_cleanup, parent ffff88809fc76148 [ 985.913290] kobject: 'tx-3' (ffff88805b626098): auto cleanup 'remove' event [ 985.920422] kobject: 'tx-3' (ffff88805b626098): kobject_uevent_env [ 985.926723] kobject: 'tx-3' (ffff88805b626098): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.937057] kobject: 'tx-3' (ffff88805b626098): auto cleanup kobject_del [ 985.943957] kobject: 'tx-3' (ffff88805b626098): calling ktype release [ 985.950550] kobject: 'tx-3': free name [ 985.954453] kobject: 'tx-2' (ffff88805b625f18): kobject_cleanup, parent ffff88809fc76148 [ 985.962832] kobject: 'tx-2' (ffff88805b625f18): auto cleanup 'remove' event [ 985.969933] kobject: 'tx-2' (ffff88805b625f18): kobject_uevent_env [ 985.977138] kobject: 'tx-2' (ffff88805b625f18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 985.987213] kobject: 'tx-2' (ffff88805b625f18): auto cleanup kobject_del [ 985.994085] kobject: 'tx-2' (ffff88805b625f18): calling ktype release [ 986.000681] kobject: 'tx-2': free name [ 986.004593] kobject: 'tx-1' (ffff88805b625d98): kobject_cleanup, parent ffff88809fc76148 [ 986.012838] kobject: 'tx-1' (ffff88805b625d98): auto cleanup 'remove' event [ 986.019923] kobject: 'tx-1' (ffff88805b625d98): kobject_uevent_env [ 986.026278] kobject: 'tx-1' (ffff88805b625d98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.036442] kobject: 'tx-1' (ffff88805b625d98): auto cleanup kobject_del [ 986.043358] kobject: 'tx-1' (ffff88805b625d98): calling ktype release [ 986.049949] kobject: 'tx-1': free name [ 986.053879] kobject: 'tx-0' (ffff88805b625c18): kobject_cleanup, parent ffff88809fc76148 [ 986.062299] kobject: 'tx-0' (ffff88805b625c18): auto cleanup 'remove' event [ 986.069374] kobject: 'tx-0' (ffff88805b625c18): kobject_uevent_env [ 986.075702] kobject: 'tx-0' (ffff88805b625c18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.087572] kobject: 'tx-0' (ffff88805b625c18): auto cleanup kobject_del [ 986.090232] net_ratelimit: 20 callbacks suppressed [ 986.090236] protocol 88fb is buggy, dev hsr_slave_0 [ 986.094512] kobject: 'tx-0' (ffff88805b625c18): calling ktype release [ 986.099384] protocol 88fb is buggy, dev hsr_slave_1 [ 986.104389] kobject: 'tx-0': free name [ 986.111014] protocol 88fb is buggy, dev hsr_slave_0 [ 986.115992] kobject: 'queues' (ffff88809fc76148): kobject_cleanup, parent (null) [ 986.119896] protocol 88fb is buggy, dev hsr_slave_1 [ 986.124903] kobject: 'queues' (ffff88809fc76148): calling ktype release [ 986.133448] protocol 88fb is buggy, dev hsr_slave_0 [ 986.138373] kobject: 'queues' (ffff88809fc76148): kset_release [ 986.145144] protocol 88fb is buggy, dev hsr_slave_1 [ 986.150159] kobject: 'queues': free name [ 986.165530] kobject: 'bond2' (ffff88805b36c6b0): kobject_uevent_env [ 986.171979] kobject: 'bond2' (ffff88805b36c6b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.182858] kobject: 'batman_adv' (ffff888097904580): kobject_uevent_env [ 986.189701] kobject: 'batman_adv' (ffff888097904580): kobject_uevent_env: filter function caused the event to drop! [ 986.200615] kobject: 'batman_adv' (ffff888097904580): kobject_cleanup, parent (null) [ 986.209377] kobject: 'batman_adv' (ffff888097904580): calling ktype release [ 986.216519] kobject: (ffff888097904580): dynamic_kobj_release [ 986.222431] kobject: 'batman_adv': free name [ 986.226925] bond1 (unregistering): Released