f, 0x100000000, 0x3f, 0x2cb}, 0x5, 0x6e6bc0, 0x2, 0x1, 0x2}, {{@in=@broadcast, 0x4d6, 0x33}, 0x2, @in, 0x0, 0x4, 0x2, 0xfff, 0x0, 0x7, 0x2a5}}, 0xe8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x101, @mcast1, 0x3}}, 0x40e, 0x8001, 0x8, 0x2, 0x80}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000480)={r3, @in={{0x2, 0x4e21, @loopback}}, 0x3, 0x8}, 0x88) [ 282.739378] FAULT_INJECTION: forcing a failure. [ 282.739378] name failslab, interval 1, probability 0, space 0, times 0 [ 282.760180] CPU: 0 PID: 21394 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #181 [ 282.767577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.776927] Call Trace: [ 282.776965] dump_stack+0x1c4/0x2b4 [ 282.776983] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.777006] should_fail.cold.4+0xa/0x17 [ 282.792521] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.797639] ? audit_filter+0x67d/0xda0 [ 282.801623] ? lock_downgrade+0x900/0x900 [ 282.805797] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 282.811595] ? save_stack+0x43/0xd0 [ 282.811613] ? kmem_cache_alloc+0x12e/0x730 [ 282.811632] ? __ia32_compat_sys_open+0x79/0xb0 [ 282.819580] ? auditd_test_task+0x206/0x370 [ 282.819612] ? lock_downgrade+0x900/0x900 [ 282.832774] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 21:59:15 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:15 executing program 2 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 282.838580] ? audit_compare_dname_path+0xb0/0xb0 [ 282.843449] ? __lookupn_profile+0x2a8/0x560 [ 282.847884] __should_failslab+0x124/0x180 [ 282.852124] should_failslab+0x9/0x14 [ 282.855929] kmem_cache_alloc+0x47/0x730 [ 282.859998] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 282.865823] ? kasan_check_read+0x11/0x20 [ 282.865841] ? audit_file_mask+0x180/0x180 [ 282.865856] audit_log_start+0x554/0x9d0 [ 282.865875] ? audit_serial+0x30/0x30 [ 282.882143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.887691] ? refcount_sub_and_test_checked+0x203/0x310 [ 282.893165] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 282.898620] ? aa_find_child+0xd0/0xd0 [ 282.902535] ? ima_match_policy+0x848/0x1560 [ 282.902550] ? lock_downgrade+0x900/0x900 [ 282.902569] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 282.916642] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 282.922214] ? __aafs_ns_mkdir+0xca0/0xca0 [ 282.922251] ? audit_file_mask+0x180/0x180 [ 282.930728] common_lsm_audit+0x112/0x2200 [ 282.935006] ? aa_lookup_profile+0x30/0x30 [ 282.939271] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 282.942773] FAULT_INJECTION: forcing a failure. [ 282.942773] name failslab, interval 1, probability 0, space 0, times 0 [ 282.944044] ? mark_held_locks+0x130/0x130 [ 282.944062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.944088] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 282.957947] rtc_cmos 00:00: Alarms can be up to one day in the future [ 282.959485] ? fqlookupn_profile+0x88/0xc0 [ 282.959501] ? __sanitizer_cov_trace_cmp4+0x16/0x20 21:59:15 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x77a82d22, 0x7, 0x9, 0x763, 0x1}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000140)={r1, 0x1}, 0x8) ioctl$RTC_AIE_ON(r0, 0x7001) fstatfs(r0, &(0x7f0000000000)=""/191) [ 282.959523] ? aa_label_strn_parse+0x1d6/0x1230 [ 282.991062] aa_audit+0x21d/0x740 [ 282.994543] ? audit_file_mask+0x180/0x180 [ 282.998817] aa_audit_file+0x53d/0xa20 [ 283.002730] ? update_file_ctx+0x340/0x340 [ 283.006976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.012528] ? refcount_add_not_zero_checked+0x330/0x330 [ 283.018029] aa_change_profile+0x1736/0x3260 [ 283.022457] ? aa_change_hat+0x1890/0x1890 [ 283.026711] ? is_bpf_text_address+0xd3/0x170 [ 283.031245] ? __mutex_lock+0x85e/0x1700 [ 283.035324] ? proc_pid_attr_write+0x28a/0x540 [ 283.039916] ? mutex_trylock+0x2b0/0x2b0 [ 283.043971] ? save_stack+0xa9/0xd0 [ 283.047593] ? save_stack+0x43/0xd0 [ 283.051209] ? kasan_kmalloc+0xc7/0xe0 [ 283.055120] ? __kmalloc_track_caller+0x14a/0x750 [ 283.059957] ? memdup_user+0x2c/0xa0 [ 283.063685] ? proc_pid_attr_write+0x198/0x540 [ 283.068263] ? __vfs_write+0x119/0x9f0 [ 283.072148] ? vfs_write+0x1fc/0x560 [ 283.075860] ? ksys_write+0x101/0x260 [ 283.079660] ? __ia32_sys_write+0x71/0xb0 [ 283.083809] ? do_fast_syscall_32+0x34d/0xfb2 [ 283.088301] ? entry_SYSENTER_compat+0x70/0x7f [ 283.092983] ? mark_held_locks+0x130/0x130 [ 283.097232] apparmor_setprocattr+0xaa4/0x1150 [ 283.101821] ? apparmor_task_kill+0xcb0/0xcb0 [ 283.106322] ? lock_downgrade+0x900/0x900 [ 283.110475] ? arch_local_save_flags+0x40/0x40 [ 283.115076] security_setprocattr+0x66/0xc0 [ 283.119398] proc_pid_attr_write+0x301/0x540 [ 283.123817] __vfs_write+0x119/0x9f0 [ 283.127555] ? proc_loginuid_write+0x4f0/0x4f0 [ 283.132136] ? kernel_read+0x120/0x120 [ 283.136052] ? lock_release+0x970/0x970 [ 283.140034] ? arch_local_save_flags+0x40/0x40 [ 283.144623] ? fsnotify_first_mark+0x350/0x350 [ 283.149203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.154786] ? check_preemption_disabled+0x48/0x200 [ 283.159804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.165343] ? __sb_start_write+0x1b2/0x370 [ 283.169666] vfs_write+0x1fc/0x560 [ 283.173206] ksys_write+0x101/0x260 [ 283.176842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.182419] ? __ia32_sys_read+0xb0/0xb0 [ 283.186483] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 283.191949] ? mm_fault_error+0x380/0x380 [ 283.196129] __ia32_sys_write+0x71/0xb0 [ 283.200107] do_fast_syscall_32+0x34d/0xfb2 [ 283.204431] ? do_int80_syscall_32+0x890/0x890 [ 283.209019] ? entry_SYSENTER_compat+0x68/0x7f [ 283.213600] ? trace_hardirqs_off_caller+0xbb/0x310 [ 283.218629] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.223481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.228327] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.233348] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.238365] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.243385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.248242] entry_SYSENTER_compat+0x70/0x7f [ 283.252645] RIP: 0023:0xf7f49ca9 [ 283.256011] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 283.274926] RSP: 002b:00000000f5f450cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 283.282648] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000280 [ 283.289928] RDX: 0000000000000654 RSI: 0000000000000000 RDI: 0000000000000000 [ 283.297201] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 283.304488] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 283.311754] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 283.323180] rtc_cmos 00:00: Alarms can be up to one day in the future [ 283.330451] CPU: 1 PID: 21406 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #181 [ 283.337827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.347179] Call Trace: [ 283.349785] dump_stack+0x1c4/0x2b4 [ 283.353428] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.358635] ? __kernel_text_address+0xd/0x40 [ 283.363137] ? unwind_get_return_address+0x61/0xa0 [ 283.368081] should_fail.cold.4+0xa/0x17 [ 283.372162] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.377290] ? save_stack+0xa9/0xd0 [ 283.380926] ? save_stack+0x43/0xd0 [ 283.383664] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 283.384557] ? kasan_kmalloc+0xc7/0xe0 [ 283.384573] ? __kmalloc_track_caller+0x14a/0x750 [ 283.384590] ? memdup_user+0x2c/0xa0 [ 283.391610] audit: out of memory in audit_log_start [ 283.395387] ? strndup_user+0x77/0xd0 [ 283.395403] ? __ia32_sys_request_key+0x13b/0x410 [ 283.395418] ? entry_SYSENTER_compat+0x70/0x7f [ 283.395435] ? __f_unlock_pos+0x19/0x20 [ 283.395454] ? lock_downgrade+0x900/0x900 [ 283.430255] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.435794] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 283.440985] ? fs_reclaim_acquire+0x20/0x20 [ 283.445304] ? lock_downgrade+0x900/0x900 [ 283.449453] ? ___might_sleep+0x1ed/0x300 [ 283.453615] ? arch_local_save_flags+0x40/0x40 [ 283.458205] ? lock_release+0x970/0x970 [ 283.462201] ? arch_local_save_flags+0x40/0x40 [ 283.466796] __should_failslab+0x124/0x180 [ 283.471029] should_failslab+0x9/0x14 [ 283.474827] __kmalloc_track_caller+0x2d0/0x750 [ 283.479495] ? strncpy_from_user+0x510/0x510 [ 283.483901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.489433] ? strndup_user+0x77/0xd0 [ 283.493240] memdup_user+0x2c/0xa0 [ 283.496795] strndup_user+0x77/0xd0 [ 283.500430] __ia32_sys_request_key+0x18b/0x410 [ 283.505102] ? __x64_sys_request_key+0x400/0x400 [ 283.509871] ? entry_SYSENTER_compat+0x70/0x7f [ 283.514468] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 283.519917] ? mm_fault_error+0x380/0x380 [ 283.524091] do_fast_syscall_32+0x34d/0xfb2 [ 283.528416] ? do_int80_syscall_32+0x890/0x890 [ 283.532999] ? entry_SYSENTER_compat+0x68/0x7f [ 283.537602] ? trace_hardirqs_off_caller+0xbb/0x310 [ 283.542619] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.547463] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.552303] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.557334] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.562350] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.567371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.572283] entry_SYSENTER_compat+0x70/0x7f [ 283.576684] RIP: 0023:0xf7f6aca9 [ 283.580078] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 283.598974] RSP: 002b:00000000f5f660cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 283.606680] RAX: ffffffffffffffda RBX: 0000000020000380 RCX: 00000000200003c0 [ 283.613974] RDX: 00000000200005c0 RSI: 0000000000000000 RDI: 0000000000000000 [ 283.621256] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 283.628521] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 283.635784] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 21:59:16 executing program 0 (fault-call:2 fault-nth:2): ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x3000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 283.667678] rtc_cmos 00:00: Alarms can be up to one day in the future [ 283.696582] FAULT_INJECTION: forcing a failure. [ 283.696582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.708405] CPU: 0 PID: 21419 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #181 [ 283.715781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.725164] Call Trace: [ 283.727760] dump_stack+0x1c4/0x2b4 [ 283.731392] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.736624] should_fail.cold.4+0xa/0x17 [ 283.740684] ? __update_load_avg_blocked_se+0x730/0x730 [ 283.746046] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.751148] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 283.756166] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 283.760956] ? mark_held_locks+0x130/0x130 [ 283.765189] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 283.770661] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.776212] ? kernel_poison_pages+0x15a/0x290 [ 283.780811] ? kasan_unpoison_shadow+0x35/0x50 [ 283.785395] ? preempt_count_add+0x7d/0x160 [ 283.789716] ? get_page_from_freelist+0x17ae/0x5340 [ 283.794730] ? rcu_bh_qs+0xc0/0xc0 [ 283.798270] ? unwind_dump+0x190/0x190 [ 283.802159] ? mark_held_locks+0x130/0x130 [ 283.806395] ? is_bpf_text_address+0xd3/0x170 [ 283.810887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.816422] ? should_fail+0x22d/0xd01 [ 283.820312] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.825419] __alloc_pages_nodemask+0x34b/0xde0 [ 283.830087] ? audit_filter+0x67d/0xda0 [ 283.834075] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 283.839087] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 283.844877] ? save_stack+0x43/0xd0 [ 283.848500] ? kmem_cache_alloc+0x12e/0x730 [ 283.852823] ? __ia32_compat_sys_open+0x79/0xb0 [ 283.857496] ? auditd_test_task+0x206/0x370 [ 283.861815] ? lock_downgrade+0x900/0x900 [ 283.865977] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 283.871772] ? trace_hardirqs_off+0xb8/0x310 [ 283.876180] cache_grow_begin+0x91/0x8c0 [ 283.880251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.885787] ? check_preemption_disabled+0x48/0x200 [ 283.890823] kmem_cache_alloc+0x665/0x730 [ 283.895011] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 283.900829] ? audit_file_mask+0x180/0x180 [ 283.905059] audit_log_start+0x554/0x9d0 [ 283.909123] ? audit_serial+0x30/0x30 [ 283.912925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.918462] ? refcount_sub_and_test_checked+0x203/0x310 [ 283.923913] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 283.929359] ? aa_find_child+0xd0/0xd0 [ 283.933262] ? ima_match_policy+0x848/0x1560 [ 283.937672] ? lock_downgrade+0x900/0x900 [ 283.941831] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.947373] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.952907] ? __aafs_ns_mkdir+0xca0/0xca0 [ 283.957166] ? audit_file_mask+0x180/0x180 [ 283.961400] common_lsm_audit+0x112/0x2200 [ 283.965633] ? aa_lookup_profile+0x30/0x30 [ 283.969878] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 283.974637] ? mark_held_locks+0x130/0x130 [ 283.978871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.984406] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.989988] ? fqlookupn_profile+0x88/0xc0 [ 283.994271] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 283.999289] ? aa_label_strn_parse+0x1d6/0x1230 [ 284.003975] aa_audit+0x21d/0x740 [ 284.007430] ? audit_file_mask+0x180/0x180 [ 284.011665] aa_audit_file+0x53d/0xa20 [ 284.015555] ? update_file_ctx+0x340/0x340 [ 284.019788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.025330] ? refcount_add_not_zero_checked+0x330/0x330 [ 284.030785] aa_change_profile+0x1736/0x3260 [ 284.035226] ? aa_change_hat+0x1890/0x1890 [ 284.039485] ? is_bpf_text_address+0xd3/0x170 [ 284.043986] ? __mutex_lock+0x85e/0x1700 [ 284.048043] ? proc_pid_attr_write+0x28a/0x540 [ 284.052626] ? mutex_trylock+0x2b0/0x2b0 [ 284.056687] ? save_stack+0xa9/0xd0 [ 284.060313] ? save_stack+0x43/0xd0 [ 284.063935] ? kasan_kmalloc+0xc7/0xe0 [ 284.067821] ? __kmalloc_track_caller+0x14a/0x750 [ 284.072671] ? memdup_user+0x2c/0xa0 [ 284.076394] ? proc_pid_attr_write+0x198/0x540 [ 284.080971] ? __vfs_write+0x119/0x9f0 [ 284.084868] ? vfs_write+0x1fc/0x560 [ 284.088582] ? ksys_write+0x101/0x260 [ 284.092378] ? __ia32_sys_write+0x71/0xb0 [ 284.096526] ? do_fast_syscall_32+0x34d/0xfb2 [ 284.101017] ? entry_SYSENTER_compat+0x70/0x7f [ 284.105599] ? mark_held_locks+0x130/0x130 [ 284.109838] apparmor_setprocattr+0xaa4/0x1150 [ 284.114423] ? apparmor_task_kill+0xcb0/0xcb0 [ 284.118938] ? lock_downgrade+0x900/0x900 [ 284.123097] ? arch_local_save_flags+0x40/0x40 [ 284.127717] security_setprocattr+0x66/0xc0 [ 284.132080] proc_pid_attr_write+0x301/0x540 [ 284.136490] __vfs_write+0x119/0x9f0 [ 284.140239] ? proc_loginuid_write+0x4f0/0x4f0 [ 284.144873] ? kernel_read+0x120/0x120 [ 284.148760] ? lock_release+0x970/0x970 [ 284.152746] ? arch_local_save_flags+0x40/0x40 [ 284.157328] ? fsnotify_first_mark+0x350/0x350 [ 284.161914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.167448] ? check_preemption_disabled+0x48/0x200 [ 284.172464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.178023] ? __sb_start_write+0x1b2/0x370 [ 284.182429] vfs_write+0x1fc/0x560 [ 284.186079] ksys_write+0x101/0x260 [ 284.189704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.195260] ? __ia32_sys_read+0xb0/0xb0 [ 284.199329] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 284.204781] ? mm_fault_error+0x380/0x380 [ 284.208928] __ia32_sys_write+0x71/0xb0 [ 284.212900] do_fast_syscall_32+0x34d/0xfb2 [ 284.217236] ? do_int80_syscall_32+0x890/0x890 [ 284.221851] ? entry_SYSENTER_compat+0x68/0x7f [ 284.226435] ? trace_hardirqs_off_caller+0xbb/0x310 [ 284.231449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.236308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.241148] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.246162] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.251176] ? prepare_exit_to_usermode+0x291/0x3b0 [ 284.256323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.261175] entry_SYSENTER_compat+0x70/0x7f [ 284.265576] RIP: 0023:0xf7f49ca9 [ 284.268959] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 284.287853] RSP: 002b:00000000f5f450cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 284.295560] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000280 [ 284.302851] RDX: 0000000000000654 RSI: 0000000000000000 RDI: 0000000000000000 [ 284.310114] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 21:59:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:17 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x57e}, 0xb) ioctl$RTC_AIE_ON(r0, 0x7001) [ 284.317380] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 284.324642] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 284.363618] rtc_cmos 00:00: Alarms can be up to one day in the future [ 284.399407] rtc_cmos 00:00: Alarms can be up to one day in the future [ 284.435014] audit: type=1400 audit(1539295157.153:42): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21418 comm="syz-executor0" 21:59:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000006a0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:17 executing program 2 (fault-call:0 fault-nth:2): request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x4c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:17 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000100)={0x4, 0x4000, 0x8001, 0x400, 0xffffffffffffff7f}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r1, 0x6562e6bf, 0x10, 0x9, 0x7}, &(0x7f00000000c0)=0x18) 21:59:17 executing program 0 (fault-call:2 fault-nth:3): ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$sndseq(r0, &(0x7f00000000c0)=[{0x2, 0x4, 0x3ff, 0x1, @tick=0x1, {0x10000, 0x1}, {0x80, 0xff}, @control={0x5, 0x7, 0x800}}], 0x1c) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@random={'trusted.', "2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34"}, &(0x7f0000000240)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x67, 0x2) [ 284.516047] rtc_cmos 00:00: Alarms can be up to one day in the future [ 284.521573] FAULT_INJECTION: forcing a failure. [ 284.521573] name failslab, interval 1, probability 0, space 0, times 0 [ 284.536755] rtc_cmos 00:00: Alarms can be up to one day in the future [ 284.544605] CPU: 0 PID: 21441 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #181 [ 284.552001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.561350] Call Trace: [ 284.563957] dump_stack+0x1c4/0x2b4 [ 284.567592] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.572805] should_fail.cold.4+0xa/0x17 [ 284.576867] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.581970] ? __save_stack_trace+0x8d/0xf0 [ 284.586300] ? save_stack+0xa9/0xd0 [ 284.589925] ? save_stack+0x43/0xd0 [ 284.593556] ? kasan_kmalloc+0xc7/0xe0 [ 284.597439] ? kasan_slab_alloc+0x12/0x20 [ 284.601591] ? kmem_cache_alloc_node+0x144/0x730 [ 284.606347] ? __alloc_skb+0x119/0x770 [ 284.610247] ? audit_log_start+0x57c/0x9d0 [ 284.614483] ? common_lsm_audit+0x112/0x2200 [ 284.618892] ? aa_audit+0x21d/0x740 [ 284.622521] ? aa_audit_file+0x53d/0xa20 [ 284.626582] ? aa_change_profile+0x1736/0x3260 [ 284.631163] ? apparmor_setprocattr+0xaa4/0x1150 [ 284.635923] ? security_setprocattr+0x66/0xc0 [ 284.640418] ? proc_pid_attr_write+0x301/0x540 [ 284.644998] ? __vfs_write+0x119/0x9f0 [ 284.648884] ? vfs_write+0x1fc/0x560 [ 284.652597] ? ksys_write+0x101/0x260 [ 284.656398] ? __ia32_sys_write+0x71/0xb0 [ 284.660545] ? do_fast_syscall_32+0x34d/0xfb2 [ 284.665071] ? entry_SYSENTER_compat+0x70/0x7f [ 284.669673] ? unwind_get_return_address+0x61/0xa0 [ 284.674631] ? __save_stack_trace+0x8d/0xf0 [ 284.678984] ? save_stack+0xa9/0xd0 [ 284.682613] __should_failslab+0x124/0x180 [ 284.686881] should_failslab+0x9/0x14 [ 284.690700] kmem_cache_alloc_node_trace+0x5a/0x740 [ 284.695716] ? kasan_unpoison_shadow+0x35/0x50 [ 284.700310] ? kasan_kmalloc+0xc7/0xe0 [ 284.704201] ? check_preemption_disabled+0x48/0x200 [ 284.709244] __kmalloc_node_track_caller+0x33/0x70 [ 284.714173] __kmalloc_reserve.isra.39+0x41/0xe0 [ 284.718926] __alloc_skb+0x155/0x770 [ 284.722639] ? skb_scrub_packet+0x490/0x490 [ 284.726955] ? trace_hardirqs_on+0xbd/0x310 [ 284.731290] ? audit_log_start+0x554/0x9d0 [ 284.735522] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 284.740973] ? kasan_unpoison_shadow+0x35/0x50 [ 284.745568] ? kasan_kmalloc+0xc7/0xe0 [ 284.749473] ? check_preemption_disabled+0x48/0x200 [ 284.754490] ? kasan_slab_alloc+0x12/0x20 [ 284.758640] ? kmem_cache_alloc+0x306/0x730 [ 284.762970] ? audit_file_mask+0x180/0x180 [ 284.767207] audit_log_start+0x57c/0x9d0 [ 284.771328] ? audit_serial+0x30/0x30 [ 284.775143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.780688] ? refcount_sub_and_test_checked+0x203/0x310 [ 284.786138] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 284.791582] ? aa_find_child+0xd0/0xd0 [ 284.795469] ? ima_match_policy+0x848/0x1560 [ 284.799875] ? lock_downgrade+0x900/0x900 [ 284.804018] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 284.809554] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 284.815091] ? __aafs_ns_mkdir+0xca0/0xca0 [ 284.819331] ? audit_file_mask+0x180/0x180 [ 284.823571] common_lsm_audit+0x112/0x2200 [ 284.827807] ? aa_lookup_profile+0x30/0x30 [ 284.832047] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 284.836807] ? mark_held_locks+0x130/0x130 [ 284.841044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.846581] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 284.852130] ? fqlookupn_profile+0x88/0xc0 [ 284.856370] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 284.861416] ? aa_label_strn_parse+0x1d6/0x1230 [ 284.866097] ? ima_get_action+0x7e/0xa0 [ 284.870090] aa_audit+0x21d/0x740 [ 284.873544] ? audit_file_mask+0x180/0x180 [ 284.877779] aa_audit_file+0x53d/0xa20 [ 284.881663] ? update_file_ctx+0x340/0x340 [ 284.885896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.891449] ? refcount_add_not_zero_checked+0x330/0x330 [ 284.896923] aa_change_profile+0x1736/0x3260 [ 284.901349] ? aa_change_hat+0x1890/0x1890 [ 284.905586] ? is_bpf_text_address+0xd3/0x170 [ 284.910086] ? __mutex_lock+0x85e/0x1700 [ 284.914141] ? proc_pid_attr_write+0x28a/0x540 [ 284.918721] ? mutex_trylock+0x2b0/0x2b0 [ 284.922780] ? save_stack+0xa9/0xd0 [ 284.926404] ? save_stack+0x43/0xd0 [ 284.930025] ? kasan_kmalloc+0xc7/0xe0 [ 284.933908] ? __kmalloc_track_caller+0x14a/0x750 [ 284.938747] ? memdup_user+0x2c/0xa0 [ 284.942458] ? proc_pid_attr_write+0x198/0x540 [ 284.947050] ? __vfs_write+0x119/0x9f0 [ 284.950930] ? vfs_write+0x1fc/0x560 [ 284.954637] ? ksys_write+0x101/0x260 [ 284.958438] ? __ia32_sys_write+0x71/0xb0 [ 284.962589] ? do_fast_syscall_32+0x34d/0xfb2 [ 284.967111] ? entry_SYSENTER_compat+0x70/0x7f [ 284.971686] ? mark_held_locks+0x130/0x130 [ 284.975920] apparmor_setprocattr+0xaa4/0x1150 [ 284.980511] ? apparmor_task_kill+0xcb0/0xcb0 [ 284.985002] ? lock_downgrade+0x900/0x900 [ 284.989151] ? arch_local_save_flags+0x40/0x40 [ 284.993748] security_setprocattr+0x66/0xc0 [ 284.998102] proc_pid_attr_write+0x301/0x540 [ 285.002507] __vfs_write+0x119/0x9f0 [ 285.006238] ? proc_loginuid_write+0x4f0/0x4f0 [ 285.010819] ? kernel_read+0x120/0x120 [ 285.014717] ? lock_release+0x970/0x970 [ 285.018693] ? arch_local_save_flags+0x40/0x40 [ 285.023273] ? fsnotify_first_mark+0x350/0x350 [ 285.027851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.033384] ? check_preemption_disabled+0x48/0x200 [ 285.038417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.043951] ? __sb_start_write+0x1b2/0x370 [ 285.048276] vfs_write+0x1fc/0x560 [ 285.051815] ksys_write+0x101/0x260 [ 285.055440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.060975] ? __ia32_sys_read+0xb0/0xb0 [ 285.065035] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 285.070486] ? mm_fault_error+0x380/0x380 [ 285.074663] __ia32_sys_write+0x71/0xb0 [ 285.078637] do_fast_syscall_32+0x34d/0xfb2 [ 285.082957] ? do_int80_syscall_32+0x890/0x890 [ 285.087537] ? entry_SYSENTER_compat+0x68/0x7f [ 285.092135] ? trace_hardirqs_off_caller+0xbb/0x310 [ 285.097150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.101988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.106838] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.111852] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 285.116869] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.121902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.126743] entry_SYSENTER_compat+0x70/0x7f [ 285.131160] RIP: 0023:0xf7f49ca9 [ 285.134528] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 285.153421] RSP: 002b:00000000f5f450cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 285.161126] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000280 21:59:17 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 285.168407] RDX: 0000000000000654 RSI: 0000000000000000 RDI: 0000000000000000 [ 285.175673] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 285.182937] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 285.190203] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 21:59:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:18 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x200, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x102d) 21:59:18 executing program 2: request_key(&(0x7f0000000380)='.ns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 285.346564] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 285.353680] audit: out of memory in audit_log_start [ 285.372634] rtc_cmos 00:00: Alarms can be up to one day in the future 21:59:18 executing program 0 (fault-call:2 fault-nth:4): ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) [ 285.399913] rtc_cmos 00:00: Alarms can be up to one day in the future [ 285.450687] audit: type=1400 audit(1539295158.173:43): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21474 comm="syz-executor0" 21:59:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000b0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:18 executing program 2: request_key(&(0x7f0000000380)="646e735f7265736f6c7665720f", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x4c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)="2f67726f3c23fb57e6c60f1f4b45b74d999a9acc2ce15b26e5f918a1423a9cd12dcea440d899c22c652bffcd4485f4535fa7395bc5583a651b4a7db7f30cf78d5ea15f1084de0cd2e9f2bd81e9bdeeee03000000000000005b540745df4bcf72cabb2a234cf344c71dee483b157624c5bc", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73797374656d2e2f6465762f72746330002e3f56c8ba33b6125f69603f18504e59d1fc4fef72489187f48a6fbf1bf973abcbc431e4b9640c2dee223825833958969c24abc4dd87754392e9de37e57c28c4d97c4971e8360beebb00fb3648a60e2b913e7b13e6d6b57c8d0ea57d23bac981f05f2611647ec3e15d0844efb3671c7e40845db07404b08151993543913bdc16d287522a006e925212a513be8f9d1fb3a7753d33916c694d9a44f7f0b924b352642d2eb567bcc94ecc000000000000000051e20215df778864df43a5327817e86ccf63c85daa4ab4693d5e55"], &(0x7f00000001c0)=""/232, 0xe8) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x11f000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) 21:59:18 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:18 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 285.581163] audit: type=1400 audit(1539295158.303:44): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21487 comm="syz-executor0" 21:59:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x4c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:18 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000240000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:18 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'"tack ', '::\n'}, 0x654) 21:59:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x8, 0xca, &(0x7f0000000000), 0x10) 21:59:18 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 285.700667] audit: type=1400 audit(1539295158.423:45): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=21502 comm="syz-executor0" 21:59:18 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'s%ack ', '::\n'}, 0x654) [ 285.817260] audit: type=1400 audit(1539295158.543:46): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=21523 comm="syz-executor0" 21:59:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x400000000000000, 0xca, &(0x7f0000000000), 0x10) 21:59:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000b00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:18 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:18 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'s"ack ', '::\n'}, 0x654) 21:59:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000000c0)="1b833b1d13da9705488addff119d15b263058771a005549cada48d34dd088db6de4201dc2956790b9d984b84f5be75") clock_gettime(0x0, &(0x7f0000000180)) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xa4) [ 285.974481] audit: type=1400 audit(1539295158.693:47): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=21530 comm="syz-executor0" 21:59:18 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'st%ck ', '::\n'}, 0x654) 21:59:18 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x83}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xca, &(0x7f0000000000), 0x10) 21:59:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000ffffe6ce00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:18 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'sta%k ', '::\n'}, 0x654) 21:59:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1000000, 0xca, &(0x7f0000000000), 0x10) 21:59:18 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:18 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'sta"k ', '::\n'}, 0x654) 21:59:19 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}, 0x40b}}, 0x2, 0x100000000, 0xffff, "4b66a12b7fa482b82bbf77cb706237691c1f70c3b16ebdf020b9b1e580f05b981523a1a2132ab707dd0117c1b9d7f2f01577cc9d47ca2035fd4d5a9e7a8e39a90701278c9f7db2c4d9a229c5d2d2aefb"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) sendmmsg$alg(r1, &(0x7f00000000c0), 0x0, 0x10) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000007000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x4, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 2: request_key(&(0x7f0000000380)="646e735f7265736f6c76657202", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack%', '::\n'}, 0x654) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack/', '::\n'}, 0x654) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0xac14141b00000000, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x43}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000700000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x4000000, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:19 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7a}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f000000, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x4, 0x200, 0x7, 0x7768, 0xa, [{0x8, 0x6dd2db26, 0xfffffffffffffffe, 0x0, 0x0, 0x4}, {0x6000, 0x9b1, 0x4, 0x0, 0x0, 0x2200}, {0x7e, 0x1, 0x3, 0x0, 0x0, 0x80}, {0x101, 0x80000000000000, 0x4, 0x0, 0x0, 0x1088}, {0x20, 0x4, 0x7ff, 0x0, 0x0, 0x8}, {0x4, 0x32f, 0x6, 0x0, 0x0, 0x1204}, {0x9, 0x0, 0xff, 0x0, 0x0, 0x1000}, {0x1, 0xffffffffffffffff, 0x80000001, 0x0, 0x0, 0x80}, {0xbdc2, 0x3, 0x4, 0x0, 0x0, 0x503}, {0x1, 0x4, 0x5d, 0x0, 0x0, 0x208}]}) 21:59:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000001000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0xac14141b, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '":\n'}, 0x654) 21:59:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000e000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:19 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0xff00, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '%:\n'}, 0x654) 21:59:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:19 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000e00000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000500)={{0x8, 0x7, 0xf4a3, 0x100000001, 'syz0\x00', 0x1}, 0x6, 0x30, 0x9, r1, 0x8, 0x9, 'syz0\x00', &(0x7f00000001c0)=["2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", "2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", "2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", "2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", '\x00', 'ppp0/#:/&security*/{\x00', "2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", '\x00'], 0x21a, [], [0x9, 0x7, 0x2, 0x8]}) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '&:\n'}, 0x654) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0xff000000, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xfa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:19 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:19 executing program 2: request_key(&(0x7f0000000380)="646e735f7265736f6c76657205", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000040000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', ':"\n'}, 0x654) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x2000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1b1414ac, 0xca, &(0x7f0000000000), 0x10) 21:59:19 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', ':%\n'}, 0x654) 21:59:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000001c0)=""/205) clock_gettime(0x0, &(0x7f0000000180)) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'sy.'}, &(0x7f00000005c0)="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", 0x0) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000400000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0xff00000000000000, 0xca, &(0x7f0000000000), 0x10) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', ':&\n'}, 0x654) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x100000000000000, 0xca, &(0x7f0000000000), 0x10) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', ':=\n'}, 0x654) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000002000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::"'}, 0x654) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x800000000000000, 0xca, &(0x7f0000000000), 0x10) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000e00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000500)="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", &(0x7f00000000c0)=""/64}, 0x18) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) fanotify_mark(r0, 0xa8, 0x29, r0, &(0x7f0000000140)='./file0\x00') 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x2000000}, &(0x7f00000005c0)="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", 0x0) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\t'}, 0x654) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x8000000, 0xca, &(0x7f0000000000), 0x10) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000200000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x5000000}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd1, &(0x7f0000000000), 0x10) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3a3a02"}, 0x654) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000015000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x2}, &(0x7f00000005c0)="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", 0x0) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcb, &(0x7f0000000000), 0x10) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::,'}, 0x654) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:20 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000100)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000039d8c000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x500000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000006a000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::/'}, 0x654) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcc, &(0x7f0000000000), 0x10) 21:59:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3a3aef"}, 0x654) 21:59:20 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf00000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcd, &(0x7f0000000000), 0x10) 21:59:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x74000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000001f400000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:21 executing program 3: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6, 0x68000) openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0xc000, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x80, 0x4) socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd0, &(0x7f0000000000), 0x10) 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3a3ab6"}, 0x654) 21:59:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7a00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:21 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf000000}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000001500000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd2, &(0x7f0000000000), 0x10) 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x200008d4) 21:59:21 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x1000000}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xfa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000ffffe6ce000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 288.428699] kauditd_printk_skb: 18 callbacks suppressed [ 288.428710] audit: type=1400 audit(1539295161.153:66): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21885 comm="syz-executor0" 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x65d) [ 288.559237] audit: type=1400 audit(1539295161.283:67): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21903 comm="syz-executor0" 21:59:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) fremovexattr(r0, &(0x7f0000000140)=@known='trusted.overlay.upper\x00') clock_gettime(0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x4, 0x1, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)) kcmp(r1, r2, 0x0, r0, r0) ioctl$NBD_DISCONNECT(r0, 0xab08) 21:59:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000000), 0x10) 21:59:21 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x500}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000006a00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:21 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x80) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', "656d3147504ca200"}, 0xe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe(&(0x7f0000000000)) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000000)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f00000002c0)={0x78, 0xffffffffffffffda, 0x8, {0x5, 0x8000, 0x0, {0x0, 0x8, 0x7, 0x5, 0x1, 0xfffffffffffffe01, 0xe349, 0x3, 0x7fff, 0x0, 0xffffffff, r1, r2, 0xffff, 0x1000}}}, 0x78) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000200), 0x2) write$apparmor_exec(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="0000922029bc3a5cc7"], 0x654) [ 288.708275] audit: type=1400 audit(1539295161.433:68): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21916 comm="syz-executor0" 21:59:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc9, &(0x7f0000000000), 0x10) 21:59:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000034000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:21 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf00}, &(0x7f00000005c0)="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", 0x0) 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '::\n'}, 0x9) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)=0x200) 21:59:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x83000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000), 0x10) 21:59:21 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x5}, &(0x7f00000005c0)="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", 0x0) 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="73745b4bd3633a3a0a"], 0x654) 21:59:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x1000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000b000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0xfffffffffffffd73) 21:59:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd3, &(0x7f0000000000), 0x10) 21:59:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:21 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000ffffffff000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) [ 289.074656] audit: type=1400 audit(1539295161.793:69): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21969 comm="syz-executor0" [ 289.158440] audit: type=1400 audit(1539295161.883:70): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21985 comm="syz-executor0" 21:59:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x400003, &(0x7f0000000180)) 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x10) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) ioctl$FICLONE(r0, 0x40049409, r0) 21:59:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000003e800000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x1f00000000000000, 0x10) [ 289.328561] audit: type=1400 audit(1539295162.053:71): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=21993 comm="syz-executor0" 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3f, 0x101000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000100)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7300ae986892de00000000000000"], 0x654) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xc4a, 0x0) write$P9_RLERROR(r2, &(0x7f0000000080)={0x25, 0x7, 0x1, {0x1c, '/proc/thread-self/attr/exec\x00'}}, 0x25) 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x53}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000039d8c00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474020e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) clock_gettime(0x0, &(0x7f0000000180)) 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") pkey_alloc(0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x8) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000005c0)=""/202) 21:59:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000240000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x400000000000000, 0x10) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x1f000000, 0x10) 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="737461e36b203a3a0a"], 0x654) [ 289.589507] audit: type=1400 audit(1539295162.313:72): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22035 comm="syz-executor0" 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000001500000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x654) [ 289.705794] audit: type=1400 audit(1539295162.433:73): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=22050 comm="syz-executor0" 21:59:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2b00000006000000000000000000000003000200000000000000552300"], 0x2b) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0x0, @remote, 0x4e20, 0x0, 'sh\x00', 0x2, 0x9, 0x7d}, 0x2c) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x190a) clock_gettime(0x0, &(0x7f0000000180)) 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0xac14141b, 0x10) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c10f39a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000004002000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@loopback, @in=@multicast2}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) ioprio_set$uid(0x3, r1, 0x9) [ 289.934055] audit: type=1400 audit(1539295162.653:74): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22075 comm="syz-executor0" 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x4, 0x10) 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) write$FUSE_ATTR(r1, &(0x7f00000002c0)={0x78, 0xffffffffffffffda, 0x2, {0x9, 0x400, 0x0, {0x6, 0x7, 0x1, 0x80000000, 0x200, 0x1, 0x1, 0xff, 0x4, 0x2, 0x2, r2, r3, 0x1f, 0x1}}}, 0x78) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000a00000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0xff00000000000000, 0x10) [ 290.078472] audit: type=1400 audit(1539295162.803:75): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22097 comm="syz-executor0" 21:59:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x2, 0x5) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[], 0x0) 21:59:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000000c0)) r1 = pkey_alloc(0x0, 0x1) pkey_free(r1) 21:59:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x4000000, 0x10) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000007000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x74}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:22 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x8000000, 0x10) 21:59:23 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="73742a0cf045a668af9451ea66bbfbdbcc13b166636b203a3a0a"], 0x654) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x8000, 0x18000000000}, {0x800, 0x1}], r1}, 0x18, 0x1) 21:59:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000900000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x58}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) r1 = gettid() write$cgroup_pid(r0, &(0x7f00000000c0)=r1, 0x12) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x1f00, 0x10) 21:59:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10800, 0x0) r2 = getpgid(0x0) getrlimit(0x1, &(0x7f00000000c0)) mq_notify(r1, &(0x7f0000000080)={0x0, 0x1e, 0x0, @tid=r2}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10000, 0x101000) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f0000000100)=""/172, 0x211000, 0x1800, 0x7fff}, 0x18) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000001f4000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0xff00, 0x10) 21:59:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000006a00000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)="5f8aa6fae290a7c3ca5e077fa7a0e4214135f643e988720a56fda97fca64f0938d3cedf9a73014149b83688fc09427a2cc9eb8228c55bac4522af7ddac4f10851bf25204a6e5679b1e2acafd795a85456c8d08504a0b7290d6e1ada95df43226b2fcb3a0937953574588b8baddd4155438155c67f06cd8180921f58b5d105b4b78ce30144e9f98e2d5610e099aa5393250b3c27af0ccedac5168c27b013e59c3a4d1b7c04ad2d883e300051879418a0d564c36af0f12fcd8811099144a6b60669573dc754dd2bc068f60999fba3c56f822b361326b6e28548f05113fef2e520ce139158d7eba2059007d92f44e1686d32d1020c22194ec7d", 0xf8) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='s\x00\x00\x00\x00\x00\x00\x00\x00'], 0x654) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') fsetxattr$security_evm(r2, &(0x7f0000000240)='security.evm\x00', &(0x7f0000000500)=@v2={0x5, 0x2, 0xf, 0x6, 0x1000, "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"}, 0x100a, 0x1) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md5\x00'}, 0x58) r3 = accept4$alg(r1, 0x0, 0x0, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000200)=0x10000) perf_event_open(&(0x7f0000000180)={0x2, 0xf4, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r2, &(0x7f0000000000), 0x1000f) accept4$alg(r3, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)) getuid() 21:59:23 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) modify_ldt$read(0x0, &(0x7f0000000000)=""/247, 0xf7) 21:59:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000b00000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x8, 0x10) 21:59:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x800000000000000, 0x10) 21:59:23 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f00000000c0)="2d210e00", 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r2, 0x0, 0x5, &(0x7f0000000080)='--&}\x00', r3}, 0x30) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="09000005466e000000"], 0x654) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000008c9d030000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x600}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x100000000000000, 0x10) 21:59:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000), 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000009000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:23 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x34, "54994024a83e03919cf035c75a46eb56b1ef14380dfed199a4ec503b1e805b9a447d874f9e69768bf902abb3eaf65c1712903ba7"}, &(0x7f0000000080)=0x3c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e21, 0xb81, @mcast1, 0x2}}, 0x3, 0x3}, 0x88) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) fremovexattr(r2, &(0x7f0000000180)=@random={'os2.', 'stack '}) 21:59:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db10000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0xff000000, 0x10) 21:59:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000700000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x1000000, 0x10) 21:59:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:23 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:23 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '::\n'}, 0x8d2) 21:59:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x1b1414ac, 0x10) 21:59:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)="2f67726f3c23fb57e65e9ebdaa45b74d999a9a8c2ce15b26e518a4cbb0da1f3f2d1e217a7fa7b91f803a9cd12dcea440f3fef6e02e2be389de133945a38500800000ee5d03000000000000005b540745df4b1dee483b157624c5bc719a099e6a34237ab6454d1cd89420c68e78bd140ea6019cd87ceae25ee1db8677b4228f062516888dedaafbdcabae16b0b78d9939aca75416bf3a5303db22508f74c09576d8ad4072b87816206ba94a226e7120de8136b8cd52eea7a3815f3d46b83d2783fc74b44f7331c7b58bfcb87e42646363c802833e3706b27881185b7fc3a24fae8ee823e88650023328cf4ab2a49d2416d2c1f5e3462e9577ef59787f9909650d461425d0597e2ae7f7cd91701d7050e1960a111bbc838bf676bce689e4aac2c1883ad677bd89c742be35763a42c27362cb8d9ee015c7c90e1f1a567a6b9d0b0d7af5ccb8956b7a1bbd2e1bdad46fa991f9294b1cdf4803fb2e4812a3b01c667d6e514680dc41e62fd19097fb6b9e4f07f23f75", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000010000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000600)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sync_file_range(r0, 0x1ff, 0xfffffffeffffffff, 0x4) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0x0, [], [{0x20, 0x8, 0x10000005, 0x1, 0x8001, 0x2}, {0x80000000, 0x1, 0x7fff, 0x40, 0x80000001, 0xf864}], [[], [], [], [], [], [], [], []]}) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x200, 0x5a4}, &(0x7f0000000580)=0x8) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000240)) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000140)={r2, &(0x7f0000000080)=""/135}) 21:59:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xfa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000003400000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0xac14141b00000000, 0x10) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 291.418070] QAT: Invalid ioctl [ 291.423498] QAT: Invalid ioctl [ 291.433345] QAT: Invalid ioctl [ 291.440313] QAT: Invalid ioctl 21:59:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x30000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000003e8000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x20000010) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffec1, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x5}}, 0xffffffffffffff3d) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000280)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r1, 0x7}}, 0x18) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'rose0\x00', 0x200}) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x9) 21:59:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000400000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f00000001c0), 0x41) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x4, 0x200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000240)={0xfff, 0x0, 0x10003, 0x6}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0086438, &(0x7f0000000280)={0x8e9f, r2}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x4}, 0x28, 0x3) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x8, {0x2, 0x4e24}, {0x2, 0x4e23, @remote}, {0x2, 0x4e22, @multicast1}, 0x8, 0x8, 0x33, 0xffffffffffff8d16, 0x6, &(0x7f0000000100)='tunl0\x00', 0x6, 0x52b8, 0x5}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002a00)='/dev/vga_arbiter\x00', 0x2, 0x0) accept4$unix(r3, 0x0, &(0x7f0000002a40), 0x800) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_team\x00', &(0x7f0000000040)=@ethtool_eeprom={0xb, 0x5ac, 0xd42, 0x47, "327df2e6a017d9e92f6305202d8a1d0be125ed565534ff0072627ef50fc257f723ceaf83be99a279fbc7afce35b1faaf7b6fbd4cc887b9f89517f2383c82f03366ebb233e3d9d4"}}) 21:59:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:24 executing program 0: r0 = socket$inet(0x2, 0x0, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x4, 0xbb, [], 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)=""/187}, &(0x7f00000001c0)=0x50) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0xff) 21:59:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000a000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$eventfd(r0, &(0x7f00000000c0)=0x7, 0x8) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x4) 