all slaves [ 986.232346] kobject: 'rx-15' (ffff88805ab41a10): kobject_cleanup, parent ffff88808a7e6548 [ 986.241418] kobject: 'rx-15' (ffff88805ab41a10): auto cleanup 'remove' event [ 986.248602] kobject: 'rx-15' (ffff88805ab41a10): kobject_uevent_env [ 986.255039] kobject: 'rx-15' (ffff88805ab41a10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.265212] kobject: 'rx-15' (ffff88805ab41a10): auto cleanup kobject_del [ 986.272206] kobject: 'rx-15' (ffff88805ab41a10): calling ktype release [ 986.278860] kobject: 'rx-15': free name [ 986.282881] kobject: 'rx-14' (ffff88805ab41990): kobject_cleanup, parent ffff88808a7e6548 [ 986.291217] kobject: 'rx-14' (ffff88805ab41990): auto cleanup 'remove' event [ 986.298388] kobject: 'rx-14' (ffff88805ab41990): kobject_uevent_env [ 986.304812] kobject: 'rx-14' (ffff88805ab41990): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.314973] kobject: 'rx-14' (ffff88805ab41990): auto cleanup kobject_del [ 986.322006] kobject: 'rx-14' (ffff88805ab41990): calling ktype release [ 986.328660] kobject: 'rx-14': free name [ 986.332982] kobject: 'rx-13' (ffff88805ab41910): kobject_cleanup, parent ffff88808a7e6548 [ 986.341328] kobject: 'rx-13' (ffff88805ab41910): auto cleanup 'remove' event [ 986.348589] kobject: 'rx-13' (ffff88805ab41910): kobject_uevent_env [ 986.355012] kobject: 'rx-13' (ffff88805ab41910): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.365220] kobject: 'rx-13' (ffff88805ab41910): auto cleanup kobject_del [ 986.372178] kobject: 'rx-13' (ffff88805ab41910): calling ktype release [ 986.378843] kobject: 'rx-13': free name [ 986.382843] kobject: 'rx-12' (ffff88805ab41890): kobject_cleanup, parent ffff88808a7e6548 [ 986.391167] kobject: 'rx-12' (ffff88805ab41890): auto cleanup 'remove' event [ 986.398332] kobject: 'rx-12' (ffff88805ab41890): kobject_uevent_env [ 986.404771] kobject: 'rx-12' (ffff88805ab41890): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.414930] kobject: 'rx-12' (ffff88805ab41890): auto cleanup kobject_del [ 986.421905] kobject: 'rx-12' (ffff88805ab41890): calling ktype release [ 986.428587] kobject: 'rx-12': free name [ 986.432598] kobject: 'rx-11' (ffff88805ab41810): kobject_cleanup, parent ffff88808a7e6548 [ 986.440942] kobject: 'rx-11' (ffff88805ab41810): auto cleanup 'remove' event [ 986.448114] kobject: 'rx-11' (ffff88805ab41810): kobject_uevent_env [ 986.454537] kobject: 'rx-11' (ffff88805ab41810): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.464881] kobject: 'rx-11' (ffff88805ab41810): auto cleanup kobject_del [ 986.471863] kobject: 'rx-11' (ffff88805ab41810): calling ktype release [ 986.478525] kobject: 'rx-11': free name [ 986.482534] kobject: 'rx-10' (ffff88805ab41790): kobject_cleanup, parent ffff88808a7e6548 [ 986.490870] kobject: 'rx-10' (ffff88805ab41790): auto cleanup 'remove' event [ 986.498050] kobject: 'rx-10' (ffff88805ab41790): kobject_uevent_env [ 986.504471] kobject: 'rx-10' (ffff88805ab41790): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.514616] kobject: 'rx-10' (ffff88805ab41790): auto cleanup kobject_del [ 986.521578] kobject: 'rx-10' (ffff88805ab41790): calling ktype release [ 986.528229] kobject: 'rx-10': free name [ 986.532305] kobject: 'rx-9' (ffff88805ab41710): kobject_cleanup, parent ffff88808a7e6548 [ 986.540653] kobject: 'rx-9' (ffff88805ab41710): auto cleanup 'remove' event [ 986.547756] kobject: 'rx-9' (ffff88805ab41710): kobject_uevent_env [ 986.554114] kobject: 'rx-9' (ffff88805ab41710): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.564201] kobject: 'rx-9' (ffff88805ab41710): auto cleanup kobject_del [ 986.571086] kobject: 'rx-9' (ffff88805ab41710): calling ktype release [ 986.577655] kobject: 'rx-9': free name [ 986.581584] kobject: 'rx-8' (ffff88805ab41690): kobject_cleanup, parent ffff88808a7e6548 [ 986.589802] kobject: 'rx-8' (ffff88805ab41690): auto cleanup 'remove' event [ 986.597162] kobject: 'rx-8' (ffff88805ab41690): kobject_uevent_env [ 986.603520] kobject: 'rx-8' (ffff88805ab41690): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.613594] kobject: 'rx-8' (ffff88805ab41690): auto cleanup kobject_del [ 986.620478] kobject: 'rx-8' (ffff88805ab41690): calling ktype release [ 986.627053] kobject: 'rx-8': free name [ 986.631747] kobject: 'rx-7' (ffff88805ab41610): kobject_cleanup, parent ffff88808a7e6548 [ 986.639961] kobject: 'rx-7' (ffff88805ab41610): auto cleanup 'remove' event [ 986.647084] kobject: 'rx-7' (ffff88805ab41610): kobject_uevent_env [ 986.653415] kobject: 'rx-7' (ffff88805ab41610): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.663493] kobject: 'rx-7' (ffff88805ab41610): auto cleanup kobject_del [ 986.670397] kobject: 'rx-7' (ffff88805ab41610): calling ktype release [ 986.676964] kobject: 'rx-7': free name [ 986.680876] kobject: 'rx-6' (ffff88805ab41590): kobject_cleanup, parent ffff88808a7e6548 [ 986.689096] kobject: 'rx-6' (ffff88805ab41590): auto cleanup 'remove' event [ 986.696235] kobject: 'rx-6' (ffff88805ab41590): kobject_uevent_env [ 986.702745] kobject: 'rx-6' (ffff88805ab41590): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.712806] kobject: 'rx-6' (ffff88805ab41590): auto cleanup kobject_del [ 986.719652] kobject: 'rx-6' (ffff88805ab41590): calling ktype release [ 986.729509] kobject: 'rx-6': free name [ 986.733489] kobject: 'rx-5' (ffff88805ab41510): kobject_cleanup, parent ffff88808a7e6548 [ 986.741731] kobject: 'rx-5' (ffff88805ab41510): auto cleanup 'remove' event [ 986.748807] kobject: 'rx-5' (ffff88805ab41510): kobject_uevent_env [ 986.755146] kobject: 'rx-5' (ffff88805ab41510): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.765244] kobject: 'rx-5' (ffff88805ab41510): auto cleanup kobject_del [ 986.772134] kobject: 'rx-5' (ffff88805ab41510): calling ktype release [ 986.778717] kobject: 'rx-5': free name [ 986.782705] kobject: 'rx-4' (ffff88805ab41490): kobject_cleanup, parent ffff88808a7e6548 [ 986.790979] kobject: 'rx-4' (ffff88805ab41490): auto cleanup 'remove' event [ 986.798115] kobject: 'rx-4' (ffff88805ab41490): kobject_uevent_env [ 986.804523] protocol 88fb is buggy, dev hsr_slave_0 [ 986.804565] protocol 88fb is buggy, dev hsr_slave_1 [ 986.814640] kobject: 'rx-4' (ffff88805ab41490): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.824717] kobject: 'rx-4' (ffff88805ab41490): auto cleanup kobject_del [ 986.831585] kobject: 'rx-4' (ffff88805ab41490): calling ktype release [ 986.838138] kobject: 'rx-4': free name [ 986.842101] kobject: 'rx-3' (ffff88805ab41410): kobject_cleanup, parent ffff88808a7e6548 [ 986.850703] kobject: 'rx-3' (ffff88805ab41410): auto cleanup 'remove' event [ 986.857806] kobject: 'rx-3' (ffff88805ab41410): kobject_uevent_env [ 