21:59:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000e000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x4000) r2 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000000c0)={r1, r2, 0x5, 0x7f, &(0x7f0000000080)="c6144e3a4ae51edefc2126de59657a67ffe9c3c6ace34391afde053120089173951cc9cdb8bac7a5ff166e95c89b801eb2953025", 0x4, 0x9, 0x2, 0x5, 0xff, 0x800, 0x7fff, "0a39837af7909be2c318e4c95cd13fd258938e4279882d38701650edcfc984f9f463ccdb900f2ece1152ecc2a687e8262ecfd2863b1161f32180f9de14ab5504b4"}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:24 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0xfffffffffffffc3f) recvfrom$inet(r0, &(0x7f0000000100)=""/136, 0x37, 0x10040, 0x0, 0x166) 21:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000004000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000180)={'broute\x00', 0x0, 0x4, 0x91, [], 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/145}, &(0x7f0000000200)=0x50) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:25 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x30040, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000001180)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000040)={0x1000, {{0xa, 0x4e22, 0x20, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) mkdir(&(0x7f0000000140)='./bus\x00', 0x8) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) ftruncate(r1, 0x8200) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000001440)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000000c0)={0x401, 0x3, 0x6, 0x0, 0x101, 0x1, 0x40, 0x4286, 0x80000001, 0x9, 0x3, 0x0, 0x0, 0x0, 0x6, 0x2, 0x6, 0x819, 0x100000001}) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0xfffffffffffffffd, &(0x7f0000000200)) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000200000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:25 executing program 5: r0 = socket$inet(0x2, 0x1, 0xffffffffff7ffffe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x10000}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0xfff, 0x80}, 0x8) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x48000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) sendfile64(r0, r0, &(0x7f0000000040)=0x24, 0xd) 21:59:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0xbd, 0x20) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000001f4000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x42080, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='fdinfo/4\x00') r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:25 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x8, {{0x2, 0x4e22, @rand_addr=0x4}}}, 0x84) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r2, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xb}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40014}, 0x8000) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000), 0x10) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x200000) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x8, @mcast2, 0x4a800}, 0x1c) mq_unlink(&(0x7f0000000040)='/dev/adsp#\x00') 21:59:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400002, 0x0) accept4$unix(r1, 0x0, &(0x7f0000000040), 0x80800) 21:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000004000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xfa}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x401, 0x40000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x85, "b2a85057ff883166ae02f344672b9d659959b0894509a03300fdd7062e724fb22dda45ff11a17e8dfb4c00ea266950a26361511bbbe0adde2d78244bad1201b9317ee21cda5f23ec433c37a55a3e642e1f92c12564dd9802cdbbafc462fb51a17d0bedca37cff1a89aeeebbd0ea1f84ae20cda2d67a3277562596ad5dc1fe26f8adf6b0a81"}, &(0x7f0000000240)=0x8d) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)={r1, 0x9, 0x91, "90783ac35ee69c5a3c9c12131effc4bfe1b9412dd0ad0d2e2cf9575676d5bec303dcfb581d7f8927b7a8ba1f8c31356ddb6f9a6cf722ea21759d7be570f99fd968098f3325df2fe449266522d61fa5f451cd9efbb301a08f807269cb203966584da02791059a7c1f78023628fb174a4da3bbb25103bda51852e5d0b3d39baf96bc7e099d9772ac293e5b8af93d446dcd95"}, 0x99) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400001) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000080)={0x3, r3}) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="737461636b203a3a0a53ca039597cdd968165c4160041a9deb87fac7ac5dcdd23cfc875d72225d4066c611e5619d759783b86a1cfe2d13d9dc7333cf82d00224d4553aba053a6ae36270b8165567f76875880d3282752669eddc04ed4cceb605fd059140ac0d306b1ea3d234a65a0a8d246344f0a8d4"], 0x654) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f00000000c0)=0x400000) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000015000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x1f, 0x280) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) setsockopt$sock_int(r0, 0x1, 0x3a, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000001c0)={0x100}, 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x14, 0x2, 0x2}}, 0x14) socket$kcm(0x29, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x3000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x654) r1 = fanotify_init(0x10, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000000)=0x20000) 21:59:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) r2 = fcntl$getown(r1, 0x9) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=r2) mq_timedreceive(r1, &(0x7f0000000040)=""/28, 0x1c, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {0x0}, {}]}) fdatasync(r1) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000100)={r3, 0x2}) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000a000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40880, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x5, @ipv4={[], [], @local}, 0x7}, {0xa, 0x4e24, 0x7ff, @empty, 0x4}, 0x71, [0x3ff, 0x3, 0x1, 0x1, 0x7, 0x1000, 0x3ff, 0x101]}, 0x5c) 21:59:25 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x121600) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-pclmul\x00'}, 0x58) 21:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000f401000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x67, &(0x7f0000000140)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34"}, 0x30) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r0, 0x0, 0x27, &(0x7f0000000280)="2f6370757365746574683073797374656d76626f786e6574309e73656c696e7578776c616e3000"}, 0x30) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000440)=0x0) write$cgroup_pid(r0, &(0x7f0000000400)=r1, 0xfffffde3) clock_gettime(0x1, &(0x7f00000000c0)) 21:59:26 executing program 0: ioctl(0xffffffffffffffff, 0x8, &(0x7f0000000100)="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") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x1c, 0x3) 21:59:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:26 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x8000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000080)={0x800, 0x200}) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000003400000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:26 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000000)={0x0, 0x0, @ioapic}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0xc6, "b41c645d0281bd05d42af30deb11f2b2f05afe1b01214c3383593bf7728601b774286387dcd950a76c1e9c79e00a30d3e59117d85383a4c09cc33ca1df3ea20d51f80898765ebb94d9920d2afdadacc3c071bc5660e73be636ad55b2e5ed8f7fda10478ae991681325a7bb6168edd841f66fad9149a2497921a2280e58246183456a51de4e42fa9a6c35277ab9e9a4a38327894a6b26ce250a61464bc9151518131129acf21a2b4075dd420f6f7c8867b076f1fd6f5c128ccac9f420cd091c24eabab9e2e011"}, &(0x7f0000000180)=0xce) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000001c0)={r4, 0x4}, &(0x7f0000000200)=0x8) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000100)={0x1, @local, 0x4e23, 0x80, 'dh\x00', 0x4, 0x6204cbb8, 0x36}, 0x2c) 21:59:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000e803000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:26 executing program 5: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) r1 = socket(0x19, 0x6, 0x9135) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 293.460581] kauditd_printk_skb: 14 callbacks suppressed [ 293.460592] audit: type=1400 audit(1539295166.183:90): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22563 comm="syz-executor0" [ 293.490960] IPVS: set_ctl: invalid protocol: 1 172.20.20.170:20003 21:59:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x10000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x2, {0x2, 0x4e24, @loopback}, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e22, @local}, 0x81, 0xfffffffffffffff9, 0xc1, 0x1, 0xff, 0x0, 0x40, 0x200, 0x100000001}) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000004280)={@dev, 0x0}, &(0x7f00000042c0)=0x14) bind$xdp(r0, &(0x7f0000004300)={0x2c, 0x4, r1, 0x21, r0}, 0x10) 21:59:26 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 21:59:26 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000003e8000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x58000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) sendto$inet(r0, &(0x7f0000000040)="c7afc874390771046ece9e392f66c0778a5924d7fdc36319d4ce2ff5a9fe916fd6c96f60884cd796219f9cf687e526ac572d902ed5cff574257709b87b1ea62f99b7570dfb25f04e712d2c56e70216cfddc0e264c3fe7724643d08458e638ffd63c5cfe7b7ddd831b81b84a2fd7c3469775eb6b28b60ffc91c99d26bf71744d849ef79feed60d888ca7b1cb8d10ea945f8135836c5ac42dcbd0e1c4a2a959504a054f94a349743c91f1dd4f689382472", 0xb0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) ioctl(r0, 0x0, &(0x7f0000000140)="891e03e36e2ecd22c126077936e20a12bf791711d07860020782b3b9a288089511e8b67f7331e5ecb7ac58d7797b1e7bdb633a94a9805fa3911b6957d81c4ca7965e7d50bfb0e6d27942bac901cd246a0c518ccec8c49f0d15a117d8098067b4116ffcd86f5b67a05efe6a4e96b257bd88d55085439eeea259001d3d1ae192344636f9b229c7f6827336562aeaf50921aafae43a336499ba979d8cfed532960d4f812f8d3cbd727995fad615350bfd3c54f51d4123b3e32d6d1e8a2e2b04eec1f17288c967ea924e3c9075ce7bb9769c9421fbb9deb8b9115fae") r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x42010}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x84, r2, 0x600, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1000}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x200}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}]}]}, 0x84}}, 0x4000000) 21:59:26 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a0ade98e88d4d116d85545c0774b461829da2bb202914fcc010c87ec2e1448959f651a6b21379d9bb8faf725fb0d76bc0b6d417d3ca6300d7d6feae4ec43291ff"], 0x654) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x9, 0x4, 0xff, 0x400, 'syz0\x00'}) 21:59:26 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x3, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x107000, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x2, &(0x7f00000000c0)=0x2) 21:59:26 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000009000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:26 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 293.930017] audit: type=1400 audit(1539295166.653:91): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0ADE98E88D4D116D85545C0774B461829DA2BB202914FCC010C87EC2E1448959F651A6B21379D9BB8FAF725FB0D76BC0B6D417D3CA63 pid=22610 comm="syz-executor0" 21:59:26 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x600000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ptrace$setregset(0x4205, r1, 0x4, &(0x7f0000000140)={&(0x7f00000001c0)="22e8e8d7055dea969183ee8acd3d37b9fe80d69e040e117f36041e4781cd0b889fc306f525fe8f89e316020aabf5fa1953b949bff09362e2336b8bfff32ec67dc2b733fd9b13997efe776b78c8bc12e12caa0893f5ffc2baa75ee7bd15f78f16ce6cd03105ebb1db8038b4e9ebda39d64fb9380b428e1e0022e4de963b01678655097a2f29f490589961c061a4a21de2c9c158969aa3d6b91cf1b81f1eed13b989b4cd7b5d67695d97ce5441958cbb10b105", 0xb2}) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000900000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:26 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:26 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000080)=0x8000, 0x4) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x9, 0x20000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 21:59:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x0, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}}}, 0x104) r1 = socket$inet(0x2, 0x3, 0x2) memfd_create(&(0x7f0000000040)='\x00', 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 294.088532] audit: type=1400 audit(1539295166.813:92): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22636 comm="syz-executor0" 21:59:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:26 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x282000, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="737461636b01dcbf4c"], 0x654) 21:59:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000b000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:26 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:26 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="d6201ab0269a77a77be4f4e2ef"], 0x654) 21:59:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000005000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) [ 294.289630] audit: type=1400 audit(1539295167.013:93): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=22666 comm="syz-executor0" 21:59:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) r1 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000000c0)={0x401, 0xfff, 0x8, 0x0, 0x4, 0x2, 0xcb, 0x2, 0x100000001, 0xd78d, 0x9, 0x8, 0x0, 0x26, 0x8, 0xa1, 0x7, 0xffffffff, 0x1400}) 21:59:27 executing program 5: r0 = socket$inet(0x2, 0x5, 0x7ff) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) socketpair(0x1f, 0x3, 0x3800, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc00c64b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) ioctl$TIOCCONS(r1, 0x541d) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) 21:59:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000100000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:27 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x400000) readahead(r0, 0x80, 0x5) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f00000000c0)="ac9576"}, 0x10) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000040)) 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:27 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x4) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x400000) [ 294.504232] audit: type=1400 audit(1539295167.223:94): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22690 comm="syz-executor0" 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:27 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) socket$key(0xf, 0x3, 0x2) 21:59:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 294.565337] audit: type=1400 audit(1539295167.223:95): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22690 comm="syz-executor0" 21:59:27 executing program 5: r0 = socket$inet(0x2, 0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000080)={0x4f54, 0x80000003, 0x2, 0x1}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 294.668053] audit: type=1400 audit(1539295167.373:96): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22703 comm="syz-executor0" 21:59:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000000c0)={0x6, 0x6fe, 0xfff}) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000a00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:27 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") pipe(&(0x7f0000000340)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000000380)="0e3ac414bee7c0aa1427586f03ee0dbb9e66502e4e90ca04a6d046e99b036978ceb56e6a1c084c7400c12d5d1865b6de888f864305bf40ce6ce6d4f55cb40c7f190ee37343e860308841ddf709a0170f5eef87ad3cdc7dbef1172886d47b02b69b89273a553c48614cdabacb1ad6d57b5b8d3c775024ad0b9511b3877ea5587849cc5b6a0f02a128eb40fac6682ef8010dd7721fce6458f413213a07142f0d2b70eae38c64725e543c9e9c5724661c737c0543acb00b20b4c8249f74c199354eeed6cb97b8b384d5ae83cff3d44e403267dd6465d8c088ce6acd99a0", &(0x7f0000000480)=""/255}, 0x18) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="34a38c0d44fbfebfbaca891a9845f9987c368f6fe2b6dc9f36490a49ba9a2f4866031525c08706a8672536ac89d87ef27eae1a7a499e8bfa4fd81d27932d53801897ce012af88934a91a6095ae11576015b6bdc60defdc6ac725125d3a00cc75844282d3cec673e70b33fddbcb30c82559883de545f4613f30a1af9063562958ea7549fd3867a2cf361d60c3a7bd8885411cf34cad99127e1a31923a84dc2eff1ef2078ae07a"], 0x654) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = openat(r3, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0205710, &(0x7f0000000640)={0x0, 0x1fe0, 0xffffffff80000000, 0x1}) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40047602, &(0x7f00000006c0)=0xffffffffffffff10) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000600)=&(0x7f00000005c0)) getsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r5 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x0, 0x10080) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000000040)) write$FUSE_BMAP(r5, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x8}}, 0x18) 21:59:27 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x74, "fbe01d386a13b03e0e4fda98a81c5f2e8d0be57a7e3abf8b0d094a3ab39f8024b7131a8a6e09ce828eac60dc7561c568a35ca1f02098b31b13e1e887016d8d8b7ea9c96f40197bc632e1fd1d0d89c1ac695dd02e0f6242e83ee930537b328e64dd016ab0a24151d82a40466653d8c19206a4b8f1"}, &(0x7f00000000c0)=0x7c) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r1, 0xe0000}, 0x8) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x25e, 0x22000) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000480)={@empty, @local, 0x0}, &(0x7f00000004c0)=0xc) write$P9_RRENAME(r2, &(0x7f00000001c0)={0x7, 0x15, 0x2}, 0x7) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xe8) sendmsg$nl_xfrm(r2, &(0x7f0000000780)={&(0x7f0000000180), 0xc, &(0x7f0000000740)={&(0x7f0000000640)=@getpolicy={0xe4, 0x15, 0x800, 0x70bd2a, 0x25dfdbfe, {{@in=@loopback, @in6, 0x4e22, 0x0, 0x4e22, 0x8, 0x0, 0xa0, 0x80, 0x0, r3, r4}, 0x6e6bb0}, [@encap={0x1c, 0x4, {0x3, 0x4e20, 0x4e21, @in=@multicast2}}, @sec_ctx={0x60, 0x8, {0x5a, 0x8, 0x1, 0x8, 0x52, "800d1803cc7c1cd971b51a3dec16349eca0022931468cf5318397164f97b9844d676930abe6d42c8c9b1a41e5fd2f6eb9f773a0c9d64c71f680a25d2f9d72b59f925cce7d4d17443db5ed6c504ab7dd92aca"}}, @replay_val={0x10, 0xa, {0x70bd29, 0x70bd26, 0xffff}}, @ipv4_hthresh={0x8, 0x3, {0x20}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000020000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7a00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:27 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0x20bb, 0x5, 0x7}) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000ffffffffffffffff000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:27 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x2, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200004, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x7fff, 0x45, &(0x7f0000000080)=0xa22}) 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 294.928048] audit: type=1400 audit(1539295167.653:97): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22753 comm="syz-executor0" 21:59:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="849fcb6221d79af0324120912507c89810523b56b7abbbbb97976205a97d4211124bd8d732c744c7e0a314cfc5d03e0abb4941057735f4f1e755e22d79e323a573b9b67e41cd5deec9ee5349ba9a08e6d0c76ae063edfc02115457962535bd5f5d24c8d4a39a758f3ced"}], 0x756) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:27 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getgid() ioctl(0xffffffffffffffff, 0x8, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000200000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:27 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x186, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40186417, &(0x7f0000000080)={0x8001, 0x4, 0x7fffffff, 0x3, 0x13, 0xffffffffffffffc1}) recvfrom$inet6(r1, &(0x7f00000000c0)=""/215, 0xd7, 0x10100, &(0x7f00000001c0)={0xa, 0x4e21, 0x100000001, @remote, 0x200}, 0x1c) 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:27 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4ca02, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06055c8, &(0x7f0000000040)={0x0, 0x4, {0x55, 0x5, 0x9, {0x4, 0xff}, {0x8, 0x9}, @cond=[{0xfffffffffffffff9, 0x4, 0x7f, 0x81, 0x9, 0xffffffffffffff2b}, {0x5, 0x6, 0x4, 0x1ff, 0x2, 0x7}]}, {0x0, 0xfffffffffffffffe, 0x0, {0x0, 0x7}, {0xffffffffffff0000, 0xd35}, @const={0x5, {0xa1, 0x80, 0x4ee, 0x6}}}}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="03000000000000000a"], 0x654) 21:59:27 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8000, 0x18000) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000080)=0x7fff) 21:59:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x40000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 295.174212] audit: type=1400 audit(1539295167.893:98): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=22771 comm="syz-executor0" 21:59:27 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000034000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'yam0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="3a000000070000000500000004000000060000000000100016e2c2000300000068880000030000002000000000000000000000005f040000010000000000000008000000463bf3167f000000c6ab98001c3d354e00000000040000000001000006000000"]}) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:28 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x10001) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x90800, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="008988a946d8000000000000000200642b9b3b3299b450eed08e7eae7947eb230af391ab7c4836822932bf4e38372861e1b566f2c7a6d9c8f16b219a2b5541a1ccf03957493fb2f9e6f6151c121198f2f167bd29f0d6fd952e7670e8fa204776f54cadd46cd064593f58ad91b2a6167b65880ae79c7000626d00a255bf23bbb81c22851069f0") ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0xdc, r2, 0x604, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x38}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x11}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f0000000000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x81) 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0xfffffffffffffeb7) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000020000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 5: r0 = socket$inet(0x2, 0x5, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1c1340, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80, 0x0) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x8}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r2 = getpgid(0x0) prctl$setptracer(0x59616d61, r2) 21:59:28 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="1950da07d6703a0a"], 0x654) 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000010df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000cee6ffff00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x67, &(0x7f00000000c0)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34"}, 0x30) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12) sched_getparam(r1, &(0x7f0000000200)) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000ff026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:28 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xa0, @multicast1, 0x4e24, 0x3, 'nq\x00', 0x1, 0xfffffffffffffffb, 0x1f}, 0xfffffffffffffd3b) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000180)=0xee) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000100)='::\n', 0x4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) write$apparmor_exec(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='st!ck ::,'], 0x654) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000080)={r4, 0x50, 0x7, 0x2a6e1b67}, &(0x7f00000000c0)=0x10) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000024000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x3000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 5: r0 = socket$inet(0x2, 0x5, 0x8) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000040), 0x4) 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000040000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:28 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x40) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e22, 0x80, @loopback, 0x1000000}}, [0x80000000, 0x0, 0xffff, 0x1, 0x9, 0x7ff, 0x7ff, 0x202, 0x6a, 0xf9c5, 0x1, 0x9, 0x1f, 0x1f, 0xfff]}, &(0x7f00000001c0)=0x100) [ 295.809801] audit: type=1400 audit(1539295168.533:99): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=22869 comm="syz-executor0" 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000006a000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 21:59:28 executing program 5: r0 = socket$inet(0x2, 0x1, 0x8) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:28 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="730001000027652fc4"], 0x654) r1 = memfd_create(&(0x7f0000000040)='::\n', 0x7) delete_module(&(0x7f0000000180)='posix_acl_access&cpuset#bdev\x00', 0x200) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getpeername$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, &(0x7f0000000200)=0x10) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000100)={{0x6c, @remote, 0x4e21, 0x3, 'none\x00', 0x0, 0x1000, 0x59}, {@remote, 0x4e24, 0x4, 0x30000000, 0x80000001, 0x9}}, 0x44) 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000500000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:28 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioperm(0x9, 0x7, 0x7) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3bd3319b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r1, &(0x7f00000002c0)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x3f1b, 0x6, 0x4d, 0x4, {0x6, 0x7, 0x0, 0x7, 0x1, 0xf83d, 0x0, 0x4, 0x80000001, 0x101, 0x1, r2, r3, 0xfffffffffffffffb, 0x5}}}}, 0xa0) socket(0xd, 0x5, 0x5) 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000008c9d0300000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000080)={0x6, 0x3, 'client0\x00', 0x4, "1a00d3c55aac872e", "3d8bb3662c11598a758caa42c3c92d1f03de30b6d5c2516503c2f85bab24cc6f", 0x2, 0x7f}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, 0x2) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000140)='bond0\x00') 21:59:28 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000150000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) r2 = getpgrp(r1) write$cgroup_pid(r0, &(0x7f0000000100)=r2, 0x12) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000002c0)={'yam0\x00', {0x2, 0x4e23, @broadcast}}) clock_gettime(0x0, &(0x7f00000001c0)) 