986.864198] kobject: 'rx-3' (ffff88805ab41410): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.874281] kobject: 'rx-3' (ffff88805ab41410): auto cleanup kobject_del [ 986.881178] kobject: 'rx-3' (ffff88805ab41410): calling ktype release [ 986.887742] kobject: 'rx-3': free name [ 986.891651] kobject: 'rx-2' (ffff88805ab41390): kobject_cleanup, parent ffff88808a7e6548 [ 986.899866] kobject: 'rx-2' (ffff88805ab41390): auto cleanup 'remove' event [ 986.906991] kobject: 'rx-2' (ffff88805ab41390): kobject_uevent_env [ 986.913324] kobject: 'rx-2' (ffff88805ab41390): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.923392] kobject: 'rx-2' (ffff88805ab41390): auto cleanup kobject_del [ 986.930275] kobject: 'rx-2' (ffff88805ab41390): calling ktype release [ 986.936870] kobject: 'rx-2': free name [ 986.940792] kobject: 'rx-1' (ffff88805ab41310): kobject_cleanup, parent ffff88808a7e6548 [ 986.949010] kobject: 'rx-1' (ffff88805ab41310): auto cleanup 'remove' event [ 986.956145] kobject: 'rx-1' (ffff88805ab41310): kobject_uevent_env [ 986.962479] kobject: 'rx-1' (ffff88805ab41310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 986.972539] kobject: 'rx-1' (ffff88805ab41310): auto cleanup kobject_del [ 986.979412] kobject: 'rx-1' (ffff88805ab41310): calling ktype release [ 986.986663] kobject: 'rx-1': free name [ 986.990598] kobject: 'rx-0' (ffff88805ab41290): kobject_cleanup, parent ffff88808a7e6548 [ 986.998819] kobject: 'rx-0' (ffff88805ab41290): auto cleanup 'remove' event [ 987.005954] kobject: 'rx-0' (ffff88805ab41290): kobject_uevent_env [ 987.012477] kobject: 'rx-0' (ffff88805ab41290): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.022564] kobject: 'rx-0' (ffff88805ab41290): auto cleanup kobject_del [ 987.029430] kobject: 'rx-0' (ffff88805ab41290): calling ktype release [ 987.036048] kobject: 'rx-0': free name [ 987.039956] kobject: 'tx-15' (ffff88805c1ae918): kobject_cleanup, parent ffff88808a7e6548 [ 987.048341] kobject: 'tx-15' (ffff88805c1ae918): auto cleanup 'remove' event [ 987.055563] kobject: 'tx-15' (ffff88805c1ae918): kobject_uevent_env [ 987.062004] kobject: 'tx-15' (ffff88805c1ae918): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.072180] kobject: 'tx-15' (ffff88805c1ae918): auto cleanup kobject_del [ 987.079132] kobject: 'tx-15' (ffff88805c1ae918): calling ktype release [ 987.085860] kobject: 'tx-15': free name [ 987.089853] kobject: 'tx-14' (ffff88805c1ae798): kobject_cleanup, parent ffff88808a7e6548 [ 987.098232] kobject: 'tx-14' (ffff88805c1ae798): auto cleanup 'remove' event [ 987.105476] kobject: 'tx-14' (ffff88805c1ae798): kobject_uevent_env [ 987.112173] kobject: 'tx-14' (ffff88805c1ae798): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.122418] kobject: 'tx-14' (ffff88805c1ae798): auto cleanup kobject_del [ 987.129365] kobject: 'tx-14' (ffff88805c1ae798): calling ktype release [ 987.136077] kobject: 'tx-14': free name [ 987.140115] kobject: 'tx-13' (ffff88805c1ae618): kobject_cleanup, parent ffff88808a7e6548 [ 987.148433] kobject: 'tx-13' (ffff88805c1ae618): auto cleanup 'remove' event [ 987.155717] kobject: 'tx-13' (ffff88805c1ae618): kobject_uevent_env [ 987.162142] kobject: 'tx-13' (ffff88805c1ae618): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.172305] kobject: 'tx-13' (ffff88805c1ae618): auto cleanup kobject_del [ 987.179249] kobject: 'tx-13' (ffff88805c1ae618): calling ktype release [ 987.185941] kobject: 'tx-13': free name [ 987.189953] kobject: 'tx-12' (ffff88805c1ae498): kobject_cleanup, parent ffff88808a7e6548 [ 987.198312] kobject: 'tx-12' (ffff88805c1ae498): auto cleanup 'remove' event [ 987.205534] kobject: 'tx-12' (ffff88805c1ae498): kobject_uevent_env [ 987.211953] kobject: 'tx-12' (ffff88805c1ae498): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.222124] kobject: 'tx-12' (ffff88805c1ae498): auto cleanup kobject_del [ 987.229056] kobject: 'tx-12' (ffff88805c1ae498): calling ktype release [ 987.235744] kobject: 'tx-12': free name [ 987.239731] kobject: 'tx-11' (ffff88805c1ae318): kobject_cleanup, parent ffff88808a7e6548 [ 987.248393] kobject: 'tx-11' (ffff88805c1ae318): auto cleanup 'remove' event [ 987.255616] kobject: 'tx-11' (ffff88805c1ae318): kobject_uevent_env [ 987.262705] kobject: 'tx-11' (ffff88805c1ae318): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.272876] kobject: 'tx-11' (ffff88805c1ae318): auto cleanup kobject_del [ 987.279810] kobject: 'tx-11' (ffff88805c1ae318): calling ktype release [ 987.286620] protocol 88fb is buggy, dev hsr_slave_0 [ 987.286657] protocol 88fb is buggy, dev hsr_slave_1 [ 987.296855] kobject: 'tx-11': free name [ 987.300906] kobject: 'tx-10' (ffff88805c1ae198): kobject_cleanup, parent ffff88808a7e6548 [ 987.309284] kobject: 'tx-10' (ffff88805c1ae198): auto cleanup 'remove' event [ 987.316537] kobject: 'tx-10' (ffff88805c1ae198): kobject_uevent_env [ 987.322964] kobject: 'tx-10' (ffff88805c1ae198): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.333111] kobject: 'tx-10' (ffff88805c1ae198): auto cleanup kobject_del [ 987.340091] kobject: 'tx-10' (ffff88805c1ae198): calling ktype release [ 987.346743] kobject: 'tx-10': free name [ 987.350855] kobject: 'tx-9' (ffff88805c1ae018): kobject_cleanup, parent ffff88808a7e6548 [ 987.359116] kobject: 'tx-9' (ffff88805c1ae018): auto cleanup 'remove' event [ 987.370672] kobject: 'tx-9' (ffff88805c1ae018): kobject_uevent_env [ 987.377084] kobject: 'tx-9' (ffff88805c1ae018): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.387177] kobject: 'tx-9' (ffff88805c1ae018): auto cleanup kobject_del [ 987.394071] kobject: 'tx-9' (ffff88805c1ae018): calling ktype release [ 987.400678] kobject: 'tx-9': free name [ 987.404575] kobject: 'tx-8' (ffff88805c1ade98): kobject_cleanup, parent ffff88808a7e6548 [ 987.412839] kobject: 'tx-8' (ffff88805c1ade98): auto cleanup 'remove' event [ 987.419973] kobject: 'tx-8' (ffff88805c1ade98): kobject_uevent_env [ 987.426376] kobject: 'tx-8' (ffff88805c1ade98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.436457] kobject: 'tx-8' (ffff88805c1ade98): auto cleanup kobject_del [ 987.443351] kobject: 'tx-8' (ffff88805c1ade98): calling ktype release [ 987.449916] kobject: 'tx-8': free name [ 987.453858] kobject: 'tx-7' (ffff88805c1add18): kobject_cleanup, parent ffff88808a7e6548 [ 987.462108] kobject: 'tx-7' (ffff88805c1add18): auto cleanup 'remove' event [ 987.469197] kobject: 'tx-7' (ffff88805c1add18): kobject_uevent_env [ 987.475547] kobject: 'tx-7' (ffff88805c1add18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.485631] kobject: 'tx-7' (ffff88805c1add18): auto cleanup kobject_del [ 987.492507] kobject: 'tx-7' (ffff88805c1add18): calling ktype release [ 987.499079] kobject: 