21:59:29 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:29 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x48001, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000000c0)) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000000c0)=0x80) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000003c0)="b805000000b9004800000f01c1abea777c5eb7290066b835000f00d826f20f1f0066f30f5ae40f01cb66b86f008ec8650fc9b88c0000000f23d00f21f8353000000b0f23f8", 0x45}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x7100000000000000) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x85ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000001000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:29 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db0600000000000f000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:29 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) ioctl$int_in(r0, 0x5473, &(0x7f0000000100)=0x70) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xe, &(0x7f0000000140)=0x100000000, 0x4) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000040)) 21:59:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000004000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:29 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000040), 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x101100) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x10000, 0x1000}) 21:59:29 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f00000000c0)={0x1d4, 0x0, 0x2, 0x6}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r2, 0xffffffff}, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000100)={0x5b79, r1, 0x10001, 0x1}) 21:59:29 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000040)={0xffffffff}) 21:59:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000b0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:29 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:29 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x4) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0xfffffffffffffe16) 21:59:29 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:29 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) sendto(r0, &(0x7f0000000040)="9285bbf011f2b5980d77cd1683c982a81bb864d5ec97cc3075d707064810331d6e4b01b786601d05e643d4275855e7442b25b9640a7556cd3cd860e7ee5c1fbbd8c6c0821dc414233a5d7ab2202208be7b2749", 0x53, 0x8800, &(0x7f00000000c0)=@l2={0x1f, 0xff, {0x200, 0xfffffffffffffff9, 0x9, 0x0, 0xfffffffffffff4f9, 0x1000}, 0x2, 0x3}, 0x80) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:29 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x1d}, 0x9, 0x0, 0x3, 0x8, 0x9, 0x9, 0x4}, &(0x7f0000000100)=0x20) r1 = socket$inet(0x2, 0x3, 0x2) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="dc0cfa5338396125dfff65a1a8620c3281f860fc9a4428c3e99bd8832c1f35662f90082fbd1535e33b9da7fdbefc8d28815e7770f2fce7ab178d98fc5a290f9e633d3434c400decd5b2576fd806e6e2b33e82f52e40b6170c3b84a8833c0e44fd7cd371b9309de0cbb3ff9ec43c62a0c27740fa476600f578a9dbe73d087dda6e558f2da4ef3a8e303f9dce11d", 0x8d, 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="cd3e8a99352e824b9fb98a1cf14e99543087d1299545a243666b2de77e67903185ff5ecc322aed4beeca4d571f11c1ea87a3e31e1b62f9de675525d1986e1443f9fbee7f219ce1b0ddbb73465746ccacdbd51f4f4f730590a8b4764f22f6dbf5dc84ee89060103be497d63d42853f143a568dfaaea04d1703e8ad7bc40e75e5578e7da", 0x83, 0xfffffffffffffff9) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="0aa49a6f647889dbbc49818709bd213d187ec2440c0c2714715622e31f6872802c70135ff22de5173732fd71267bcc6be081d8e9542f8789cd0539", 0x3b, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000480)={r2, r3, r4}, &(0x7f00000004c0)=""/171, 0xab, &(0x7f0000000600)={&(0x7f0000000580)={'digest_null\x00'}, &(0x7f00000005c0)="97863f75a7ce5ff64c0dd6", 0xb}) sendto$inet(r1, &(0x7f0000000040)="7980aaf09355bcf21b1fe5c8c900a356d33b480270971ded8571bb7d41627369ef9fc9b0dfd19ad6b97ec3c0af2ef29d7e43398cdc8bf4eb476ed324d85858abb080516ce122a8c25c1672ce7648c79973b9c789999b1014cb085a0fc590f6ed8defd63f1b8e38475487b481", 0x6c, 0x80, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) 21:59:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x20000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000015000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:29 executing program 0: eventfd2(0x4, 0x801) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3c0, 0x8000) setsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f00000002c0)="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", 0x1000) r1 = eventfd(0x4000000040000000) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="61065258af44b79a87090031df9d80560010ab7a357be86c6ba26adfaaaa9e"], 0x654) fchmod(r2, 0x80) 21:59:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x1, 0x7f, 0x2, 0x3, 0x3, 0x1ff, 0x14, 0x1, 0xf1, 0x1000, 0x9}, 0xb) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:29 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:29 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x4, 0x1, 0xfffffffffffffffc, 0x7e1752d0, 0x7f, 0x2, 0x2, 0x2, 0xd7de, 0x9b, 0x1f}, 0xb) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/30) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000140)={'nat\x00', 0x0, 0x3, 0x1, [], 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f0000000100)=""/1}, &(0x7f00000001c0)=0x50) 21:59:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000002000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:29 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x400000) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f00000002c0)={0x2, 0x3, 'client0\x00', 0xffffffff80000002, "5b54cf26b263ad91", "d0c3d408865d521e91b6a8fad396077c019f7269395b23a208538dff3d061d96", 0x7ff, 0x80000001}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000003c0)={0x0, 0x1000, "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"}, &(0x7f0000001400)=0x1008) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000001440)=r6, 0x4) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={r3, r4, r5}, 0xc) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:29 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:29 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:29 executing program 5: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x10, &(0x7f0000000000)={&(0x7f0000000080)=""/223, 0xdf, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0xffffffffffffff4f) r1 = socket$inet(0x2, 0x43, 0x2) setsockopt$inet_int(r1, 0x0, 0xcd, &(0x7f0000000040), 0x4) 21:59:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000002000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x68}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:29 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x40000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200000, 0x0) linkat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x400) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000001c0)={0x61, "ba4acee72648c0c35a9a18ac8408f4d3d1cfe8059d3e4f7d02cb93366d3edb11adf5bdea6a11fab7506bc93b0a5df085b8e3a3c2a5a9a9310173209957c7152390a132dd8f7a388164373de312e0ec868dcf6fdaa3cb9e7dd20e6e80c7eb3af93c"}) clock_gettime(0x10000000000003, &(0x7f0000000140)) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x7}, 0x28, 0x2) 21:59:30 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:30 executing program 0: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl(r0, 0x0, &(0x7f0000000140)="5f76600000000000000018937db75880342b1989d0666db5241511273cae5068326f2abcc3bc7b4c8a3715a59736ff4e8ebdb273e1e3671c1a708054daf9202f12a0fc65428d5c65388efab411be630b972a38aec12a20ee73b4ec5b9097a4ebc633a08d571b440667b6d8d442e1da0528cb2b550000000000000000000000000000") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '+vboxnet0userppp0bdev(\x00'}, 0x698657e46edefb1f) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x2000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20002) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="5403e2218b5286b8fcc0eac668ccb31c5c31db25d204e5e753e1e52682496608ea5d7fb225aba02f4ed5fe357a2d976aefb46e5343c62b888e7c75dd8ce618f9f541e5a31d4e16ddce22561f7d0af622b74b67989b8c2bc8fd3388c9e98301fa3aaf9bd28c20e64615a6d94cd6bdea7395b68ecec14b3c0f8663d0e3be2f4cc8d8de4563acbdbee91d86eb5f4f1d73d0169ddb043dc94b21884739836d35fe6ff23bc7acc1b5f79368fb42d26e781b4bcba92d3278a438795f57416837367c79f896e73020065d9b089db5ad714862696d10176d5d70e11f28ae6971", 0xdc) 21:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000015000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:30 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8000, 0x80000) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000e0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x10200, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000240)={0x9, 0x7fffffff, 0x8, 0x0, 0x5, 0x80000000}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f00000002c0)=0x5) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x300, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@multicast2}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000100)={{0x8, 0x80}, {0x1c000000000000, 0x7}, 0x0, 0x7, 0x6}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000180)) 21:59:30 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:30 executing program 5: ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f00000000c0)={0xa, 0x0, [{0x80000000, 0xd, 0x5, 0x2, 0x3, 0x1, 0x4480}, {0xd, 0x7ff, 0x5, 0x2, 0x904, 0x10000, 0x2}, {0x6, 0x3, 0x6, 0xffffffffffffffff, 0x3, 0x7ff, 0x6}, {0x0, 0xff, 0x5, 0x5, 0x42dd, 0x0, 0xffffffffffff4353}, {0x0, 0x6, 0x6, 0x2, 0x0, 0x800, 0x80000001}, {0x80000001, 0x8d05, 0x7, 0x4, 0x7, 0x1, 0x2}, {0x40000000, 0x200, 0x2, 0x80000001, 0x7, 0x3, 0x1f8}, {0x80000000, 0x3, 0x5, 0xfffffffffffffffb, 0x40, 0xfff, 0x81}, {0x80000008, 0x9, 0x4, 0x6, 0x100000001, 0x2, 0x3}, {0x1, 0x33b4, 0x0, 0xfffffffffffffffd, 0x1ff, 0x20, 0x3}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000002c0)=@security={'security\x00', 0xe, 0x4, 0x3b0, 0x0, 0x0, 0x110, 0x0, 0x0, 0x31c, 0x31c, 0x31c, 0x31c, 0x31c, 0x4, &(0x7f0000000280), {[{{@ip={@multicast1, @rand_addr=0x81, 0xffffffff, 0xffffffff, 'ip6_vti0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x5c, 0x3, 0x6b}, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xbf8, 0xc, 0x2, 0x2}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0xffffffff, 0x6}}}, {{@ip={@loopback, @rand_addr=0x8, 0x0, 0xffffffff, 'bond0\x00', 'ifb0\x00', {0xff}, {}, 0x5e, 0x2, 0x20}, 0x0, 0x98, 0xd8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xffffffffffffffe0, 0x9, 0x4, 0x3f, 0xfffffffffffffc01, 0x0, 0x3, 0x8]}}}, {{@ip={@loopback, @multicast1, 0xff, 0x0, 'sit0\x00', 'veth1\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x36}, 0x0, 0x10c, 0x134, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x5, 0x4}}, @common=@unspec=@connlabel={0x24, 'connlabel\x00', 0x0, {0x40}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x6, 0x100, 0x1ff}, {0xba2, 0x100, 0x3}}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x40c) r0 = socket$inet(0x2, 0x2, 0x3f) syz_open_dev$vcsa(&(0x7f0000000740)='/dev/vcsa#\x00', 0x36c00000000000, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000700)=0xc) setfsuid(r1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x4e21, @multicast2}, {0x307, @local}, 0x10, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 'rose0\x00'}) 21:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000039d8c000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x43000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000003ce9268600000000"], 0x654) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x205, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x7, 0x80, 0x9, 0x9, 0x1, 0x81}) 21:59:30 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x7a000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="e3706c5c230bf6d0b6bcc07f351b2c87124e3814037e23b8c05f13cba705c1341a98f076887e9af14ad260a1fe60db5d54c199e84eba3b5026373dea42999f4a"], 0x1a2409aff6c1d5e2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(authenc(crct10dif-generic,cbc-serpent-avx))\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace$pokeuser(0x6, r2, 0x40, 0x1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 21:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000001f4000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:30 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) socket$unix(0x1, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x9) 21:59:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0x1}, 0x8) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x2000000000000, &(0x7f0000000100)) 21:59:30 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000cee6ffff000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CLR_FD(r0, 0x4c01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='lblc\x00', r1}, 0x10) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000080)={0xc, 0x200000000004, 0xfffffffffffffc01}) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000100)={0x0, 0x7}) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000000c0)={0x3f, @multicast1, 0x4e20, 0x1, 'lblc\x00', 0xa31e2fb1cf852e6e, 0x7, 0x47}, 0x2c) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000040), 0x4) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000001c0)={@rand_addr, @multicast2, @dev}, &(0x7f0000000200)=0xc) ioctl$BLKBSZSET(r1, 0x40041271, &(0x7f0000000000)=0xbd6) 21:59:30 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db060000000000000010f026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:30 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000003580)={"536261636b20869ca7485cb03a3981d6c3676d5fe029e06cd775959b76e4f8876f17c004f7a030bd5cb30ac9b9213a", '/proc/thread-self/attr/exec\x00'}, 0x4b) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffffffffffffffff, 0x1) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @hyper}, 0x10) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000040)={0xa, 0x8, 0x6, 0x101}, 0xa) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f00000000c0)="f8429a9221d7ecd06ca0f99f2c987c5437577f003277d1e07ae45e490eb0f8c6592cc347602c5bd7def233d2e1a5effe542eda9c669d615406afc9f8786d31a32b924ed69ffaefa9a3f95b08fae05d19dfdae3e72b1a43c0152363951a3805a8c9cce4576eaff28761e92949ecb3c7ed925e87f6674f7ddcc3d803c45b23158c80db9071e4e331102f0ead2992061c125fb4bc78940aaf945bdbfba5d4d03fbdedca") clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ppoll(&(0x7f0000000300)=[{r0, 0x620}, {r1, 0x1000}, {r1, 0x8000}, {r0, 0x2000}, {r1}, {r1, 0x2020}, {r1, 0x4000}, {r1, 0x4004}, {r0, 0x4}], 0x9, &(0x7f0000003600)={r2, r3+30000000}, &(0x7f0000003640), 0x8) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/188, 0xbc}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/190, 0xbe}, {&(0x7f0000002480)=""/4096, 0x1000}], 0x5, &(0x7f0000003480)=""/194, 0xc2, 0x8}, 0x40002100) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='\x00', 0xfffffffffffffff9) r1 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f00000005c0)='dns_resolver\x00', r1) 21:59:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x80, 0x0, 0xfffffffffffffffc, 0x7af0000000000, 0x2, 0x3e, 0x1, 0x30a, 0x38, 0x20f, 0xfffffffffffff800, 0x3, 0x20, 0x1, 0x9, 0x6, 0x1}, [{0x70000007, 0xac, 0x4, 0x2, 0x8, 0x7f, 0x1, 0x4}, {0x6474e551, 0x3, 0x5, 0x3ff, 0x7ff, 0xbf, 0x0, 0x1}], "930ee8c92bc7e97cabae5e1fdf35a98007cd5d92fd504289c6d5b84ff144fe20d0cb4563cf7bd211d06ae20270e614e4659351cb651c932c7f41c5d39e3aa445dd150d1339a85f1e7bb3229f8031910c7952a122066f", [[], [], [], [], [], [], [], []]}, 0x8ce) nanosleep(&(0x7f0000000100)={0x77359400}, &(0x7f0000000140)) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) sendfile(r0, r0, &(0x7f00000001c0)=0x62, 0x7ff) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 21:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000040000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="737461636b05003a0a"], 0x654) 21:59:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x4000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/141) 21:59:30 executing program 2: r0 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='-&\\\x00', r0) 21:59:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x68000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000006a000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10020}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneightbl={0x14, 0x42, 0x408, 0x70bd2c, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) fstatfs(r0, &(0x7f00000002c0)=""/178) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000000)={{0xfffffffffffffffe, 0x100000001}, {0xc10, 0x400}, 0xffffffffffff7fff, 0x6, 0x6}) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) rseq(&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x2, 0x9, 0xeaf}, 0x4}, 0xfffffffffffffce3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:31 executing program 5: r0 = socket$inet(0x2, 0x5, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x1000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x80) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:31 executing program 2: r0 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8000, 0x400) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xdd, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r2 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000240)="fa772a9f7037715fd3faff41e3c43a9ec2cba97efa5566522e8f9faa40d4618ea578923c2f3be0c6cf8b61f5d575e15edb6b5c595411fcec878c728a1ec28cabec69d1764004bd99ea3daf3e9f26871c7b0c5e7a2ed5de819912c95caaa563a3eb2a2dd0cb9b", 0x66, r0) keyctl$reject(0x13, r0, 0x9, 0x6, r2) 21:59:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000070000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x6c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:31 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:31 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x8) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:31 executing program 5: r0 = socket$inet(0x2, 0x3, 0xffffffff) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @broadcast}, &(0x7f0000000080)=0xc) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 298.981406] kauditd_printk_skb: 16 callbacks suppressed [ 298.981418] audit: type=1400 audit(1539295171.703:116): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23265 comm="syz-executor0" 21:59:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x3}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:31 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2194a5ca, 0x60000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r1, 0x7, 0x1ff, 0x5, 0x4, 0x20, 0x5, 0x3, {r2, @in6={{0xa, 0x4e20, 0x7fff, @remote, 0x3}}, 0x7fff000000, 0x3f, 0x9, 0x8, 0x401}}, &(0x7f0000000200)=0xb0) prctl$void(0x3f) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:31 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="737461636b02ffba0a"], 0x654) pwrite64(r0, &(0x7f0000000000)="25ee440308dbcd15c0c45a8a385638e7873726da39d14098cd5fa7cf17f83b7c5bd32a60d9924f725eeb599aa3c3e4a4131ef435b12b16c8a315ec59c0c47f29541cbe21570d61ab7be3cbb7122383251919afe87022fd17992a9d81f2fc39b08bd303e838d384ea3c2b15aed26cd26aaf0fd68989c0e254b09b08ff1c1d797f4cb536b0b1b21e6a402a2c8ba408dd4b6edb6921a11d5df999b41b35fe807a494d4b79338c53118750b405b3edb9ae1f6c76ebe3c32791639767493dcd4e9d1621bf125a099037d081764b6b89f36144a1e5184abb3372d0ac239d64bb681f40b3dda73dab19858cdd7110657487", 0xee, 0x0) 21:59:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x9) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:31 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0xfffffffffffffded) socket$inet(0x2, 0x8000e, 0x6) 21:59:31 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x100) 21:59:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000001f40000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:31 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x100) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/52, &(0x7f0000000080)=0x34) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x654) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="180100ac0b25", @ANYRES16=r2, @ANYBLOB="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"], 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x81) 21:59:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x1810000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:31 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80, 0x49) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000080)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:32 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc00c64b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x1}) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:32 executing program 2: request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000005c0)='#bdevwlan0/eth0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x103040, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x400, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) socket$can_raw(0x1d, 0x3, 0x1) 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000e0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) get_thread_area(&(0x7f0000000180)={0xffffffff, 0x20000000, 0x4400, 0x1, 0xcbc, 0x6, 0x8, 0x8, 0xda9, 0x7}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x8000, @dev={0xfe, 0x80, [], 0xe}, 0x800}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x5, @mcast1, 0x100}], 0x48) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000140)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 299.336430] audit: type=1400 audit(1539295172.063:117): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23321 comm="syz-executor0" 21:59:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) clock_gettime(0x1, &(0x7f00000000c0)) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:32 executing program 0: ioctl(0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000000040)="153120") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x654) sysfs$3(0x3) 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000006a0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x1000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:32 executing program 2: 21:59:32 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x3, 0x16b800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x2, 0x1ff}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1, 0xffffffff}, 0x8) r2 = socket$inet(0x2, 0x3, 0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) ptrace$poke(0x5, r3, &(0x7f0000000180), 0xa1) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:32 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x53000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000340000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:32 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x4, 0x8001}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x0, [0x198]}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0405405, &(0x7f0000000180)={{0xffffffffffffffff, 0x3, 0x1, 0x0, 0x2}, 0x3, 0x8001, 0xffff}) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000140)='veth0_to_bridge\x00') 21:59:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x4000) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x48}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 299.693782] audit: type=1400 audit(1539295172.413:118): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23361 comm="syz-executor0" 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000034000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:32 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x3, 0x3ff, 0x101, 0x2, 0xffffffffffffff53, 0x5, 0x1, 0x7f0b, 0x1, 0x4, 0x1}, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:32 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = socket(0x1f, 0x5, 0x3) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x6, 0xfffffffffffffffe}, 0xc}, 0x10) 21:59:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x18100) fcntl$dupfd(r1, 0x406, r0) 21:59:32 executing program 0: ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@int=0x1, 0x4) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x654) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x4000) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000040020000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) read(r0, &(0x7f00000004c0)=""/158, 0x9e) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_readv(r2, &(0x7f0000000300)=[{&(0x7f0000000040)=""/30, 0x1e}], 0x1, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/134, 0x86}], 0x1, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2b}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) 21:59:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r1, &(0x7f00000000c0), 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/76, 0x4c}, {&(0x7f0000000180)=""/237, 0xed}, {&(0x7f0000000280)=""/110, 0x6e}, {&(0x7f0000000300)=""/47, 0x2f}], 0x4, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) 21:59:32 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0xfe97) 21:59:32 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="72f844f465325028beda752a91a2ba7a6a5189e657deca9aa1972e525c8927c9baea82212b0c261949796abb52cf0ccef1391fa3b59ba854167648f36eb6aa86cda8c6c147e7ce8b2e93a2ac9e3b0556d6522f7d76e51a2ca27b16b0adc0e5f87d37b5b46d51f35575680ee42119fb95bda1741d8c538535aac0340863a644a346e2a1398140b479c663ddce0ef7546e5d85cc8bfb1b000000000000000026f00bdc5be5b2bbeffc94e19d2014b02afeb31b9f9ed813165e686430fc093800000000000000"], 0x9) r1 = dup(r0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000001c0)={0x0, @speck128}) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x145) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1220) r2 = getpgid(0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000100)={0x6, 0x70, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0xe, 0x9, 0xc, 0x0, 0x3, 0x1f, 0x10001, 0x3, 0x7b60, 0x0, 0x9c0, 0x7, 0x18cd, 0x886, 0x101, 0x2, 0x3, 0x6, 0x81, 0x0, 0xffffffffffffffe1, 0xfffffffffffffffa, 0x3, 0x227, 0x6, 0x3, 0x6, 0x201, 0x474, 0x1, 0x2, 0x0, 0x800, 0x6, @perf_config_ext={0xf6b, 0x6}, 0xa800, 0x87f, 0xd5, 0x1, 0x34fd, 0x96, 0x1}, r2, 0x1, r3, 0x0) 21:59:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x2, [0x7, 0xc26]}, 0x8) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xa}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 300.022684] audit: type=1400 audit(1539295172.743:119): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23412 