'tx-7': free name [ 987.503267] kobject: 'tx-6' (ffff88805c1adb98): kobject_cleanup, parent ffff88808a7e6548 [ 987.511523] kobject: 'tx-6' (ffff88805c1adb98): auto cleanup 'remove' event [ 987.518629] kobject: 'tx-6' (ffff88805c1adb98): kobject_uevent_env [ 987.524975] kobject: 'tx-6' (ffff88805c1adb98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.535039] kobject: 'tx-6' (ffff88805c1adb98): auto cleanup kobject_del [ 987.541919] kobject: 'tx-6' (ffff88805c1adb98): calling ktype release [ 987.548479] kobject: 'tx-6': free name [ 987.552434] kobject: 'tx-5' (ffff88805c1ada18): kobject_cleanup, parent ffff88808a7e6548 [ 987.560699] kobject: 'tx-5' (ffff88805c1ada18): auto cleanup 'remove' event [ 987.567790] kobject: 'tx-5' (ffff88805c1ada18): kobject_uevent_env [ 987.574132] kobject: 'tx-5' (ffff88805c1ada18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.584207] kobject: 'tx-5' (ffff88805c1ada18): auto cleanup kobject_del [ 987.591088] kobject: 'tx-5' (ffff88805c1ada18): calling ktype release [ 987.597652] kobject: 'tx-5': free name [ 987.601598] kobject: 'tx-4' (ffff88805c1ad898): kobject_cleanup, parent ffff88808a7e6548 [ 987.609825] kobject: 'tx-4' (ffff88805c1ad898): auto cleanup 'remove' event [ 987.616953] kobject: 'tx-4' (ffff88805c1ad898): kobject_uevent_env [ 987.623286] kobject: 'tx-4' (ffff88805c1ad898): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.633645] kobject: 'tx-4' (ffff88805c1ad898): auto cleanup kobject_del [ 987.640567] kobject: 'tx-4' (ffff88805c1ad898): calling ktype release [ 987.647129] kobject: 'tx-4': free name [ 987.651066] kobject: 'tx-3' (ffff88805c1ad718): kobject_cleanup, parent ffff88808a7e6548 [ 987.659277] kobject: 'tx-3' (ffff88805c1ad718): auto cleanup 'remove' event [ 987.666400] kobject: 'tx-3' (ffff88805c1ad718): kobject_uevent_env [ 987.672729] kobject: 'tx-3' (ffff88805c1ad718): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.682816] kobject: 'tx-3' (ffff88805c1ad718): auto cleanup kobject_del [ 987.689679] kobject: 'tx-3' (ffff88805c1ad718): calling ktype release [ 987.696290] kobject: 'tx-3': free name [ 987.700232] kobject: 'tx-2' (ffff88805c1ad598): kobject_cleanup, parent ffff88808a7e6548 [ 987.708456] kobject: 'tx-2' (ffff88805c1ad598): auto cleanup 'remove' event [ 987.715564] kobject: 'tx-2' (ffff88805c1ad598): kobject_uevent_env [ 987.721899] kobject: 'tx-2' (ffff88805c1ad598): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.731968] kobject: 'tx-2' (ffff88805c1ad598): auto cleanup kobject_del [ 987.738851] kobject: 'tx-2' (ffff88805c1ad598): calling ktype release [ 987.745456] kobject: 'tx-2': free name [ 987.749353] kobject: 'tx-1' (ffff88805c1ad418): kobject_cleanup, parent ffff88808a7e6548 [ 987.757598] kobject: 'tx-1' (ffff88805c1ad418): auto cleanup 'remove' event [ 987.764897] kobject: 'tx-1' (ffff88805c1ad418): kobject_uevent_env [ 987.771221] kobject: 'tx-1' (ffff88805c1ad418): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.781281] kobject: 'tx-1' (ffff88805c1ad418): auto cleanup kobject_del [ 987.788119] kobject: 'tx-1' (ffff88805c1ad418): calling ktype release [ 987.794713] kobject: 'tx-1': free name [ 987.798610] kobject: 'tx-0' (ffff88805c1ad298): kobject_cleanup, parent ffff88808a7e6548 [ 987.806850] kobject: 'tx-0' (ffff88805c1ad298): auto cleanup 'remove' event [ 987.813956] kobject: 'tx-0' (ffff88805c1ad298): kobject_uevent_env [ 987.820287] kobject: 'tx-0' (ffff88805c1ad298): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.830349] kobject: 'tx-0' (ffff88805c1ad298): auto cleanup kobject_del [ 987.837215] kobject: 'tx-0' (ffff88805c1ad298): calling ktype release [ 987.843820] kobject: 'tx-0': free name [ 987.847704] kobject: 'queues' (ffff88808a7e6548): kobject_cleanup, parent (null) [ 987.856120] kobject: 'queues' (ffff88808a7e6548): calling ktype release [ 987.862889] kobject: 'queues' (ffff88808a7e6548): kset_release [ 987.868845] kobject: 'queues': free name [ 987.873229] kobject: 'bond1' (ffff88805828d3b0): kobject_uevent_env [ 987.879620] kobject: 'bond1' (ffff88805828d3b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.890864] kobject: 'batman_adv' (ffff88805d67a800): kobject_uevent_env [ 987.897706] kobject: 'batman_adv' (ffff88805d67a800): kobject_uevent_env: filter function caused the event to drop! [ 987.908327] kobject: 'batman_adv' (ffff88805d67a800): kobject_cleanup, parent (null) [ 987.917134] kobject: 'batman_adv' (ffff88805d67a800): calling ktype release [ 987.924259] kobject: (ffff88805d67a800): dynamic_kobj_release [ 987.930258] kobject: 'batman_adv': free name [ 987.934774] kobject: 'rx-0' (ffff888046d91910): kobject_cleanup, parent ffff8880a4c6f748 [ 987.943022] kobject: 'rx-0' (ffff888046d91910): auto cleanup 'remove' event [ 987.950133] kobject: 'rx-0' (ffff888046d91910): kobject_uevent_env [ 987.956426] kobject: 'rx-0' (ffff888046d91910): kobject_uevent_env: uevent_suppress caused the event to drop! [ 987.966492] kobject: 'rx-0' (ffff888046d91910): auto cleanup kobject_del [ 987.973383] kobject: 'rx-0' (ffff888046d91910): calling ktype release [ 987.979936] kobject: 'rx-0': free name [ 987.983867] kobject: 'tx-0' (ffff88807b0eb318): kobject_cleanup, parent ffff8880a4c6f748 [ 987.992100] kobject: 'tx-0' (ffff88807b0eb318): auto cleanup 'remove' event [ 987.999175] kobject: 'tx-0' (ffff88807b0eb318): kobject_uevent_env [ 988.013853] kobject: 'tx-0' (ffff88807b0eb318): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.024295] kobject: 'tx-0' (ffff88807b0eb318): auto cleanup kobject_del [ 988.031183] kobject: 'tx-0' (ffff88807b0eb318): calling ktype release [ 988.037781] kobject: 'tx-0': free name [ 988.041705] kobject: 'queues' (ffff8880a4c6f748): kobject_cleanup, parent (null) [ 988.050122] kobject: 'queues' (ffff8880a4c6f748): calling ktype release [ 988.056866] kobject: 'queues' (ffff8880a4c6f748): kset_release [ 988.062859] kobject: 'queues': free name [ 988.067075] kobject: 'veth3' (ffff888049977130): kobject_uevent_env [ 988.073502] kobject: 'veth3' (ffff888049977130): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.084540] kobject: 'batman_adv' (ffff88805d67af80): kobject_uevent_env [ 988.091417] kobject: 'batman_adv' (ffff88805d67af80): kobject_uevent_env: filter function caused the event to drop! [ 988.102059] kobject: 'batman_adv' (ffff88805d67af80): kobject_cleanup, parent (null) [ 988.110838] kobject: 'batman_adv' (ffff88805d67af80): calling ktype release [ 988.117939] kobject: (ffff88805d67af80): dynamic_kobj_release [ 988.123972] kobject: 'batman_adv': free name [ 988.128470] kobject: 'rx-0' (ffff888046d91850): kobject_cleanup, parent ffff888093fae148 [ 988.136755] kobject: 'rx-0' (ffff888046d91850): auto cleanup 