comm="syz-executor0" 21:59:32 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000000)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000009000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:32 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000780)='/dev/adsp#\x00', 0x200, 0x80080) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000007c0)=0x100000001) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000000)="76b9755208f70da047ad157ab393aadf43234bfa5bba05de4d78133221c6f90dbea4f4f65dd3c93231574ad658259e365f70291b124fdd78a363233006b21c9dff4ba8096158e3d4b06869a9f3b495c8837f2cc603302629894d96df94a1ec1fbff63d91fdc9780ecc838d3f840fd58ea2a84f", 0x73}, {&(0x7f0000000080)="bc526da47f1da887b7e5533ee6829d9960389a4ea4e18d04770dcb8d9b3c9479326286a7dd8b465dd7331ed8d764468ed60799f0a799f949448394785fc20a6b974b02b9a7fef7c43fa9de4a8706dd4f4653a0aa1bb232fd8f05c033a4d9ce830c70ab4264759520b5a955852db4fadbbf1e17ac86aae9a356e7827905d98d59adf57c5d83249a6ffa947ac5655761e6f3518319506445c313bd845ed30f8490a126b593d076e4b43a20197828b7a70dbb988c260bb7dee58b082103c0a64b5b33f8f6bd0473de05ca2350dd6d4a9b86985d", 0xd2}, {&(0x7f00000002c0)="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", 0xff}, {&(0x7f0000000180)="b6eb3c7cac", 0x5}, {&(0x7f00000003c0)="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", 0xfe}, {&(0x7f00000001c0)="4f166a5325482f004b6502e20497a2f2dcfcdae4d974e035bbcc4734169ee62cd81262d1ae29b2c9b91bbc05a8af637c", 0x30}, {&(0x7f0000000200)="3cdfe043dc938204c67d515b808f", 0xe}, {&(0x7f00000004c0)="1962917d3e41948de4daa318b99685778bfadebd6efd0115fb646eb534dd193ffcb56b22fced5337559f1f6b9e9d2c782b0070be457d0d88", 0x38}], 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x40, 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r2, &(0x7f00000006c0)={0xa0, 0x0, 0x1, {{0x4, 0x0, 0x0, 0x400, 0x7ff, 0xffffffffffffffe0, {0x4, 0x9, 0x9, 0x6, 0x100000000, 0x5, 0x80000001, 0x5, 0xfffffffffffffca9, 0x8, 0x7, r3, r4, 0xe0, 0x4}}, {0x0, 0x1}}}, 0xa0) 21:59:32 executing program 5: r0 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 300.219373] audit: type=1400 audit(1539295172.943:120): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23442 comm="syz-executor0" 21:59:33 executing program 2: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000001640)) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000001a80)="07a701df149c2b43f0764cde4687f8649c028101533b11341a16d38359d7281c1e462cca9cf7a030d53e8329039455c02d42d5fdc835ed43ef202b7dca3a470d42cbdb8fa254872c66a596297cf0afd40f3599fd8f7ef879164645f762abeaeb9926be605dd88bd1b7b3db007de0cd5b824f218abb65ecdd2d160c852e3b3561dc43236bc8cc64f0ea", 0x89) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000400000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:33 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', '$(+%\x00'}, 0xa) 21:59:33 executing program 5: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x96b, 0x40000) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet(0x2, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:33 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xf3, &(0x7f0000000000)=0x8, 0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) [ 300.365592] audit: type=1400 audit(1539295173.093:121): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="$(+%" pid=23464 comm="syz-executor0" 21:59:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 300.463585] audit: type=1400 audit(1539295173.173:122): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23479 comm="syz-executor0" 21:59:33 executing program 3: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0xfffffe38) writev(0xffffffffffffffff, &(0x7f0000000000), 0x200000000000034a) r0 = socket$inet6(0xa, 0x5, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40, &(0x7f0000000f9b), 0x0) r1 = getpid() ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f00000001c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0)=r1, 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:33 executing program 5: r0 = socket$inet(0x2, 0x3, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x3, 0xa9, [], 0x9, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/169}, &(0x7f0000000240)=0x50) io_setup(0x0, &(0x7f0000000280)=0x0) io_destroy(r1) setsockopt$inet_int(r0, 0x0, 0x800000000000ca, &(0x7f0000000000), 0xfffffffffffffe9e) 21:59:33 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={r1, r2, 0x3}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 300.687772] audit: type=1400 audit(1539295173.413:123): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23494 comm="syz-executor0" 21:59:33 executing program 2: init_module(&(0x7f0000000040)='ppp1lo]vboxnet1vboxnet0cpuset\x00', 0x1e, &(0x7f0000000080)='syz') request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f00000005c0)="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", 0x0) 21:59:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000001f40000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$void(r0, 0x5451) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:33 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = dup3(r0, r0, 0x0) getdents64(r1, &(0x7f0000000180), 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x202, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80, 0x6, [0x5, 0x9, 0x7, 0x1, 0x3, 0x8]}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r3, 0x3f, 0x1, [0x3]}, 0xa) 21:59:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x4c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0xd57d, {0x0, 0x9, 0x6, 0x6, 0x20, 0x6e4}}) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:34 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x2010, r0, 0x0) 21:59:34 executing program 2: request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f00000005c0)="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", 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x90) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x9) [ 301.266507] audit: type=1400 audit(1539295173.993:124): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23511 comm="syz-executor0" 21:59:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x24241, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x0, 0x30, 0x8, 0x5}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x5, 0x8, 0x3, r2}, &(0x7f00000002c0)=0x10) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="c20000000000009022"], 0x654) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r4, 0x4) 21:59:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000034000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x30}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x3}, 0x4) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x4, 0x6}]}, 0xc, 0x2) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="ad3372a76cbee9e799f178c403eced886804d20fd8a1"], 0x1) 21:59:34 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x40) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x2, {0x2, 0x4e22}, {0x2, 0x4e20}, {0x2, 0x4e22, @rand_addr=0x85}, 0x0, 0x8, 0x7, 0x81, 0x3, 0x0, 0x3, 0x6, 0x7f}) 21:59:34 executing program 5: socketpair$inet(0x2, 0x6, 0x9, &(0x7f00000001c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x101000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = dup(r0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="300b4b8d22ae7c7efce381dd451db288eee5a4175338d446cc8dfeca965e303be972d683eaf681e5e2f1918a14d6d07d709fae75a73481f5a683d0", 0x3b}, {&(0x7f00000000c0)="3ccd3a5f2b85bc85c555c62916b3013b819727da1e9dc829bba81f8d289b9f805ca27a16a7ae27d7e7396224c3", 0x2d}, {&(0x7f0000000100)="cf0034078a4cf6275dcb609f04a012f87d16fd125ed9d28a5c4558b2c9645ab49113f3b28b5bcccde6f791a65ec8d5a6faa01c4797eb62c41993e4dd9bc41887436e4e92a16712ef0590b10c24b17ee08c3b289a4a496afcdf7ec62f8e377fc9c7cffb16d56cdb0f42b6bd6255a20c689a", 0x71}], 0x3) r2 = socket$inet(0x2, 0x3, 0x2) syncfs(r1) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x4, 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000080)={0x7, 0x4, 0x7, "fb43d3cb66205a"}) 21:59:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000ffffe6ce000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:34 executing program 2: r0 = request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='dns_resolver\x00', 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000040)="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", r0) 21:59:34 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x141000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x5, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x6, 0x200) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) writev(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000001c0)=0x7) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000240)={[], 0x8, 0x7fff, 0x1, 0x4, 0x1, r4}) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="737461636b203a3a0a307d9d63ce269b264e98bc893e6cd50abb5d3a03000000282e1a17e12d81c9616cf349382caa4cef0f629fb71caa752a678366c4623819b4bf066af5afa8330122d098f681940ff9aa9ea98865187606f735ee9b9bbe8ea2cedf67a4d7f4dbfa328be9a9df8e653fdf50491b122cfadbc2387ccd91d05dbe806d568bacd8b34d70a7f45cbe723a2b0a31a6e0328e975570e8efc7e2aace39677c31dff08709bf06b2345bcc9aac296ea5e2eb9bcabbb3acb9531d96e8ca1e9ad680978f3e31291228aef5c376da81dc8c5fd0b4e8b47273d5d2761e56"], 0x1) 21:59:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'team_slave_1\x00', 0xc000}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400002) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x1) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x8000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000b000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:34 executing program 5: socket$bt_rfcomm(0x1f, 0x1, 0x3) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x202000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x4, 0x4, 0x5, 0x0, 0xd}) 21:59:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x5c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 301.717668] audit: type=1400 audit(1539295174.443:125): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23595 comm="syz-executor0" 21:59:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000ffffe6ce0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x1, 0x0, @pic={0xff, 0xffffffffffffffc1, 0x8, 0xb70f, 0x9, 0x0, 0x5, 0x4, 0x7f, 0x5, 0x0, 0x6, 0x8, 0x10000, 0x8, 0x33d4}}) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) 21:59:34 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x900, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/audio\x00', 0x20080, 0x0) r1 = memfd_create(&(0x7f0000000600)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x3) r2 = openat$cgroup_ro(r1, &(0x7f00000005c0)='memory.events\x00', 0x2761, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) io_setup(0xfffffffffffffffd, &(0x7f0000000300)=0x0) io_cancel(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x8bc, r2, &(0x7f0000000340)="0365c605b62131a4f66bd9e0ee37be5be0598d80412509d717568ad8c7", 0x1d, 0x80, 0x0, 0x2, r2}, &(0x7f00000003c0)) writev(r2, &(0x7f00000005c0), 0x0) ioctl$TIOCCONS(r0, 0x541d) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) sched_getaffinity(r4, 0x8, &(0x7f0000000500)) fchmodat(r2, &(0x7f0000000240)='./file0\x00', 0x1) fcntl$getown(r2, 0x9) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) r5 = memfd_create(&(0x7f0000000680)='/dev/audio\x00', 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000180), &(0x7f0000000400)=0xb) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x3, @local, 0x9}, @in={0x2, 0x4e24, @broadcast}], 0x4c) close(r2) clock_gettime(0x7, &(0x7f0000000140)) ioctl$RTC_UIE_ON(r0, 0x7003) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000240000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) io_setup(0xffffffff, &(0x7f0000000000)=0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x180, 0x0) io_submit(r1, 0x3, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0xaa1b, r0, &(0x7f0000000040)="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", 0xff, 0x1, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f0000000180)="2edc3a9236950f51b529b85dd9b1358bef4f7d1fb9341ba685840711949ed906be08b44f311ff34856ececd107552d40b12829a359d08d754f320bc92d69a7445da644bb1067451bf4f382e889d7a3110416a20b3fda06f760b0c78a4d47cbdfefabd15d8c555f714a90744439b76881e33fe36b28ed3e5d04a5c7dc2f5383aa1428ba46f97a062c9cfe8c6d9801c9eda2d46562a9955e03a72d5205", 0x9c, 0xe79}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x622, r0, &(0x7f0000000300)="cde2ae8f2f110912c7dce3f6727a0aed0021aceb81ec954bfa0b869b5904d61e0d5c145cdfbfdae51d3f5650e21eaea85f6a60fa0210aee41024986dbc9b310f9379f79b2c7fb22eb7dcb6cd2a65bbcf2c6711ab598f8692621833f4c17c54f4511366542cbfb92ba2843316067af0b1af93f34b0a6f7dbdd59c10ea1ed36ceddc9fc7132b8489b0d5974fcfe3ce264e99ecbbcfbcc146730f48fa045eee66fb418745607982e62e72", 0xa9, 0x8, 0x0, 0x1, r2}]) 21:59:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f00000000c0)={@empty, @multicast2, @multicast1}, &(0x7f0000000100)=0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000080)=0x3, 0x1f2) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000)=0x5, 0x4) 21:59:34 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$team(&(0x7f0000008c40)='team\x00') getpeername$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) recvmmsg(r0, &(0x7f0000008640)=[{{&(0x7f0000000240)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001980)=[{&(0x7f00000002c0)=""/168, 0xa8}, {&(0x7f0000000400)=""/53, 0x35}, {&(0x7f0000000440)=""/13, 0xd}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/224, 0xe0}, {&(0x7f0000001840)=""/218, 0xda}, {&(0x7f0000000540)=""/67, 0x43}, {&(0x7f0000001940)=""/53, 0x35}], 0x9, 0x0, 0x0, 0x7}}, {{&(0x7f0000001a00)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000001a80)=""/83, 0x53}, {&(0x7f0000001b00)=""/25, 0x19}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/220, 0xdc}, {&(0x7f0000002c40)=""/160, 0xa0}, {&(0x7f0000002d00)=""/159, 0x9f}], 0x6, &(0x7f0000002e00)=""/4096, 0x1000, 0x9}, 0x4c36}, {{&(0x7f0000003e00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000003e80)=""/8, 0x8}, {&(0x7f0000003ec0)=""/151, 0x97}, {&(0x7f0000003f80)=""/4096, 0x1000}, {&(0x7f0000004f80)=""/4096, 0x1000}, {&(0x7f0000005f80)=""/17, 0x11}, {&(0x7f0000005fc0)=""/4096, 0x1000}, {&(0x7f0000006fc0)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0x3}, 0x2}, {{0x0, 0x0, &(0x7f0000008500)=[{&(0x7f0000008000)=""/154, 0x9a}, {&(0x7f00000080c0)=""/248, 0xf8}, {&(0x7f00000081c0)=""/105, 0x69}, {&(0x7f0000008240)=""/56, 0x38}, {&(0x7f0000008280)=""/161, 0xa1}, {&(0x7f0000008340)=""/131, 0x83}, {&(0x7f0000008400)=""/202, 0xca}], 0x7, &(0x7f0000008540)=""/241, 0xf1, 0x9}, 0x3}], 0x4, 0x23, &(0x7f00000086c0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008700)={{{@in6=@ipv4={[], [], @remote}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000008800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000008840)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000008880)={0x11, 0x0, 0x0}, &(0x7f00000088c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008900)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000008a00)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000008a40)={0x0, @multicast1}, &(0x7f0000008a80)=0xc) recvmmsg(r0, &(0x7f000000bc40)=[{{&(0x7f0000008cc0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000008e00)=[{&(0x7f0000008d40)=""/146, 0x92}], 0x1, &(0x7f0000008e40)=""/222, 0xde, 0xffff}, 0x2}, {{&(0x7f0000008f40)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000009040)=[{&(0x7f0000008fc0)=""/128, 0x80}], 0x1, &(0x7f0000009080)=""/105, 0x69, 0xe8f}, 0x8000}, {{0x0, 0x0, &(0x7f0000009580)=[{&(0x7f0000009100)=""/66, 0x42}, {&(0x7f0000009180)=""/68, 0x44}, {&(0x7f0000009200)=""/230, 0xe6}, {&(0x7f0000009300)=""/219, 0xdb}, {&(0x7f0000009400)=""/145, 0x91}, {&(0x7f00000094c0)=""/13, 0xd}, {&(0x7f0000009500)=""/105, 0x69}], 0x7, &(0x7f00000095c0)=""/4096, 0x1000}, 0x6}, {{&(0x7f000000a5c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000000b9c0)=[{&(0x7f000000a640)=""/127, 0x7f}, {&(0x7f000000a6c0)=""/96, 0x60}, {&(0x7f000000a740)=""/252, 0xfc}, {&(0x7f000000a840)=""/252, 0xfc}, {&(0x7f000000a940)=""/4096, 0x1000}, {&(0x7f000000b940)=""/103, 0x67}], 0x6, &(0x7f000000ba00)=""/251, 0xfb, 0x99b}, 0x3}, {{&(0x7f000000bb00)=@rc, 0x80, &(0x7f000000bc00)=[{&(0x7f000000bb80)=""/118, 0x76}], 0x1, 0x0, 0x0, 0x8}}], 0x5, 0x2000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000bd00)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000be00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000c400)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f000000bf40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000bf80)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f000000c080)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000c0c0)={'syzkaller1\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000c140)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f000000c240)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f000000c280)={@rand_addr, @rand_addr, 0x0}, &(0x7f000000c2c0)=0xc) fstat(r0, &(0x7f000000be40)) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000c9c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f000000c980)={&(0x7f000000ca00)=ANY=[@ANYBLOB="68060000", @ANYRES16=r1, @ANYBLOB="040025bd7000fddbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="780002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000300000008000100", @ANYRES32=r4, @ANYBLOB="f401020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r5, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000010000008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="7400020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400f7ffffff38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000700000008000100", @ANYRES32=r9, @ANYBLOB="8c01020044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040001ff158c010100003f0008010600000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400f8ff06010200000000040901060000000700fd07080000000001041f0800000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400fbffffff40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="080007000000000008000100", @ANYRES32=r12, @ANYBLOB="c0010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000700000008000600", @ANYRES32=r13, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000700000008000600", @ANYRES32=r14, @ANYBLOB="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", @ANYRES32=r15, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040001000000"], 0x668}, 0x1, 0x0, 0x0, 0x1}, 0x4040800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000008ac0)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000008bc0)=0xe8) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:34 executing program 5: execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000300)='selinux\x00', &(0x7f00000000c0)='+\'\v%cpuset\x00', &(0x7f0000000100)="70726f636d1f6d655f747914af0a65742673656c66766dee65743173656c6600", &(0x7f0000000140)='vboxnet1+\x00', &(0x7f00000002c0)=',\x00'], &(0x7f0000000280)=[&(0x7f0000000340)='cpuset\'!\'bdevmd5sum&vmnet1\x00', &(0x7f0000000240)='selinux\x00']) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006640)='cpu.stat\x00', 0x0, 0x0) dup3(r1, r0, 0x80000) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000006680)={0x20, {{0xa, 0x4e21, 0x8, @loopback, 0x89}}}, 0x84) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0', [{0x20, 'eth0]vmnet1{}'}, {0x20, '+\'\v%cpuset\x00'}], 0xa, "7e8d7b78fd961e80d14e329b1301d0403a4c154dd702c8e374d1dd7457a287d91fa835e920f1d5044bbf355bd77045266230033a35"}, 0x5a) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'bcsh0\x00', 0x2}, 0x18) 21:59:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000002000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0186415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x5b2, 0x1, 0x20, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffff7}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000180)=""/253) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x10) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:34 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$RTC_PLL_GET(r0, 0x801c7011, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000180)) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)) 21:59:34 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10000000102, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @rand_addr, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={r1, @loopback, @rand_addr=0x1ff}, 0xc) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000140), 0x4) socket$pppoe(0x18, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x368, 0x1f8, 0x0, 0x100, 0x0, 0x1f8, 0x2d4, 0x2d4, 0x2d4, 0x2d4, 0x2d4, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0xdc, 0x100, 0x0, {}, [@common=@icmp={0x24, 'icmp\x00', 0x0, {0x13, 0x9, 0xae7d}}, @common=@socket0={0x20, 'socket\x00'}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3ff, [0xa26, 0x6, 0x6, 0x5, 0xfffffffffffffffa, 0x658], 0x4, 0x97, 0x100000001}, {0x3, [0x40, 0x8001, 0x200, 0x3, 0x5, 0x2], 0x80000001, 0xfffffffffffffff7, 0x8}}}}, {{@uncond, 0x0, 0xb8, 0xdc, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@inet=@SYNPROXY={0x24, 'SYNPROXY\x00', 0x0, {0x8, 0x3}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3c4) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000005c0)={0x2, 0x4e22, @broadcast}, 0x10) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 2: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000380)="646e735f72d43c18cf76657200", &(0x7f00000003c0)={'syz'}, &(0x7f0000000000)="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", r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000280)=0x1e) 21:59:35 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xec, 0x40000) ioctl(r0, 0x800000000, &(0x7f0000000080)="153f62340700d25d76608548e966f55dad570dcba1a9559e6e1eb9ffec0cdb83d284d9c0806feb7029b2fcfc0e5f972be48aab36ee0700000000000000070045dd0a5614171f581a387b") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xa}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x802, 0x0) io_setup(0x8, &(0x7f0000000280)=0x0) setsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000c80)={@remote}, 0x14) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x101, 0x0) creat(&(0x7f00000005c0)='./file0\x00', 0x0) syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x7, 0xc000) io_submit(r3, 0x0, &(0x7f0000000700)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"7465616d3000000000001800", 0xc00}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x801, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x0, 0x0, 0x4e24}, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000140)='bridge0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000008c0)={0x4, 0x0, {0x3, 0x2, 0x0, 0x1, 0x5}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e05411, &(0x7f00000002c0)=""/253) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="737461f61aca48cfb615fe58fc3a3a0a0080000000000000e40a0a5d703c8281873250dd2cb3fdb5893bdcd975"], 0x654) 21:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000003e8000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 5: r0 = socket$inet(0x2, 0x1000000000001, 0x4) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:35 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x666, 0x1, [0x7]}, &(0x7f0000000400)=0xa) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440)={r1, 0x7fff}, 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x7ff, 0xfffffffffffffffb}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, &(0x7f0000000100)=0x4) r4 = gettid() getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r3, 0xde, "34da72c5973d21eb6b108e41934550a0e9d4ca65508749bb78413b148804bf6ff7e346242fcae3005c5710fc8b9fc8e391ab7d8d015537ba7beb49ab73063e78ddfaf8f497227a521da7826568f905ca0f968b02158d86e8966e032366e942a81c9c8b8489490a5b7f6619c9c3d69e1d6faf8dd81113b5eb263f5321e13023da9c91304bc69b3a4a740f1942a49db1b805f83b25895825409ed9746b9b77e9bdb8eb58a6f9a42c17e0d6ed441a955d40e622991834986344666bc3c47e1ff3818dfc6854ae0711cc52281f72e46ead6e052b51c5feece53dcdd2b4d394ae"}, &(0x7f0000000300)=0xe6) move_pages(r4, 0x7, &(0x7f0000000140)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff1000/0xf000)=nil], &(0x7f0000000180)=[0x100000000, 0x4, 0x40, 0x40, 0x0, 0xfffffffffffffffd, 0x7ff, 0xfbe2, 0x0, 0x7], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x6) 21:59:35 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x80, 0x400001) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e1d39e3a987f6440f1134290831b668db804b7a918a2854dc72dd294302a16983d20bddd129a8b783533a8a1601fc58ec4f06a184cf4e590c6ccdc4d7df0a34ffa372eb49d46610f0ae672df32949638fccbbd3657aca2f48756c2cb468455eb3e61c91a1c1031a7ec846ec5839c2525b3ccbe81ef8f3aaf73eda9863a9eb031ff43a2e5c1dbcddd452b617d7b82a815097cdd86832bae9d72ead4c766e6653c33b29910a90b66a6645", 0xaa}], 0x1) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) clock_gettime(0x0, &(0x7f0000000180)) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x600000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10400, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3f, &(0x7f0000000040), 0x4) 21:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000e8030000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x20000) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e05411, &(0x7f0000000080)=""/11) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 21:59:35 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x10001) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="737461636b203a3a0aa85d3080fc2748b395ebb1bd85137fc482c6b3184374c91da271d773551481a99ae300000000000000000000000000"], 0x654) 21:59:35 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:35 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) getcwd(&(0x7f0000000000)=""/202, 0xca) 21:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000039d8c0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x44000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000300)={0x4, &(0x7f0000000080)=[{}, {}, {}, {}]}) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:35 executing program 3: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000300)={0x5, 0x1, {0xffffffffffffffff, 0x3, 0x8, 0x3, 0x401}}) writev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) acct(&(0x7f00000001c0)='./file0\x00') ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000380)={'veth0_to_bond\x00', 