'remove' event [ 988.143879] kobject: 'rx-0' (ffff888046d91850): kobject_uevent_env [ 988.150499] kobject: 'rx-0' (ffff888046d91850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.160627] kobject: 'rx-0' (ffff888046d91850): auto cleanup kobject_del [ 988.167476] kobject: 'rx-0' (ffff888046d91850): calling ktype release [ 988.174077] kobject: 'rx-0': free name [ 988.177976] kobject: 'tx-0' (ffff88807b0ebd18): kobject_cleanup, parent ffff888093fae148 [ 988.186220] kobject: 'tx-0' (ffff88807b0ebd18): auto cleanup 'remove' event [ 988.193331] kobject: 'tx-0' (ffff88807b0ebd18): kobject_uevent_env [ 988.199625] kobject: 'tx-0' (ffff88807b0ebd18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.209686] kobject: 'tx-0' (ffff88807b0ebd18): auto cleanup kobject_del [ 988.216552] kobject: 'tx-0' (ffff88807b0ebd18): calling ktype release [ 988.223141] kobject: 'tx-0': free name [ 988.227025] kobject: 'queues' (ffff888093fae148): kobject_cleanup, parent (null) [ 988.235445] kobject: 'queues' (ffff888093fae148): calling ktype release [ 988.242212] kobject: 'queues' (ffff888093fae148): kset_release [ 988.248164] kobject: 'queues': free name [ 988.252478] kobject: 'veth2' (ffff88804a699170): kobject_uevent_env [ 988.258880] kobject: 'veth2' (ffff88804a699170): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.269766] kobject: 'batman_adv' (ffff88809af14200): kobject_uevent_env [ 988.276634] kobject: 'batman_adv' (ffff88809af14200): kobject_uevent_env: filter function caused the event to drop! [ 988.287507] kobject: 'batman_adv' (ffff88809af14200): kobject_cleanup, parent (null) [ 988.297480] kobject: 'batman_adv' (ffff88809af14200): calling ktype release [ 988.304619] kobject: (ffff88809af14200): dynamic_kobj_release [ 988.310841] kobject: 'batman_adv': free name [ 988.350249] kobject: 'rx-0' (ffff8880a5449e50): kobject_cleanup, parent ffff8880a66c6e48 [ 988.358520] kobject: 'rx-0' (ffff8880a5449e50): auto cleanup 'remove' event [ 988.365658] kobject: 'rx-0' (ffff8880a5449e50): kobject_uevent_env [ 988.372050] kobject: 'rx-0' (ffff8880a5449e50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.382129] kobject: 'rx-0' (ffff8880a5449e50): auto cleanup kobject_del [ 988.389417] kobject: 'rx-0' (ffff8880a5449e50): calling ktype release [ 988.396013] kobject: 'rx-0': free name [ 988.399923] kobject: 'tx-0' (ffff888090336098): kobject_cleanup, parent ffff8880a66c6e48 [ 988.408266] kobject: 'tx-0' (ffff888090336098): auto cleanup 'remove' event [ 988.415600] kobject: 'tx-0' (ffff888090336098): kobject_uevent_env [ 988.421940] kobject: 'tx-0' (ffff888090336098): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.432001] kobject: 'tx-0' (ffff888090336098): auto cleanup kobject_del [ 988.438865] kobject: 'tx-0' (ffff888090336098): calling ktype release [ 988.445484] kobject: 'tx-0': free name [ 988.449372] kobject: 'queues' (ffff8880a66c6e48): kobject_cleanup, parent (null) [ 988.457804] kobject: 'queues' (ffff8880a66c6e48): calling ktype release [ 988.464616] kobject: 'queues' (ffff8880a66c6e48): kset_release [ 988.470626] kobject: 'queues': free name [ 988.474866] kobject: 'hsr0' (ffff88805a97e5f0): kobject_uevent_env [ 988.481223] kobject: 'hsr0' (ffff88805a97e5f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 988.491848] kobject: 'batman_adv' (ffff88809af14e80): kobject_uevent_env