0x3}) 21:59:35 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 21:59:35 executing program 2: r0 = request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000000c0)="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", 0x0) add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="35470043ca16ea6b24bf337ef70fd680994c77e9d7a660f92b4eb6972922c013b4e265f2f41f2ee06504e0e962e43d773390a88e09448b066dc669bc93daf3bd6a9991edeeedc892365e31e53d828e8cef00784b7e8fd004e2fab3c0860600b2116c87d8f4663028dde6968ac52fac5b318ab5d61814be1131cd335daf6bd1be673035410810ebfe64b88a283a77a04c34e14da0857afbf4b41d2b577d3722c55f954c56eebd71fc510496e1d3801bab0963d3f46c39ca62b63b57e015b4bcac485ecd85c63ba6ade1a7168ffa5e6a655335e6ee0c5df8d8836b1be190be16aee4", 0xe1, r0) r1 = syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x2b0d01) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x100000001, 0x6, 0xcd0a, 0x40, 0x7fff, 0x1}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x2000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='#nodev\x00', r0) 21:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000009000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x4, 0x800}) 21:59:35 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10000, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="0f322e66660fd2f5f20f004e00400f01c8c744240000000000c7442402b3000000c7442406000000000f011c2436f30f1ad86565d0af750000002e440f01d167f30fbd7723f2400fe68108000000", 0x4e}], 0x1, 0x20, &(0x7f0000000140)=[@cr4={0x1, 0x2}, @cstype3={0x5, 0x2}], 0x2) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7140fc311e5573bcb6ad6c83d3599c390b033a09"], 0x654) 21:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000006a0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:35 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x40, 0x2) 21:59:35 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") setitimer(0x1, &(0x7f0000000000)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000040)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100)=0xf96d, 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x2a2, @time={r1, r2+10000000}, 0x8, {0x9, 0x20}, 0x3, 0x0, 0x7fff}) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f00000000c0), 0x4e4) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0xab05) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:35 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xc6, 0x42) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000017c0), &(0x7f0000001840)=0x8) r1 = socket$inet(0x2, 0x3, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001800)='children\x00') sendmsg$kcm(r2, &(0x7f0000001900)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x2, @local}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000100)="1330c76ad6c57b97adffd1bbbc14599840", 0x11}, {&(0x7f0000000140)="747dfd0f229e6bc4c7ba9ce728ef07f5df682b023dc9d61428057a828581c45e235fb7fd8d284e326bd9abd7133bdf5c36d5e9bc104f5194923df85f3e9b5bc34a9eabe6ed6325717877c872c37530178f6ecffec52de2b365f728185cd2f85f04f3796f1c82bb0784a5f13081776cdccf13299a34b7d9ff86a00b50f4948d800d79b31c4ba98824", 0x88}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="6ee6fc592e82523b317e42a1edd90877c6ff402d9653b4fb8574943f0e635dfb5ec776992494b7f8d437eae839de1c28d565df08ad688a3cf6e508cf1b2f354d3f44e63dc1452a22d5456770c031be14cb1ae5ea9108debcdfa92639abe1978f1e56e049b13767629d31641db0e352ea16ab3d56d948b1e9a1730d68b15340e3345310", 0x83}, {&(0x7f00000012c0)="d7bcca3aa727653d85e6d2bb4201fb61998b6e4808db054f937fb1893a07024099b2089b69dba6bae25e197efd1fb540b24ccb0d22a2bf6ccd066bfef654e0dfe06403455d0c50eca7ef10eae4420989ebc48d717cee4897231757a207e0c09151926dececcd6d0daab9a6c11d43c3d7ab451f4e43606e2621ce4e1365f7c019faed3f94377d211159d49aad3c18ed98e4dc6622247b96a304e4bb974679a2aec298", 0xa2}, {&(0x7f0000001380)="f8490effb6d3e54d9aeefb5ba93cf4fbcae431391d0203df8646603d82474ecc573a97733b5f51c63288f339a87bde490c1dfed2f9584d2e35239b340cd029a4e3caaca2949739e80166ed6fcc25cfd59cf0cfda70b4e509c1f500557b1a8823844d072afd6c58e8a31eb043ebb036b98ca137051dd0e29ec2e1b85e40d534ef1cd57eb7dd7bf5ebd853b040f81ba6b7a960aaa6af8b9e217d1247543fd5393614c1c6817f7a2aad347f924ee09a5b1f1507b544e0b464b6f4bf754f092cda3de24c98bce9407e45074c363b4f6439c5ff6a6866e47749d135236f7b874f5688deff4ba277b645dd2490cd659f46ae8fc38a0f", 0xf3}, {&(0x7f0000001480)="12ca8415c1c009703f02ea701b6fc56b1b37b14d83a0c5487dd165ad3562add40b431a1396cfe1199865bb378a7bbfedf0963c6da7865afd2f9fd15dc61ae1225baaf4b4da2e6a26bd7f36e5267699f8987ac589d797b9816468b34727a7015c0ed30d961de6430310b80e7a0cf7b0d694eeb629803c4c6123573eb382546a425395a9e849d3183017a67abd604cd037b6cc2fcbc0753ee9fc6d9afd6c0ed6335c3f9c0fbb13dd297fc3688cb294bd5ac8f5fbc6c430f6b3e2a1e86701aab6d38a30fcd6574e191b4182", 0xca}, {&(0x7f0000001580)="9c169bf766b2565800bd5234b54232e0186e737a864748e6e943ebcd146bba4cc67f6274698675d5bc479572f8484bcc520d76ac99bd04713269e4a3bae0b032febc4bae54d30d00864d7bed2e4a819332c76872fbf8439f150eb1344a3f7257ee086ff14f07f2bfdcee2f5cf8d3e15859c9d352e857566895c6ee35adc1e3b79bb58f5e74978c99b7958d4b", 0x8c}, {&(0x7f0000001640)="e90a31313e121d734b7080be755db2c246de7be6a9a9c109f1c72237feda9d40b429f9b4b51a35176702849a2d7a92d526beb3bb08861e9d22f14ef77923c4799059a41d66ecefcbffcd45688ee03847a001a60f1c5ea58a7e8738acff1bb338672348a26489ebfb1b3f4b7fd667eeef92ff170ebb2d4eac1a42ff50d4cd24bc58a96df83ab9486bb598d6f141508bc1eabd94645f53daf888de04eaa376741560fc511e84f17cceca159180cb86ba0fcc4ccc3723e0194f5351ccc403b9c195f412b32102a213495c0ab227b8d07ae33e7d7245ad7a472f7fee", 0xda}], 0x9, &(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x130, 0x4000000}, 0x40000) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:35 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x1) r1 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@can, &(0x7f0000000340)=0x80, 0x80000) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000380)={0x5}, 0x8) r3 = socket$packet(0x11, 0x3, 0x300) r4 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0x0, 0x800) r5 = syz_open_dev$loop(&(0x7f0000003740)='/dev/loop#\x00', 0x80000001, 0x280) r6 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000540)=0xe8) getgroups(0x2, &(0x7f0000000580)=[0xee01, 0x0]) r9 = perf_event_open$cgroup(&(0x7f00000005c0)={0x7, 0x70, 0x9, 0x8, 0x400, 0x9, 0x0, 0xfff, 0x8040, 0x8, 0x6, 0x4, 0x800, 0x81, 0x5, 0xffffffffffffffff, 0x16, 0x0, 0x5, 0x1, 0x9, 0x9, 0x9, 0x400, 0xffffffff, 0x1, 0x1, 0x7, 0x6, 0x1, 0x1f, 0x6, 0x7, 0x5c31, 0xb2, 0x1, 0x8, 0x1, 0x0, 0x7fff, 0x2, @perf_config_ext={0x3, 0x3f}, 0x1008, 0x570, 0x4, 0x6, 0x0, 0xffffffffffffffe1, 0x5}, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0x4) r10 = epoll_create1(0x80000) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000640)={0x6, 0xffffffffffffffff, 0x1}) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x105000, 0x0) r13 = eventfd(0x4) r14 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/qat_adf_ctl\x00', 0x2, 0x0) r15 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rfkill\x00', 0x38040, 0x0) socketpair$inet(0x2, 0x80001, 0x7fffffff, &(0x7f0000000740)={0xffffffffffffffff}) r17 = socket$can_raw(0x1d, 0x3, 0x1) r18 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000780), 0x80800) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = syz_open_dev$usbmon(&(0x7f0000000a40)='/dev/usbmon#\x00', 0x1, 0x30da01) r21 = openat$md(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/md0\x00', 0x20000, 0x0) r22 = openat$tun(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/net/tun\x00', 0x10040, 0x0) r23 = socket$inet(0x2, 0x6, 0x4) r24 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ashmem\x00', 0x121000, 0x0) r25 = syz_open_dev$dri(&(0x7f0000000b40)='/dev/dri/card#\x00', 0x3c9, 0x80) r26 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000b80)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0xee01, 0xee01, 0x0]) sendmmsg$unix(r0, &(0x7f0000003a40)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="a0e9e96f3b9fceb3450c49dccb07bc313f52ed056ca1fa824fc7236b101777cba7c7745d39975b091d759c2ac647", 0x2e}, {&(0x7f0000000140)="b0e56c62d6a48b42201417055917f57c8c1261faa1df0c650e4235c1c8", 0x1d}, {&(0x7f0000000180)="0e6fd35c0475ccdf9c37ebd4617a7a45543153ddb9bd226c3f75a6e0b3f3f2861b03f9119a64f983eea5b441459de34a7c89058f65f10b7a2e1124d0e7daaef14705403000a7d751d7700ea55e9361f55dc525d01af318edbfbd591b52d87e1c3f650eee2ca21d9535d055ab99a3b49dcf12d2a8b6", 0x75}], 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="0c0000000100000001000000200000000100000000000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="180000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="340000000100000001000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18], 0x78}, {&(0x7f0000000840)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000009c0)=[{&(0x7f00000008c0)="83ae18a89c3ed03935b15dd6ca1ceb1b9f98ae1c12382df27c6443fb9a74cea0a7c41e551e6e37b14edecacfc11fc6fb872afe6e4e57b87ef432", 0x3a}, {&(0x7f0000000900)="318f8d8ecab69eb33b8be8aeb5a34db60c44401b0752422294dcfc151e6ef4543159a5a173f6e4f1af850ec24e6128769c205829c928f696dc74d74d080a06926de7167cd9969a67647a5933fbde75b6131bd89e76859084696d079f417d46e9896e7d1f0b2ee44b34eebef5a4271a", 0x6f}, {&(0x7f0000000980)="64659a66dcf87ff0a5bdc1d856ea1514ed101165a9308c096f371cdd0f2abfaa27cca1dbde8db74322ef753b9fb17a9eda2c75b66be44c61a6", 0x39}], 0x3, &(0x7f0000000c80)=[@rights={0x2c, 0x1, 0x1, [r19, r20, r21, r22, r23, r24, r25, r26]}, @cred={0x18, 0x1, 0x2, r27, r28, r29}], 0x44, 0x20000000}, {&(0x7f0000000d00)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001100)=[{&(0x7f0000000d80)="45a426632511555239ba97755f2a42150a68c42bfc9c12cf52637cda0873915ed3760078d0397f48d04f5f0e58874e87d8317d77ea69a33eb7e39105ca6ade0c151539977871c81a26280937ca4440a3d16ac80fb5b6db180719858b177f2e332780686b6de7f30f6d04218a4e3ad5e8efa2c9528de8fed3471292f09511bc99027b8234bc78af46c87e7e2011e4f3b283b72ad3792b1e4158d8883d01eae79bd363f87e381032", 0xa7}, {&(0x7f0000000e40)="6b704e42d75b0f17940db2eb4c91b804ceb2915717b42163bb50ece1c0226ec6317188ce66670bf3907766abf8648b4365bddf0dd1c834e73add9caf476ac2aa61a4a8990e7c0a1e13ce68ece03f9b45686756c950bdddb1545672a448da8e7a58748f605295d95cd39695b49fe41df0584ab1ea13f1caadb57b3740dc2ed7a5a59e6fe470a77c426b54aa29de21bcc73451bddd9510d6395af4130ac2cd07e0da28e13f412b14201ccc045f8744f3bdc2709c459e739fafe07e22d08f7a8e8caa0af48487cd74a4c752f4dc64131a9ce86dbe3df8ca8c16bc808bc74c636dadee8a6f85b77a5bdbd26d49d165", 0xed}, {&(0x7f0000000f40)="27aead1a532bcf61c754932352eae233b716f5450cd7100e03a9f9d7ea5e2b0a5950bdb0e94a64722d9cf22236", 0x2d}, {&(0x7f0000000f80)="f86974000e84acfba071aff657aefa3bde68169172ff1623876e197ab947042d6c74502f94725bbe775f46a2ab074138d11e63c14cc1bf22097cb5e803a7001957b551eb25eb3c42050bfc335a9d94a236bf6540c0d172bfcba5547690caa03e9196e2446d9d54de2e79a6036ad8736a1411ba6f8b4bbfb13689944101053404b0c6ef2cdc7c956c8c3841676e3eb62e1883fc82e687d03a8441de5ab2c1fe8b33219bde5ba8dc63dadc1b359fe2dd0b67", 0xb1}, {&(0x7f0000001040)="e35a44741d978b7424356379aa40f40cc4d0fb0a8ea6ea2e060447ffb2b8f44e91cd9095724adf12eb8ce96164f2f3edbe249697707c0b6e3b5a0368becf962378345778797191ede658624d95a88a9298d9ed2ec4ba85f1f67d51dea18d7b319a11002e305ce95f3c1f2c785cf04d0944f6b640f6009937bb12208d6b6e5e38ca67d5533db0", 0x86}], 0x5, 0x0, 0x0, 0x400c800}, {&(0x7f0000001140)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000036c0)=[{&(0x7f00000011c0)="a7cbc4033632514dda1c0d05fc70a4b40da2848ebbca28ee6d2c83d40fbcabc8eb9569d27f9f7575819d4a9c6b078f3fe9ba2eeac2ffdd8a42fdb90fa3a7e44f17c0e3a3d019f57d3ecfb157d5e40baed0265692de111df763778783a9d797ee2d609dafc9c7c16a95e0fc97ca671e8a1d9a0a56fea2b1adfb0de4212794f83679a5edac6177aa6756df4aabd1013892615dd37615934c9ae8cae7ad72b3531df1edd81fca6e4df50000f44bbb53e5825c25efa9af5082d154632b4068111332abf5ecd29c7a2d4f1f944c", 0xcb}, {&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000022c0)="61984cb57593442f97b3a7d954b1024764dffcd75a2735064c77d2bde3b70e2c7784322401a6dfd03255083fdba85d309f8f0ebc577d70b877ed9bb8b81db1baabfea7e11459b08d7304fca456e69854ddbf047d0dc181631791ec401b75", 0x5e}, {&(0x7f0000002340)="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", 0x1000}, {&(0x7f0000003340)="6a6f72d78d5ac719dd2e9498599e3eca2201e390c9f6c26f299db88cd57da900cc435fd86218109e0fc14f07e89663ffcc0742f4ee3ea8f4ecae14a29ed0ee0c78bb253ba70d2b6cc2d3eb684190a7ae", 0x50}, {&(0x7f00000033c0)="cbb7d05ccda3e3df116f3fdff3cf23065e4af8c312cbcde005524c6fd638cc162b6da1187406fb32baa7d43858348d83e5b076fd8a0da24900e0758ef1d24e14bb341472cda4cef786712276044b07bef2be9c6f47908e6cb3af5abee99512f9bf9b352c55ab0517369f0ee24b08264b07386a59", 0x74}, {&(0x7f0000003440)="b528f60b368285b82b29d7790a853736", 0x10}, {&(0x7f0000003480)="a91b708d3e5e0dd5af811b39b43aee17a11f733fe0107c9a00ff04f0012e282707843269a6d2afa52f750fbab40dfaf4377857d3fd39a7c342ce15404cb8ae9b122488f2853fa68dc8ea50c33ff82ea21f21d6616483b54950a07b4ed6238e205f49c0349fb54ac9c8f5b526a22653a52337880b689846bdb0fe130ed6aa3643b92e01f8e333ab7574df05051d0c498731e607a33bdc96603e7c1302efaeab3c9a605d4babf9385bca52cc97e8180f0856764b21fe1461cd6c2d4ea4dcac488ed06b6b854ceb7d0906468bbfffc63bdb7f3518", 0xd3}, {&(0x7f0000003580)="e6a4eee9a50c026562e1d6ac6ce7197078e1b38dba38e8248c260106d575e069ed0a7b02cbddfbe3349a94d47c38fb0e8bad1b", 0x33}, {&(0x7f00000035c0)="07007bae88212f29b60ae8f45babb64fe06f061c549836481b70a72d0d4881adf08329ef561bf3f4f6fb061e544f09bb6cf2fabb31350cbbe0f08e7921603d0cb9146220be7b0480b4ed3919b67020a7b276b29792b7b48809bd9b97af218fbf8ff185d107dd264dd45825790a7a03a4eefa21296d74a2f77e4026a184c9dc41a26e04d481845003db73fca138e408a2bda9e1c63032b34b03143faf70dc8cd451f69642a0992d658ea0e87704bf3e7bac8ab6e0f663ee074639bb6ff8d8ef219044edd8357eb113f918a24d66d3e96e9e11357aba72053b6d387ddf6700b472ec08b7ae50ace438fd44de19fa2893b66aa3cc61", 0xf4}], 0xa, &(0x7f0000003740), 0x0, 0x800}, {&(0x7f0000003780)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000003a00)=[{&(0x7f0000003800)="9e248c6c37e8a8c88464a33c45bb931e60db3d2e4841db0cdd5963f487c4272338d1a224193ffe347177fad61a7195e806f2b4bac4e609c70883a69874a59ce80c3b2e0842dec2c3e89ad2a9d4e1a08d53b605f7949885589b96b41291eeb8188d563946cc1f83fd55ee1934b7b1e9ef58", 0x71}, {&(0x7f0000003880)="9f312503686f9a0a28fa510a16f90977d6428200c58c88a7489beb4b01e8079317cfb95d8f4fec2b62f8e017f68c60cecd1ad86ab06dbae5e0a10030da177f6e57a08df66c6e0be7", 0x48}, {&(0x7f0000003900)="87a60737769446a58d172d6bd9067be7986760c21640180399bb5b7b02a4209845510faef8903236a0a96bc7bf7cce7aac22d7aa7c39775a93869056aaec1a6f8a9315930af3b6cac048e5aba742022669f1d43df3466acf4db66e09af3faa1e74f40c472547b9babcbf6a149bddab514d253ea61704822d08b07342d8d1fda52f7dda6fecb6d271b6e2a5f19b9f74204a712d6a58be4cc6b61f9451228a43e8bce2ebed4e120540b266e41761021517a76fa8492d3dc726a251a5f8d5a1a9aba5218eae8028", 0xc6}], 0x3}], 0x5, 0x8000) r30 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r30, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) 21:59:35 executing program 5: socket$inet(0x2, 0x3, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400080, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000100)=0x1, 0xfffffffffffffd96) 21:59:35 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x106, 0x100d}}, 0x20) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200)={0x0, 0x52, 0x4, 0x80}, 0x8) statx(r0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x410, &(0x7f0000000080)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000ffffffff0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:36 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x202, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000500)=0x18) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) openat$random(0xffffffffffffff9c, &(0x7f0000000540)='/dev/urandom\x00', 0x400000000080000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6, 0x4e20, 0x9, 0x4e20, 0x6, 0x2, 0x80, 0xa0, 0x101, r2, r3}, {0x4, 0x7, 0x4, 0x6, 0x200000000000000, 0x9, 0x100, 0x6}, {0x8, 0x6, 0x1000, 0x100000001}, 0x9, 0x6e6bb6, 0x2, 0x1, 0x1, 0x3}, {{@in6=@mcast1, 0x4d6}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x3503, 0x3, 0x3, 0xce, 0x3ff, 0xfffffffffffffffc, 0xffffffffffffffff}}, 0xe8) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xf76, 0xd251aab60b75a775) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x9, 0x1, &(0x7f0000000080)=0x4f1}) 21:59:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) r1 = fcntl$getown(r0, 0x9) r2 = gettid() r3 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x5808}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x2dc, 0x28, 0x10, 0x70bd25, 0x25dfdbfe, {0x3}, [@nested={0xa4, 0x78, [@typed={0x8, 0x1a, @pid=r1}, @typed={0x4, 0x88}, @typed={0x8, 0x1b, @pid=r2}, @typed={0x4, 0x1d, @binary}, @typed={0x8, 0x55, @pid=r3}, @typed={0xc, 0x78, @u64=0x4104485c}, @typed={0x8, 0x8b, @ipv4=@remote}, @generic="b93275de95610974c98b3a2b8217556ac183598a7721ccf3d0a981153c5badfcf2d6c9cf46ba46dc7cf75f7f06ed31231c6ec9889a308f04d32ec23a2171b63dcaf33aabc537f27963f3e22ebac8efc6dd59c579704b65b4abd08e0fb5", @typed={0xc, 0x22, @str='\\.,&#lo\x00'}]}, @typed={0x8, 0x77, @fd=r0}, @nested={0x180, 0x4a, [@typed={0xa8, 0x7d, @binary="5c9f383c68672e4a969585c9d6f855f9ca7c30d89b82c81dbadd70c0034690d2be1595da7fdd00f324199850cf7068ffd6f8dab0c2fe3887a9be5f0852722abc54b2d1a0babaa2e18dffdfa86290ddc3715de46b948ddbe819eb60ff99e4d36e4c3bf98439ee78bc4310694f0aa7855940c0550d8c3e8af81ea2b4593da048d5152db9211ee31d21809317a578acf8c93fe5bb574e8e549dcb43d0dd022605ae84"}, @typed={0x8, 0x7d, @pid=r4}, @generic="869f5c4db277120ba6ac2a191da55c8ff1dc1164789c4a783883acc140debf45564e29f94779178995483ef6d4bff680df94e03bee18daf453496f480e8931f5e8cf13c4fb09442fe881a7fa712d2f07e1fcae7f90fb4f300cb855f07322feaa5cd4eb856fd2d29dbe6b2b7b497c8d11171d7b03daa6ba89fc9b034e1b51a91538a14948df2ca3e78ef9a2330ed22a675ae6", @typed={0x8, 0xf, @pid=r5}, @typed={0x8, 0x13, @u32=0xffffffff}, @generic="d509928a6de82f453ff9", @generic="9448757a", @typed={0x8, 0x22, @str='\x00'}, @typed={0x14, 0x1a, @str='selinuxnodev\x00'}]}, @nested={0xc, 0x4d, [@typed={0x8, 0x7c, @u32=0xb2ea}]}, @generic="6da6264822cb863fd3422cff3d5a91e19e701b01", @generic="024d3729c38084de29b51a69fddd574846cb8e75df59bd32b489149d096fd5c47177089b36701af12dc00979c46f3fc2469c2e74ba2586d87c6ba1ae07063e5efd275ea24a97c14e87f480524814333ccbde40c1b5c413dc5cdcf0086c2911dfdcf7dad999e9d5f72a36c1001e81ad3599975d85a7e032beaf0488"]}, 0x2dc}}, 0x4000) clock_gettime(0x0, &(0x7f0000000180)) 21:59:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000003e80000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:36 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") clock_settime(0x1, &(0x7f0000000000)={0x0, 0x989680}) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0xc0000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a45321, &(0x7f0000000080)={{0x2, 0xff}, 'port0\x00', 0x8, 0x40000, 0x0, 0x64, 0x1, 0x7, 0x7b, 0x0, 0x4, 0x70e}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x401) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @local}}, [0x7, 0x4, 0x56b, 0x8, 0xffff, 0x80000001, 0xd87, 0x400, 0x1f, 0x1, 0x9, 0x9, 0x2, 0x5, 0x80]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1}, 0x1d2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000001c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={r2, @broadcast, @broadcast}, 0xc) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:36 executing program 2: r0 = socket(0x3, 0x80000, 0x8) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) request_key(&(0x7f0000000040)="b7745a3de53c98ed4e8da91992a5355d642e735f657200", &(0x7f0000000080)={'syz'}, &(0x7f0000000400)="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", 0x0) 21:59:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @dev, @multicast2}, &(0x7f0000000200)=0xc) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8021000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@newtfilter={0x34, 0x2c, 0x0, 0xffffffffffffffc1, 0x25dfdbfe, {0x0, r2, {0xfff3, 0xffe0}, {0x9, 0x4}, {0x0, 0xfffe}}, [@TCA_RATE={0x8, 0x5, {0x80000000, 0xfffffffffffffffb}}, @TCA_CHAIN={0x8, 0xb, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x15) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@host}) acct(&(0x7f0000000100)='./file0\x00') setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:36 executing program 0: r0 = syz_open_pts(0xffffffffffffff9c, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000080)={0x5, 0x9, 0x6, 0x0, 0x2, 0x5}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000100)={'bcsf0\x00', {0x2, 0x4e23, @multicast1}}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="73e6d096de1e62259820193590edbe6ffe9aa2417461636b203a3a0a"], 0x654) 21:59:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000400000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:36 executing program 2: add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="03b03d61af952eb020bdc5c7d9354ab807655d6cdbeff0dd00c5bd9154f83c7b45c2950a1d35297d3d3717795047412dd36ce7968607b8c0f8dbb84c7402db90e3d90313260c38f5d3cbaee3f4df4c54f8aa00c8ade17ef816fdd6533430", 0x5e, 0xffffffffffffffff) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="dc60bd47a77ee091b7ca4f8ebbe87ad114e94fdfdf5994ec98477401c0843ed09b6aa511ad3dbd4dec3b6831e142663210c5e8dd59f9bf17bd47a7aadb0bc40d55da3d61b35d9153c452d50477472887bf6aff62f76dce51353e19bfa84e6a21e16314dfecd075228e2db14d71f57c927e5a256324bd5864d8125ed0a63f77d588ad94c92eddc2f24f49be", 0x8b, 0xfffffffffffffff9) request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='*em1^(wlan0\'(-\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x23f, 0xfffffffffffffff9) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", r0) 21:59:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) io_setup(0x391e, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) io_pgetevents(r1, 0x4000000000000000, 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000180)={r2, r3+30000000}, &(0x7f0000000200)={&(0x7f00000001c0)={0x3}, 0x8}) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) getsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x6, @ipv4={[], [], @loopback}, 0x6}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={r1, 0x62, "69598b1b90e6589c6dbf93681e20286939a31b1ab9a2960c3ef139a5fd0cd33bea90f5fcc1f3c358b5c514158142ddb2694c40b2c7977cb7209925ce317679a9eab650bce45fa90f7192d4af6a020bfefbb97d5169a3d388bc683c1dde79d091b6c0"}, &(0x7f0000000380)=0x6a) clock_gettime(0x2000005, &(0x7f0000000500)) 21:59:36 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0xfffffffffffffffd) 21:59:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000ffffffffffffffff0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:36 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000300)=0x5bd8016e) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x10004b4180, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) select(0x40, &(0x7f0000000040)={0x8, 0x9f5a, 0x0, 0x9, 0x4d2, 0x5, 0xb34, 0x10000}, &(0x7f0000000080)={0x9, 0x6, 0x68f0a2d2, 0x7, 0xfffffffffffffffa, 0xff, 0x13, 0x7c22}, &(0x7f00000000c0)={0x2, 0x9, 0xa2, 0x9, 0x80, 0x3, 0xffffffffffff0156, 0x1000000000000000}, &(0x7f0000000100)={0x77359400}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000002c0)=0x3ff) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x60, r2, 0xa00, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) 21:59:36 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000280)) r1 = socket$inet(0x2, 0x8000000000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x18, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) getsockname$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind(r1, &(0x7f0000000340)=@hci={0x1f, r2, 0x3}, 0x80) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'broute\x00', 0x0, 0x3, 0x39, [], 0x6, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/57}, &(0x7f0000000200)=0x50) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 21:59:36 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80800, 0x46) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc010643a, &(0x7f0000000040)={0x4000000, 0x7, 0x15}) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000b000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:36 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000000)={0x0, 0x2, 'client1\x00', 0x1, "8608ede3d1ee2e3b", "45932d997d6d74b1f9bd0a19a2b412a25ef1e2dd8e8fa76ca6212d12909a7c69", 0x9, 0x2}) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000240)={{0x0, 0x7, 0x300, 0x5, 'syz1\x00', 0x8}, 0x3, 0x20, 0x5, r1, 0x6, 0x5, 'syz1\x00', &(0x7f00000000c0)=["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", 'syz', 'selfem0ppp0:\x00', 'syz', 'client1\x00', 'trustedeth0GPLmd5sum\'-\x00'], 0x17c, [], [0xfff, 0xfffffffffffff800, 0xe4, 0x1]}) openat$cgroup_int(r0, &(0x7f0000000400)='notify_on_release\x00', 0x2, 0x0) 21:59:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1}, 0x18) 21:59:36 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") clock_settime(0x1, &(0x7f0000000000)={0x0, 0x989680}) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0xc0000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a45321, &(0x7f0000000080)={{0x2, 0xff}, 'port0\x00', 0x8, 0x40000, 0x0, 0x64, 0x1, 0x7, 0x7b, 0x0, 0x4, 0x70e}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) [ 304.009155] kauditd_printk_skb: 10 callbacks suppressed [ 304.009167] audit: type=1400 audit(1539295176.733:136): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=23933 comm="syz-executor0" 21:59:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x3, "abbe5210330a67e0"}) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_pid(r0, &(0x7f0000000100)=r1, 0x12) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0e05403, &(0x7f00000001c0)={{0xffffffffffffffff, 0x3, 0x1000, 0x0, 0x8}, 0x401, 0x0, 'id0\x00', 'timer0\x00', 0x0, 0x3, 0x800000000000, 0x1, 0xfffffffffffff212}) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='system.sockprotoname\x00', &(0x7f0000000340)=""/27, 0x1b) clock_gettime(0x0, &(0x7f0000000180)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000380)=0x4008000) 21:59:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000002400000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:36 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x333d2d4bed81bc06) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22}}, 0x2, 0x8}, &(0x7f00000001c0)=0x88) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000200)={r1, 0x10001}, 0x8) r2 = dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000240)={0x7ffffffe, 0xb5}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:36 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xb6c, 0x40) socket$inet(0x2, 0x3, 0x800000000000005) 21:59:36 executing program 0: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000300)={0x5, 0x1, {0xffffffffffffffff, 0x3, 0x8, 0x3, 0x401}}) writev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) acct(&(0x7f00000001c0)='./file0\x00') ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000380)={'veth0_to_bond\x00', 0x3}) 21:59:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20000, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080), 0x2) 21:59:36 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5cf, 0x48000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000005c0)="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", 0x0) 21:59:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000e000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:37 executing program 2: socketpair(0x9, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="c2920c21d574a9700fac8e59ef9e46108bd4bf21cc3bc18c68ffd90967e723e9a72955072a9ae5088f7a7a89dcf00a30f6c2aaf5668c473ccd1690fa8e8bcbee40df1a607ae533bd240f8c439dcf364447a986f65031b6c5e534cab2da1d3c02995e3ab206703dd7737018c95ec91b928189073cf21c2b9c98fedf1c1afc3eacc60e85894f30ce0804f998b54c7f3f2dd64c89fafa5ce67127ea30dfe33872b5a17547945742840d19b7d77f99817fc50134b802d9865e07881fb5a8b38efd260d56dfbaed5a1f900ff7e00f2000a488f2a8313a2a31a4748d518acdcb2475e81e3af3b8e8f0e2708b0cb1429b1b0e", &(0x7f0000000400)="add5e5aea36849fbb2b9704bcec14c685d7f78f51f7d5df6f3c837d36054e942b636b01eb78cbce58fff7614d1c594e6d7819356050ebe6e553a33a23ce41809df8770a741dcc8716ab50a30a6744914c4b4e5c6deb94c3a6f0fbad721caae4bac267ec9bff4ebf56fb204cba486ea921251f4b017173db81a63538f5c82a7ef97d1d2573f4edef176b698b4d54a353542dcca0328330b7a38e2bece8181ed49a3bf83e19f31f61c6d475d44bf8d6157ec132b129a9abd93c63982dab43913b8b5d4bcb5ad40d296da8622d8448bad8eb3a75b24434f60f3c9157448cc673e88ec5f27a6aa22b82e9e125d9679", 0x1}, 0x20) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000000)="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", 0x0) 21:59:37 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000040)={@local, @broadcast}, 0x8) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)="2f67726f3c23fb57e6c60f1f4b45b74dfdda49fb1b742335e518a4cb3a9cd12dcea400d899c22c652b3a471b4a7db7f3fef6e02e2be389de193945a385bd81e9bdeeee35ad0b8842e54472a634cc5f650acae903000000000000005b540745df4b1dee483b157624c5bc719a099e340000000000000000e9b981ca8940ac1d292e0fafb8904d052a6e4561ff1b01cb61f037b440cd68d32ec603f8e8da5342951e3238d6d1159984c5926a7e2918d6cc287542387b27aa4df70f61db8272b10828cb990c41ff054757ed75d2c0ced16e32433f3ee0eb942dbfac4a5cd0672435de5d52321d45abc71ad3ed775f331a52d49e81", 0x2761, 0x0) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000280)={0x28, 0x2, 0x0, {0x1, 0x7f, 0x1ff}}, 0x28) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) write$cgroup_pid(r0, &(0x7f00000003c0)=r1, 0xfffffffffffffe0d) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000300)={'eql\x00', {0x2, 0x4e20}}) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f00000001c0)=0xc5fe, 0x4) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000080)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000200)=0x200000000000000, 0x8) flistxattr(r0, &(0x7f00000000c0)=""/156, 0x9c) clock_gettime(0x0, &(0x7f0000000180)) 21:59:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000090000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:37 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0xe000) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0x3b028fb06411ad30, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x10000000000000ea) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)=ANY=[], &(0x7f0000000040)) io_setup(0x3ff, &(0x7f0000000100)=0x0) io_submit(r3, 0x0, &(0x7f00000002c0)) ioprio_set$pid(0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:37 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f00000005c0)="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", 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000400)='/dev/amidi#\x00', 0x13, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) getresuid(&(0x7f0000000000), &(0x7f0000000440)=0x0, &(0x7f0000000140)) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)=@delpolicy={0x174, 0x14, 0x304, 0x1000, 0x25dfdbfb, {{@in6=@remote, @in6=@remote, 0x4e21, 0xffff, 0x4e20, 0x80000000, 0x2, 0xa0, 0x20, 0x16, r1, r2}, 0x6e6bbc, 0x1}, [@algo_auth_trunc={0x110, 0x14, {{'rmd160-generic\x00'}, 0x608, 0x0, "6cb85fcfc9587b53a6a3e4cb0de02aa8681240f54a9b74c66d8abcc26108a91ea4b79fc441825f0b1694890636e84e3c45e1d87fce8845a156bedd4e974d6bbb44f98c21b1ea5f384f3d6ac615b5cba6c486c0db4d4010e312b3f49375c4123c90f6aeae1c50e4ea929cc45016889959b2af1ff2d8f29fda33e7d2a377f9c0e18adf313422e5e2751dfd92f0dd77d92b099837b4c830e54f2c57cc839ff2319ba51878e6fcaee2b98a22a8ed0ce8e59cdac767cf14a183d0a48bb42255683d886e"}}, @coaddr={0x14, 0xe, @in6=@local}]}, 0x174}, 0x1, 0x0, 0x0, 0x400c000}, 0x4) 21:59:37 executing program 0: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000300)={0x5, 0x1, {0xffffffffffffffff, 0x3, 0x8, 0x3, 0x401}}) writev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) acct(&(0x7f00000001c0)='./file0\x00') ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000380)={'veth0_to_bond\x00', 0x3}) 21:59:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:37 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2a00, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0x2, 0x6}, 0x1, 0x100000001, 0xf78a, {0x4, 0x9e}, 0x3, 0x7}) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000004000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x2, 0x3, 0x1000, {0xa, 0x4e24, 0x8000, @dev={0xfe, 0x80, [], 0x12}, 0x6ff}}}, 0x80) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='syz', 0xfffffffffffffffb) r2 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80000) write$binfmt_script(r2, &(0x7f00000003c0)={'#! ', './file0', [{0x20, 'cifs.idmap\x00'}, {0x20, '-wlan1wlan0'}, {0x20, '*vboxnet0!]cpuset]'}, {0x20, 'wlan0'}, {0x20, 'system--#'}]}, 0x46) ioctl$FS_IOC_GETVERSION(r2, 0x80047601, &(0x7f0000000300)) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000100)="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", r3) 21:59:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000006a000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000001c0)={0x9, 0x9, 0x0, 0x7fffffff, [], [], [], 0x3, 0x3, 0xfffffffffffffff8, 0x2, "ae611575b37c8676d1e194390b65f764"}) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:37 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x10082, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x42ae, 0x80000000, 0x5, 0x0, 0x0, [{r0, 0x0, 0x40}, {r0}, {r0, 0x0, 0x4}, {r0, 0x0, 0xc053}, {r0, 0x0, 0x200}]}) 21:59:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000007000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 304.869125] syz-executor5 (23987) used greatest stack depth: 8992 bytes left 21:59:37 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x1015, 0x2, 0x5, "9544bad85048e177be67447c84c4e455", "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"}, 0x1015, 0x3) r1 = dup3(r0, r0, 0x80000) write$P9_RLOCK(r1, &(0x7f00000010c0)={0x8, 0x35, 0x2, 0x2}, 0x8) 21:59:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:37 executing program 0: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000001640)) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000001a80)="07a701df149c2b43f0764cde4687f8649c028101533b11341a16d38359d7281c1e462cca9cf7a030d53e8329039455c02d42d5fdc835ed43ef202b7dca3a470d42cbdb8fa254872c66a596297cf0afd40f3599fd8f7ef879164645f762abeaeb9926be605dd88bd1b7b3db007de0cd5b824f218abb65ecdd2d160c852e3b3561dc43236bc8cc64f0ea", 0x89) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000e000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:37 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x3a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x49}], &(0x7f0000000040)='syzkaller\x00', 0x7, 0xc0, &(0x7f0000000080)=""/192, 0x41f00, 0x1, [], r0, 0x9}, 0x48) 21:59:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000002400000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:37 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f00000005c0)="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", 0x0) 21:59:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:38 executing program 5: socket$inet(0x2, 0x80000, 0x8000080000000805) setsockopt$inet_int(0xffffffffffffff9c, 0x0, 0xca, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) 21:59:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000010000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:38 executing program 2: request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='dns_resolver\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r0 = request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='syz', 0xffffffffffffffff) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000005c0)="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", r0) 21:59:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:38 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x401, 0x40000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x85, "b2a85057ff883166ae02f344672b9d659959b0894509a03300fdd7062e724fb22dda45ff11a17e8dfb4c00ea266950a26361511bbbe0adde2d78244bad1201b9317ee21cda5f23ec433c37a55a3e642e1f92c12564dd9802cdbbafc462fb51a17d0bedca37cff1a89aeeebbd0ea1f84ae20cda2d67a3277562596ad5dc1fe26f8adf6b0a81"}, &(0x7f0000000240)=0x8d) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)={r1, 0x9, 0x91, "90783ac35ee69c5a3c9c12131effc4bfe1b9412dd0ad0d2e2cf9575676d5bec303dcfb581d7f8927b7a8ba1f8c31356ddb6f9a6cf722ea21759d7be570f99fd968098f3325df2fe449266522d61fa5f451cd9efbb301a08f807269cb203966584da02791059a7c1f78023628fb174a4da3bbb25103bda51852e5d0b3d39baf96bc7e099d9772ac293e5b8af93d446dcd95"}, 0x99) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400001) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000080)={0x3, r3}) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="737461636b203a3a0a53ca039597cdd968165c4160041a9deb87fac7ac5dcdd23cfc875d72225d4066c611e5619d759783b86a1cfe2d13d9dc7333cf82d00224d4553aba053a6ae36270b8165567f76875880d3282752669eddc04ed4cceb605fd059140ac0d306b1ea3d234a65a0a8d246344f0a8d4"], 0x654) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f00000000c0)=0x400000) 21:59:38 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)='/dev/input/mice\x00'}, 0x30) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x3, 0x109000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)='/dev/input/mice\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r1, 0x0, 0x1c, &(0x7f00000001c0)='bdevsystem(posix_acl_access\x00', r2}, 0x30) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x220400) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000080)={0xffff, 0x0, 0x10003, 0x4b5}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40086436, &(0x7f00000000c0)={r4, 0x62}) r5 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r5, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:38 executing program 2: r0 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)="e318a44773dfabdcf887679dd25b0bbf82f07e3d91a23f360a2878fca7ace9729fc8eba8768f128be5087ef6a1bd32541e2db3cdeeae4a24826f3a970c7af1e0161f37403a919c36f410d89f587e7230832ba91135cfc4a22d0f60fbe84415b65729a40a9839d1905f558f9a7cbf0a0b94050273326e98a69593634d9271d5851dca841354d17ef539407851915ffedf32e4fd41be454fb72ae53c1c55654a40d10f335818af89fe6c8a741aed0c99a8d7dffb70ebd051fa75d5bdf3d160d74af68188cab37a4448098be29542d859ee857b02a505e0bef475ca116cfd6447f147ac91750ac2ace76dcb2f2fedb7da6e1941037acd", 0xf5, r0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000001740)="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", r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000080)=""/240, 0xf0}, {&(0x7f0000000180)=""/169, 0xa9}, {&(0x7f0000000240)=""/45, 0x2d}, {&(0x7f0000000280)=""/91, 0x5b}, {&(0x7f0000000300)=""/82, 0x52}], 0x6, &(0x7f0000000440)=""/32, 0x20, 0x9}, 0x10002) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000004c0)={0x7, [0x1, 0x6b85, 0x2, 0xffff, 0x80000001, 0x8000, 0x55214232]}, 0x12) 21:59:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000a0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xb3b4, 0x802) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)="2f67726f3c23fb77e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be3bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000100)={r2, 0xe}) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:38 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0xfffffffffffffd73) 21:59:38 executing program 2: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80800) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x40100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0xed, 0x40, "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", 0x3e, 0x1, 0x0, 0x3bfa, 0x7, 0x7f, 0x1, 0x1}, r2}}, 0x120) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 305.835976] audit: type=1400 audit(1539295178.563:137): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A53CA039597CDD968165C4160041A9DEB87FAC7AC5DCDD23CFC875D72225D4066C611E5619D759783B86A1CFE2D13D9DC7333CF82D00224D4553ABA053A6AE36270B8165567F76875880D3282752669EDDC04ED4CCEB605FD059140AC0D306B1EA3D234A65A0A8D246344F0A8D4 pid=24096 comm="syz-executor0" 21:59:38 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/87, &(0x7f00000000c0)=0x57) 21:59:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 305.949969] audit: type=1400 audit(1539295178.653:138): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=24112 comm="syz-executor0" 21:59:38 executing program 2: r0 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', r0) 21:59:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:38 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f00000000c0), 0x3) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x100, 0x105800) 21:59:38 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000070000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:38 executing program 2: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x2200, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x4000, 0x1}) getegid() prctl$setmm(0x23, 0x5, &(0x7f0000ffd000/0x3000)=nil) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB="030000000000000000000000000000000700000000000000", @ANYRES32=r1, @ANYBLOB="00000000010000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000070000000004000000000080eba25ebd7fcf0e0000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000050000000000000000000000000000000000000000000000"]) set_robust_list(&(0x7f0000000240)={0x0, 0x5, &(0x7f0000000200)}, 0xc) fcntl$notify(r0, 0x402, 0x8) 21:59:38 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)=0x5) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x44080, 0x0) mq_open(&(0x7f00000001c0)='/dev/dsp\x00', 0x80, 0x20, &(0x7f0000000200)={0x80000001, 0x7, 0x1, 0x1, 0x2, 0x2, 0x4, 0xfffffffffffffff7}) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x800, 0x1, 0x6, 0x5, 0xff, 0x7}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x6, 0x4, 0x5a}}, 0x30) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f0000000100)={{0x8, 0x10000}, 'port0\x00', 0x44, 0x40400, 0x4117ddd3, 0x81, 0x7, 0x1, 0x9, 0x0, 0x4, 0x3}) [ 306.105747] audit: type=1400 audit(1539295178.833:139): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3D3A0A60 pid=24136 comm="syz-executor0" 21:59:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000), 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:39 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:39 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f00000000c0), 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xaa, 0x4, 0xff, 0x9, 0x7}, 0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x3ff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x7, 0x203, 0x100000000, 0x1, r2}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) 21:59:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000f4010000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:39 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x402000) ioctl$TCXONC(r0, 0x540a, 0x9) 21:59:39 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) [ 306.372868] audit: type=1400 audit(1539295179.103:140): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3D3A0A60 pid=24165 comm="syz-executor0" 21:59:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='rxrpb\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='[\'+securityselinux//vboxnet0)ppp1\x00', r0) keyctl$describe(0x6, r1, &(0x7f0000000200)=""/67, 0x43) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x600}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000090000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:39 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x1, 0x4000) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000000c0)=0x20) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x14, 0x7, 0x4, 0xc4, 0x2cab4df3, 0x2, 0x6, 0x3ff, 0x4, 0x9, 0x7}, 0xb) 21:59:39 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000000c0)) [ 306.509417] audit: type=1400 audit(1539295179.233:141): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3D3A0A60 pid=24189 comm="syz-executor0" 21:59:39 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x100) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x10000, &(0x7f0000000080)=0x4) 21:59:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000200000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:39 executing program 5: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1, 0xc0005) r1 = socket$inet(0x2, 0xfffffffffffffffa, 0xc) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000040)={@empty, @dev}, &(0x7f0000000100)=0xc) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000080)={0x9, 0x8, 0x81, 0x5, 0x9}) 21:59:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:39 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000080)="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", r0) 21:59:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000a000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:39 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000180)={0x3c}, 0x8, 0x800) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)=0x3) fstat(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r3) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000003080)=@hci, 0x80, &(0x7f0000003200)=[{&(0x7f0000003100)=""/83, 0x53}, {&(0x7f0000003180)=""/105, 0x69}], 0x2}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f000000c2c0)={&(0x7f00000000c0), 0xc, &(0x7f000000c280)={&(0x7f000000b940)={0x14}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000b80), 0x4000000000002ce, 0x62, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r5, &(0x7f0000000100)) setuid(r1) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:39 executing program 5: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) userfaultfd(0x80800) 21:59:39 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="f413ec78a954f7ef76edeb3973d9f5a9f8b0001bac394359209d2f732da09f9d819382c90e4070cc8a2ac3c286de01d8c11b8b0a20992f30efe25d7fb869bf5d909682fd995c4e4b51642a0d84464910bf449a69e87f5fefd76b9a653e40107680662b81c9436ba40af6d4fdceae5d1a1494b013274863fb36e48ee571ff7326def999a2a37cd9567d0377607e9fca96ae6556", 0x93}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000003e80000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:39 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0x36) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:39 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:39 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:39 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 306.975703] audit: type=1400 audit(1539295179.703:142): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=24245 comm="syz-executor0" 21:59:39 executing program 5: r0 = socket$inet(0x2, 0xf, 0xfffffffffffff6ec) fstatfs(r0, &(0x7f0000000040)=""/22) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f00000000c0)=0x800, 0xfffffffffffffcfe) 21:59:39 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={@local, 0x35, r1}) request_key(&(0x7f0000000380)='cifs.idmap\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x0) 21:59:39 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:39 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x8000000ca, &(0x7f0000000200)=0x2000000001ff, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400100, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1ff, 0x33fb74ee170e3c7) socketpair(0xe, 0xa, 0x5, &(0x7f0000000140)) dup2(r1, r0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x40, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) 21:59:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'osx.', "2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34"}, &(0x7f00000001c0)=""/112, 0x70) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000007000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:40 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20590f9a1e480c42, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x8) 21:59:40 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) sendto$inet(r0, &(0x7f0000000380)="140d071b8acbbb384fef299d5a82666a5de027cd6c3ecae7d76c8078a786bafbdf94656b814f4dd4e137882369f0292fa0910db4e85e40a7dabadbf43581e1d8d4ce4978c0bf4d2f65a7586636368a435a39ec58aa5f45ed948ee03033e0670e0fe46497aede614798baeabe462b693a9e8b9a323ce7dda9c4ea616ea3ce2b4fb75ae01ed388bfb87fef0240cd692a7297454459e864d7fa3f711fcdde7e37153d36e120d5b4136f4e", 0xa9, 0x44, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="00fb90020787013f872d73a31a8c13a204389c55ad90042c1f7a5e35b2d16339a2f1df037e0107d5d7a6c344881c93b2a1679fa5d473a2d60d4d4aa0cb9e79c2466f76c6800000000000000000ab389ec54ad5aad69687a57c3fac9519f9dbbd71b1aaa7e7c88e922513da2c8273e92feb6186a90d5a845bb283a5a4f253565c3b3c9106abb36a5bd28d9cacb5b7b7ac"], 0x90, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000140)={0xffffffffffffff80, 0x3, 0x8, 0x0, 0x0, [], [], [], 0xfffffffffffffffd, 0x7}) geteuid() 21:59:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:40 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:40 executing program 5: r0 = dup(0xffffffffffffff9c) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000040)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r2, 0x4) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:40 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040)="8e6f631169056470320dccecdf8f2e8176fce20747fd065aff0fba2b6a68f0bf53dbb061e791c3970eebd3f342931adc658d770808efdc429b1c02165b9339d3e1fd6dbb3f6044cb66ca5f807d1b67d392b25eeaf750ec01e5e8a3cf27cc28a8d2fabf5a185134e97615521884ad1962cb", &(0x7f00000000c0)="f894c24a7824bffb016c5dee01b1871f7c939fc30c3cf167503950ad936e89b90298803a8289afd8266e4a9789a9e07855f9b9"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140)="3674794f90b17e7bcf3649429875becb2e6905c3dc1543e8997255653c42a9e94c1783820a64bc2c7a722b65f366befd6e29edb695e93d9bc65b93f5dc5628bd98fc8e00eba8773036008d4fc3668241fdc17cf65530212af51aee1ffcbfb4cc86b30cde487ad09b8583eeb6980339e5cf7816c934bcb5d4cbb6d8dc3489e065758b397a193a265f85e3d1c5a50a4d82", &(0x7f0000000200)="e8e9fe61ecc45aac2ce2bf26cbe8fa1008e7bd54f88f973b5e65ea6bcbdb71f33ebd07c6f527ab20572e537f16465ce8606dceb87102a08af80c82f3c5cd7bd9c6471d2cef9240018f85a7d7c01e2d74c1f262e2feec377558b7377f8ab74d01524314666a9c12d64b2c80b670b3de32abed1be0f588aeaaf6dd6a2fe80c1f97023d9b66edbe264e5f7b81450592e287bf77f4818bb844a6bbc9d751d8aa6c4a279fea6bf65ad1a34657cd487cdfb3d2d1b208d0fb48", 0x1}, 0x20) 21:59:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000150000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 307.396693] FAULT_INJECTION: forcing a failure. [ 307.396693] name failslab, interval 1, probability 0, space 0, times 0 [ 307.435357] CPU: 0 PID: 24312 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #181 [ 307.442744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.452098] Call Trace: [ 307.454702] dump_stack+0x1c4/0x2b4 [ 307.458344] ? dump_stack_print_info.cold.2+0x52/0x52 [ 307.463546] ? mark_held_locks+0x130/0x130 [ 307.467790] ? PageTransHuge+0x160/0x160 [ 307.471863] should_fail.cold.4+0xa/0x17 [ 307.475940] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.481051] ? __fdget_pos+0x1bb/0x200 [ 307.484973] ? lock_release+0x970/0x970 [ 307.488966] ? aa_file_perm+0x469/0x1060 [ 307.493023] ? mark_held_locks+0x130/0x130 [ 307.497271] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 307.503068] ? __mutex_lock+0x85e/0x1700 [ 307.507130] ? fs_reclaim_acquire+0x20/0x20 [ 307.511449] ? lock_downgrade+0x900/0x900 [ 307.515597] ? ___might_sleep+0x1ed/0x300 [ 307.519741] ? arch_local_save_flags+0x40/0x40 [ 307.524327] __should_failslab+0x124/0x180 [ 307.528561] should_failslab+0x9/0x14 [ 307.532362] __kmalloc_track_caller+0x2d0/0x750 [ 307.537030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.542566] ? pid_task+0x115/0x200 [ 307.546190] ? find_vpid+0xf0/0xf0 [ 307.549754] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.555288] ? proc_pid_attr_write+0x198/0x540 [ 307.559887] memdup_user+0x2c/0xa0 [ 307.563439] proc_pid_attr_write+0x198/0x540 [ 307.567851] __vfs_write+0x119/0x9f0 [ 307.571565] ? proc_loginuid_write+0x4f0/0x4f0 [ 307.576146] ? kernel_read+0x120/0x120 [ 307.580040] ? lock_release+0x970/0x970 [ 307.584010] ? arch_local_save_flags+0x40/0x40 [ 307.588592] ? fsnotify_first_mark+0x350/0x350 [ 307.593184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.598737] ? check_preemption_disabled+0x48/0x200 [ 307.603796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.609330] ? __sb_start_write+0x1b2/0x370 [ 307.613656] vfs_write+0x1fc/0x560 [ 307.617234] ksys_write+0x101/0x260 [ 307.620884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.626417] ? __ia32_sys_read+0xb0/0xb0 [ 307.630505] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 307.635976] ? mm_fault_error+0x380/0x380 [ 307.640139] __ia32_sys_write+0x71/0xb0 [ 307.644128] do_fast_syscall_32+0x34d/0xfb2 [ 307.648466] ? do_int80_syscall_32+0x890/0x890 [ 307.653048] ? entry_SYSENTER_compat+0x68/0x7f [ 307.657630] ? trace_hardirqs_off_caller+0xbb/0x310 [ 307.662681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.667531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.672375] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.677393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.682415] ? prepare_exit_to_usermode+0x291/0x3b0 [ 307.687436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.692282] entry_SYSENTER_compat+0x70/0x7f [ 307.696686] RIP: 0023:0xf7f49ca9 [ 307.700062] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 307.718959] RSP: 002b:00000000f5f450cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 307.726671] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000280 [ 307.733958] RDX: 0000000000000654 RSI: 0000000000000000 RDI: 0000000000000000 [ 307.741249] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 21:59:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xc1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x853}, &(0x7f00000001c0)=0x8) clock_gettime(0x0, &(0x7f0000000180)) [ 307.748543] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 307.755808] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 21:59:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:40 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xc0000, 0x9a) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x480a40, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x4000, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x2, 0x62000) syz_open_dev$sndmidi(&(0x7f00000004c0)='/dev/snd/midiC#D#\x00', 0x56, 0x501000) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000340)=r1) pivot_root(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0xa000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000240)={0x466c00000000000, 0x2, 0x8001, 0x7bc}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r2, r4) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8880, 0x0) mq_getsetattr(r5, &(0x7f0000000040)={0x4800000, 0xffffffff, 0x4, 0x3f, 0x8001, 0x8, 0x4, 0x7}, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x0, 0x80) 21:59:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0xff, 0x4) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:40 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000180)="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", 0xfffffffffffffffb) 21:59:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000a000000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:40 executing program 0 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) fgetxattr(r0, &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000080)=""/157, 0x9d) setsockopt$inet_int(r0, 0x0, 0xc7, &(0x7f0000000000), 0xfffffffffffffd22) 21:59:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:40 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0xfffffffffffffffd) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) finit_module(r1, &(0x7f0000000380)='sysadm_u', 0x2) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0xfffffffffffffff8, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0xa00000, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) request_key(&(0x7f0000000000)="646ef35f7262736f6c766572da0000000000000000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", r0) 21:59:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000b0000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="57edeea009cc21dfc3c8421fe9a781e5fb8d12c1ea89e29372af75aff3631a2418b1f1630c86eef47602b45635b2de67cd1345254f7b6a90733b7f56b79df1cc75202643532761eea617ad904eaf1251a6aa", 0x52}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 308.112182] FAULT_INJECTION: forcing a failure. [ 308.112182] name failslab, interval 1, probability 0, space 0, times 0 [ 308.147223] CPU: 0 PID: 24374 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #181 [ 308.154629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.163983] Call Trace: [ 308.166603] dump_stack+0x1c4/0x2b4 [ 308.166625] ? dump_stack_print_info.cold.2+0x52/0x52 [ 308.166648] should_fail.cold.4+0xa/0x17 [ 308.179527] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.184657] ? audit_filter+0x67d/0xda0 [ 308.188644] ? lock_downgrade+0x900/0x900 [ 308.192805] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 308.198609] ? save_stack+0x43/0xd0 [ 308.202267] ? kmem_cache_alloc+0x12e/0x730 [ 308.206604] ? __ia32_compat_sys_open+0x79/0xb0 21:59:40 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000000c0)={@empty, @rand_addr, 0x0}, &(0x7f0000000140)=0xc) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x111001, 0x0) bind$xdp(r0, &(0x7f00000001c0)={0x2c, 0x7, r1, 0x32, r2}, 0x10) r3 = socket$inet(0x2, 0x3, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r4, 0xc028aa03, &(0x7f0000000000)={{&(0x7f0000863000/0x3000)=nil, 0x8150000}, 0x200000}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x8000, 0x0) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000), 0x10) 21:59:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000340000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 308.211287] ? auditd_test_task+0x206/0x370 [ 308.215623] ? lock_downgrade+0x900/0x900 [ 308.219789] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 308.225602] ? audit_compare_dname_path+0xb0/0xb0 [ 308.230476] ? __lookupn_profile+0x2a8/0x560 [ 308.234900] __should_failslab+0x124/0x180 [ 308.239144] should_failslab+0x9/0x14 [ 308.242953] kmem_cache_alloc+0x47/0x730 [ 308.247024] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 308.252825] ? kasan_check_read+0x11/0x20 [ 308.256977] ? audit_file_mask+0x180/0x180 [ 308.261233] audit_log_start+0x554/0x9d0 [ 308.265320] ? audit_serial+0x30/0x30 [ 308.269148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.274684] ? refcount_sub_and_test_checked+0x203/0x310 [ 308.280137] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 308.285589] ? aa_find_child+0xd0/0xd0 [ 308.289475] ? ima_match_policy+0x848/0x1560 [ 308.293884] ? lock_downgrade+0x900/0x900 [ 308.298033] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.303571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.309108] ? __aafs_ns_mkdir+0xca0/0xca0 [ 308.313338] ? audit_file_mask+0x180/0x180 [ 308.317568] common_lsm_audit+0x112/0x2200 [ 308.321807] ? aa_lookup_profile+0x30/0x30 [ 308.326042] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 308.330801] ? mark_held_locks+0x130/0x130 [ 308.335065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.340601] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.346139] ? fqlookupn_profile+0x88/0xc0 [ 308.350372] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 308.355386] ? aa_label_strn_parse+0x1d6/0x1230 [ 308.360108] ? ima_get_action+0x7e/0xa0 [ 308.364120] aa_audit+0x21d/0x740 [ 308.367571] ? audit_file_mask+0x180/0x180 [ 308.371806] aa_audit_file+0x53d/0xa20 [ 308.375710] ? update_file_ctx+0x340/0x340 [ 308.379953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.385492] ? refcount_add_not_zero_checked+0x330/0x330 [ 308.390964] aa_change_profile+0x1736/0x3260 [ 308.395384] ? aa_change_hat+0x1890/0x1890 [ 308.399620] ? is_bpf_text_address+0xd3/0x170 [ 308.404565] ? __mutex_lock+0x85e/0x1700 [ 308.408678] ? proc_pid_attr_write+0x28a/0x540 [ 308.413274] ? mutex_trylock+0x2b0/0x2b0 [ 308.417336] ? save_stack+0xa9/0xd0 [ 308.420960] ? save_stack+0x43/0xd0 [ 308.424581] ? kasan_kmalloc+0xc7/0xe0 [ 308.428480] ? __kmalloc_track_caller+0x14a/0x750 [ 308.433317] ? memdup_user+0x2c/0xa0 [ 308.437029] ? proc_pid_attr_write+0x198/0x540 [ 308.441612] ? __vfs_write+0x119/0x9f0 [ 308.445501] ? vfs_write+0x1fc/0x560 [ 308.449211] ? ksys_write+0x101/0x260 [ 308.453037] ? __ia32_sys_write+0x71/0xb0 [ 308.457184] ? do_fast_syscall_32+0x34d/0xfb2 [ 308.461690] ? entry_SYSENTER_compat+0x70/0x7f [ 308.466274] ? mark_held_locks+0x130/0x130 [ 308.470512] apparmor_setprocattr+0xaa4/0x1150 [ 308.475098] ? apparmor_task_kill+0xcb0/0xcb0 [ 308.479604] ? lock_downgrade+0x900/0x900 [ 308.483756] ? arch_local_save_flags+0x40/0x40 [ 308.488375] security_setprocattr+0x66/0xc0 [ 308.492699] proc_pid_attr_write+0x301/0x540 [ 308.497123] __vfs_write+0x119/0x9f0 [ 308.500874] ? proc_loginuid_write+0x4f0/0x4f0 [ 308.505452] ? kernel_read+0x120/0x120 [ 308.509350] ? lock_release+0x970/0x970 [ 308.513325] ? arch_local_save_flags+0x40/0x40 [ 308.517923] ? fsnotify_first_mark+0x350/0x350 [ 308.522507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.528047] ? check_preemption_disabled+0x48/0x200 [ 308.533081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.538860] ? __sb_start_write+0x1b2/0x370 [ 308.543182] vfs_write+0x1fc/0x560 [ 308.546728] ksys_write+0x101/0x260 [ 308.550368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.555919] ? __ia32_sys_read+0xb0/0xb0 [ 308.559982] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 308.565431] ? mm_fault_error+0x380/0x380 [ 308.569597] __ia32_sys_write+0x71/0xb0 [ 308.573588] do_fast_syscall_32+0x34d/0xfb2 [ 308.577914] ? do_int80_syscall_32+0x890/0x890 [ 308.582498] ? entry_SYSENTER_compat+0x68/0x7f [ 308.587092] ? trace_hardirqs_off_caller+0xbb/0x310 [ 308.592104] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.596945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.601785] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.606815] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.611831] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.616878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.621735] entry_SYSENTER_compat+0x70/0x7f [ 308.626155] RIP: 0023:0xf7f49ca9 [ 308.629521] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 308.648416] RSP: 002b:00000000f5f450cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 308.656119] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000280 21:59:41 executing program 2: request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 308.663379] RDX: 0000000000000654 RSI: 0000000000000000 RDI: 0000000000000000 [ 308.670656] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 308.677918] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 308.685180] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 21:59:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:41 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='lo\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x53}, 0x28, 0x1) 21:59:41 executing program 0 (fault-call:1 fault-nth:2): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:41 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0485510, &(0x7f00000004c0)={0x38, 0x6, 0x3, 0x9, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}]}) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x140, 0x0) pwritev(r1, &(0x7f0000000300)=[{&(0x7f0000000000)="3b676bfd17623244c3352f766f7f22c490114e514d22103cdc75aaf7581d28ed363864b0b245b2b93b5812bfeff65187b895c16732cb868e530cf80423a3fc8213f70b4f97023cbeac5eda855d23bc9389730f55afacf447fa540e5c5b1dcbc5085bf58d7ab40a1957148d8caabbb0f8edff4ea2aac9ddd4ae5e25316f6e10208a1eabeefd4838ac6f04f39b7e4baa74c44087f6ff30bcf08d9d8e2daa7a", 0x9e}, {&(0x7f00000000c0)="5aec2f2f76fbf527ded7eb0e4653b51bebe2a7a9771ca4e3c595e50866e02da82295705077d96fdc4259183848243d8bcbf34135b97a756522d8e22208df5f9be69a64eb33ae802c26d9c62070bfbf367bec1661d84d75c3252db8ee33162b603267c5983eaabd8b339ba870a77e2d0fd151edf2b79d7b3c034654002260c78eef4578422bc76de324ef917c5d283cdeca82aeba5c1749ab93", 0x99}, {&(0x7f00000001c0)="f1717ab5b94e71e36eef0f4e9d79728077b7c503a41813b0387f1920da517af44fe31cd90ac5ea575f6b4c9ca41d9ac0e771375c7e99b1ebda0e34f6456b0e79df87d0f273674b06b414253d834439e87b54a34ff3865cb24c2d61e4f59945af613d0a45de9c0a88cfd871301e67e68dc3b55c44fe75d46030463b44c414427362de0c304da6505c12104982e4dc2b40410166c25754e8375e6483f63356ca2c0fafbe17bab153261a3f2d12a83f5091ac7746c31ff713e538c7a36e52a6", 0xbe}, {&(0x7f0000000280)="565121ed1676320a7a224135ef081c6eea5b669a0d2e54e6ad44726b07717191092bb594cea60cfb2e23f2b5fac82c6906ed5b742e6e29e1b462a7f59c518421fa358d", 0x43}, {&(0x7f0000000400)="b5ea554a5c1f3036a5a07bab1ad83c93d9a250cf60e639bf976816f22c6ea23075e27d424e4f50c1fa1614732e285c120c679b47c1469b76b8e8d5a870c12f4bf69e934a8c08045b05cb673f65b4db9a168d436732358767dce5fd679a5b431e5eef0ad9c0be7bf7696cf5c77e55344bb77d17d3c63f7bc2035988bdb8398bf0886b4a9d4fd250befe245bcc0c7fef511a3ae7bfa7a8164b9a50618b846e4652316f0ad387eacfd416d78373fe9fb0b084e20acdcaa0d5e9ca5a86", 0xbb}], 0x5, 0x59) 21:59:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'gretap0\x00'}) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) [ 308.872852] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 308.880533] audit: out of memory in audit_log_start [ 308.956531] FAULT_INJECTION: forcing a failure. [ 308.956531] name failslab, interval 1, probability 0, space 0, times 0 [ 308.968034] CPU: 0 PID: 24410 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #181 [ 308.975403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.984759] Call Trace: [ 308.987380] dump_stack+0x1c4/0x2b4 [ 308.991026] ? dump_stack_print_info.cold.2+0x52/0x52 [ 308.996302] should_fail.cold.4+0xa/0x17 [ 309.000422] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.005546] ? kasan_check_read+0x11/0x20 [ 309.009822] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 309.015108] ? rcu_bh_qs+0xc0/0xc0 [ 309.018653] ? unwind_dump+0x190/0x190 [ 309.022555] ? is_bpf_text_address+0xd3/0x170 [ 309.027101] ? kernel_text_address+0x79/0xf0 [ 309.031540] ? __kernel_text_address+0xd/0x40 [ 309.036042] ? unwind_get_return_address+0x61/0xa0 [ 309.040984] ? __save_stack_trace+0x8d/0xf0 [ 309.045317] ? save_stack+0xa9/0xd0 [ 309.048949] ? save_stack+0x43/0xd0 [ 309.052581] ? kasan_kmalloc+0xc7/0xe0 [ 309.056476] ? kasan_slab_alloc+0x12/0x20 [ 309.060633] ? kmem_cache_alloc+0x12e/0x730 [ 309.064963] ? audit_log_start+0x554/0x9d0 [ 309.069202] ? common_lsm_audit+0x112/0x2200 [ 309.073658] ? aa_audit+0x21d/0x740 [ 309.077292] ? aa_audit_file+0x53d/0xa20 [ 309.081361] ? aa_change_profile+0x1736/0x3260 [ 309.085950] ? apparmor_setprocattr+0xaa4/0x1150 [ 309.090717] ? security_setprocattr+0x66/0xc0 [ 309.095217] ? proc_pid_attr_write+0x301/0x540 [ 309.099855] ? __vfs_write+0x119/0x9f0 [ 309.103748] __should_failslab+0x124/0x180 [ 309.107991] should_failslab+0x9/0x14 [ 309.111799] kmem_cache_alloc_node+0x56/0x730 [ 309.116308] __alloc_skb+0x119/0x770 [ 309.120037] ? skb_scrub_packet+0x490/0x490 [ 309.124369] ? trace_hardirqs_on+0xbd/0x310 [ 309.128701] ? audit_log_start+0x554/0x9d0 [ 309.132967] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 309.138451] ? kasan_unpoison_shadow+0x35/0x50 [ 309.143042] ? kasan_kmalloc+0xc7/0xe0 [ 309.146976] ? check_preemption_disabled+0x48/0x200 [ 309.152012] ? kasan_slab_alloc+0x12/0x20 [ 309.156169] ? kmem_cache_alloc+0x306/0x730 [ 309.160501] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 309.166335] ? mark_held_locks+0x130/0x130 [ 309.170569] ? kasan_check_read+0x11/0x20 [ 309.174727] ? audit_file_mask+0x180/0x180 [ 309.178983] audit_log_start+0x57c/0x9d0 [ 309.183052] ? audit_serial+0x30/0x30 [ 309.186874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.192429] ? refcount_sub_and_test_checked+0x203/0x310 [ 309.197885] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 309.203343] ? aa_find_child+0xd0/0xd0 [ 309.207264] ? ima_match_policy+0x848/0x1560 [ 309.211677] ? lock_downgrade+0x900/0x900 [ 309.215851] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.221413] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.226960] ? __aafs_ns_mkdir+0xca0/0xca0 [ 309.231200] ? audit_file_mask+0x180/0x180 [ 309.235458] common_lsm_audit+0x112/0x2200 [ 309.239701] ? aa_lookup_profile+0x30/0x30 [ 309.243946] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 309.248721] ? mark_held_locks+0x130/0x130 [ 309.252982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.258532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.264079] ? fqlookupn_profile+0x88/0xc0 [ 309.268321] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 309.273361] ? aa_label_strn_parse+0x1d6/0x1230 [ 309.278047] aa_audit+0x21d/0x740 [ 309.281509] ? audit_file_mask+0x180/0x180 [ 309.285752] aa_audit_file+0x53d/0xa20 [ 309.289669] ? update_file_ctx+0x340/0x340 [ 309.293920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.299454] ? refcount_add_not_zero_checked+0x330/0x330 [ 309.304891] aa_change_profile+0x1736/0x3260 [ 309.309288] ? aa_change_hat+0x1890/0x1890 [ 309.313506] ? is_bpf_text_address+0xd3/0x170 [ 309.317989] ? __mutex_lock+0x85e/0x1700 [ 309.322047] ? proc_pid_attr_write+0x28a/0x540 [ 309.326614] ? mutex_trylock+0x2b0/0x2b0 [ 309.330662] ? save_stack+0xa9/0xd0 [ 309.334269] ? save_stack+0x43/0xd0 [ 309.337877] ? kasan_kmalloc+0xc7/0xe0 [ 309.341746] ? __kmalloc_track_caller+0x14a/0x750 [ 309.346568] ? memdup_user+0x2c/0xa0 [ 309.350262] ? proc_pid_attr_write+0x198/0x540 [ 309.354842] ? __vfs_write+0x119/0x9f0 [ 309.358711] ? vfs_write+0x1fc/0x560 [ 309.362404] ? ksys_write+0x101/0x260 [ 309.366187] ? __ia32_sys_write+0x71/0xb0 [ 309.370316] ? do_fast_syscall_32+0x34d/0xfb2 [ 309.374792] ? entry_SYSENTER_compat+0x70/0x7f [ 309.379359] ? mark_held_locks+0x130/0x130 [ 309.383575] apparmor_setprocattr+0xaa4/0x1150 [ 309.388140] ? apparmor_task_kill+0xcb0/0xcb0 [ 309.392618] ? lock_downgrade+0x900/0x900 [ 309.396752] ? arch_local_save_flags+0x40/0x40 [ 309.401326] security_setprocattr+0x66/0xc0 [ 309.405630] proc_pid_attr_write+0x301/0x540 [ 309.410018] __vfs_write+0x119/0x9f0 [ 309.413711] ? proc_loginuid_write+0x4f0/0x4f0 [ 309.418292] ? kernel_read+0x120/0x120 [ 309.422161] ? lock_release+0x970/0x970 [ 309.426147] ? arch_local_save_flags+0x40/0x40 [ 309.430712] ? fsnotify_first_mark+0x350/0x350 [ 309.435284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.440952] ? check_preemption_disabled+0x48/0x200 [ 309.446003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.451538] ? __sb_start_write+0x1b2/0x370 [ 309.455859] vfs_write+0x1fc/0x560 [ 309.459384] ksys_write+0x101/0x260 [ 309.463007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.468528] ? __ia32_sys_read+0xb0/0xb0 [ 309.472573] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 309.478006] ? mm_fault_error+0x380/0x380 [ 309.482138] __ia32_sys_write+0x71/0xb0 [ 309.486095] do_fast_syscall_32+0x34d/0xfb2 [ 309.490436] ? do_int80_syscall_32+0x890/0x890 [ 309.495002] ? entry_SYSENTER_compat+0x68/0x7f [ 309.499603] ? trace_hardirqs_off_caller+0xbb/0x310 [ 309.504616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.509442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.514266] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.519267] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.524264] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.529283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.534255] entry_SYSENTER_compat+0x70/0x7f [ 309.538665] RIP: 0023:0xf7f49ca9 21:59:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000a0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) fchown(r0, r1, r2) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="7de222c70283a5d79985ea4bc0e02241e255883c001b64c710ef43a98f71a30215fcd31e6ba24be9ccb33d3985d76f144016217f3511fc90f92ccd18883484aca0b56de3b52b62ed9bb95770c9626ef5a95e6a947668604d88c18d009c5523f50a566a0622561bb685690061c6cf311df94dfb64b6db051e3afd303f0d7e98883ce0901e6b71046c6940d33b1744433fa8daf4ce449c69e430f71d03d815113589fd3e54f2345375a7e30df6f4c266996918dd2b11", 0xb5}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e24, 0x81, @remote, 0x5}, {0xa, 0x4e23, 0x2, @remote, 0x81}, 0x1f, [0x401, 0x63d, 0x6, 0x0, 0x2, 0x1, 0x29, 0xe97]}, 0x5c) 21:59:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x83000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:42 executing program 5: r0 = socket$inet(0x2, 0x23, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000040), 0xffffffffffffff21) [ 309.542018] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 309.560900] RSP: 002b:00000000f5f450cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 309.568588] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000280 [ 309.575838] RDX: 0000000000000654 RSI: 0000000000000000 RDI: 0000000000000000 [ 309.583087] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 309.590334] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 309.597586] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 21:59:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:42 executing program 5: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 309.628477] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 309.661165] audit: out of memory in audit_log_start 21:59:42 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x27, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x2, 0x40400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000100)=""/94, &(0x7f0000000180)=0x5e) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x301001, 0x0) timer_delete(r0) 21:59:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000e80300000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:42 executing program 0 (fault-call:1 fault-nth:3): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000024000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'ip6gre0\x00', {0x2, 0x4e22, @remote}}) r1 = socket$inet(0x2, 0x4, 0x7) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f0000000140)={{}, {r3, r4+30000000}}, &(0x7f0000000180)) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff, 0x200}, 0xc) 21:59:42 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r0 = getpgrp(0xffffffffffffffff) ptrace$getsig(0x4202, r0, 0x6, &(0x7f0000000040)) [ 309.806418] FAULT_INJECTION: forcing a failure. [ 309.806418] name failslab, interval 1, probability 0, space 0, times 0 21:59:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="afbeff0700000000", 0x8}], 0xd1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) [ 309.877594] CPU: 0 PID: 24445 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #181 [ 309.885013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.894377] Call Trace: [ 309.894404] dump_stack+0x1c4/0x2b4 [ 309.894428] ? dump_stack_print_info.cold.2+0x52/0x52 [ 309.894456] should_fail.cold.4+0xa/0x17 [ 309.894476] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.894495] ? __save_stack_trace+0x8d/0xf0 [ 309.894519] ? save_stack+0xa9/0xd0 [ 309.894537] ? save_stack+0x43/0xd0 [ 309.926661] ? kasan_kmalloc+0xc7/0xe0 [ 309.930574] ? kasan_slab_alloc+0x12/0x20 [ 309.934732] ? kmem_cache_alloc_node+0x144/0x730 [ 309.939495] ? __alloc_skb+0x119/0x770 [ 309.943392] ? audit_log_start+0x57c/0x9d0 [ 309.947634] ? common_lsm_audit+0x112/0x2200 [ 309.952049] ? aa_audit+0x21d/0x740 [ 309.955684] ? aa_audit_file+0x53d/0xa20 [ 309.959762] ? aa_change_profile+0x1736/0x3260 [ 309.964397] ? apparmor_setprocattr+0xaa4/0x1150 [ 309.969181] ? security_setprocattr+0x66/0xc0 [ 309.973683] ? proc_pid_attr_write+0x301/0x540 [ 309.978278] ? __vfs_write+0x119/0x9f0 [ 309.982172] ? vfs_write+0x1fc/0x560 [ 309.985918] ? ksys_write+0x101/0x260 [ 309.985932] ? __ia32_sys_write+0x71/0xb0 [ 309.985948] ? do_fast_syscall_32+0x34d/0xfb2 [ 309.985968] ? entry_SYSENTER_compat+0x70/0x7f [ 309.993936] ? unwind_get_return_address+0x61/0xa0 [ 310.007925] ? __save_stack_trace+0x8d/0xf0 [ 310.012276] ? save_stack+0xa9/0xd0 [ 310.015926] __should_failslab+0x124/0x180 [ 310.020169] should_failslab+0x9/0x14 [ 310.024019] kmem_cache_alloc_node_trace+0x5a/0x740 [ 310.029046] ? kasan_unpoison_shadow+0x35/0x50 [ 310.033641] ? kasan_kmalloc+0xc7/0xe0 [ 310.037569] ? check_preemption_disabled+0x48/0x200 [ 310.042611] __kmalloc_node_track_caller+0x33/0x70 [ 310.047551] __kmalloc_reserve.isra.39+0x41/0xe0 [ 310.052336] __alloc_skb+0x155/0x770 [ 310.056060] ? skb_scrub_packet+0x490/0x490 [ 310.060392] ? trace_hardirqs_on+0xbd/0x310 [ 310.064728] ? audit_log_start+0x554/0x9d0 [ 310.068967] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 310.074434] ? kasan_unpoison_shadow+0x35/0x50 [ 310.079021] ? kasan_kmalloc+0xc7/0xe0 [ 310.082918] ? check_preemption_disabled+0x48/0x200 [ 310.087943] ? kasan_slab_alloc+0x12/0x20 [ 310.092093] ? kmem_cache_alloc+0x306/0x730 [ 310.096443] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 310.102262] ? kasan_check_read+0x11/0x20 [ 310.106426] ? audit_file_mask+0x180/0x180 [ 310.110683] audit_log_start+0x57c/0x9d0 [ 310.114748] ? trace_hardirqs_off+0x310/0x310 [ 310.119274] ? audit_serial+0x30/0x30 [ 310.123102] ? refcount_sub_and_test_checked+0x203/0x310 [ 310.128569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 310.133370] ? trace_hardirqs_off+0xaf/0x310 [ 310.137785] ? retint_kernel+0x2d/0x2d [ 310.137810] ? audit_file_mask+0x180/0x180 [ 310.137837] ? __aafs_ns_mkdir+0xca0/0xca0 [ 310.145935] ? audit_file_mask+0x180/0x180 [ 310.145966] ? __aafs_ns_mkdir+0xca0/0xca0 [ 310.145980] ? audit_file_mask+0x180/0x180 [ 310.146012] common_lsm_audit+0x112/0x2200 [ 310.167265] ? aa_lookup_profile+0x30/0x30 [ 310.167282] ? ipv6_skb_to_auditdata+0xee0/0xee0 21:59:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000140)="be6350baf1c2dffd27f550432a0dfc52d6937428c3035a4a45190faa80cd360fd8c95695d537a0f4384f0fbbe372a9", 0x2f}, {&(0x7f00000001c0)="e83da7eb1d74c2a33e61ebad0c513ba69246599ee71928d327f8c096e4564bcfe366b5c2fab9cda6398e159d95f34a95cde0495bdd38fede74cee74b174fc3a50a5febd27154a1f6df167d9351b577628d914c900a0c6219a78e24c1558d21bf901a8f039105ea26c96085a321f452bcecd731bda0498a", 0x77}, {&(0x7f0000000240)="ef8039cd", 0x4}, {&(0x7f0000000280)="09ec68aacd2567e6d13217cd6235f87b20f25ef55cac5d324c1e6db4860955321903d23836", 0x25}, {&(0x7f00000002c0)="1ee2e5039aa87bf6306ba975d8141e341b44b6a554bcaa37c48830b908f68c49032f89c2c8396ac34fa8384b1ad2ef7caef1625a19fa937e680139f8dbd15bdfbf243fea9134ee5ea05bcd96846b09d2c22f9a843d3eb69723916de3fe0bc748d0de", 0x62}, {&(0x7f0000000340)="bb412ebfc564fc136ec97fe988b87dd4e89e278bc2e8d0330b0169be8cb1", 0x1e}, {&(0x7f0000000380)="e6924a6bdc130a720c", 0x9}, {&(0x7f00000003c0)="09bfd9dfdf093eb10c7534fabe5d309df6ac553ad00ee8fec70cd9b172c221b1ca618e07e98013342279345a660bf9d61128f4796a717bff379bad413ae874c125770edd250f52f2032315a67bcac1d3a3a026998b8c53e8778b9b83ff2fe3bc4edc18f0d35f83c0c15a294a21ed7a", 0x6f}, {&(0x7f0000000500)="8e4d1e0167d0ec5644d7e704f765ae4ef503f94dfed209352a3f6e71475aa942db3bdb818033f7b027d0446fafcb2a6fcfa54b0161916c27b7f5464229b0f3ab2c784b53e54228a46fbbfa1806", 0x4d}], 0x9) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffffffffffce0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) clock_gettime(0x0, &(0x7f0000000180)) 21:59:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000070000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:42 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x7, 0xd9, "3baa7591e53c51eb77ca979f40e3bbe0ca9e85f44e4074caf6052e602442ece1ffc6eef4b17f0bcbf99e5ed1eec9212f7f3654e1c9529aaa39805d543beb328763ac7fb7ca0e1684af57d01c72b39688b01764a92abfe353f1d3fe983141c4035a3970635eead3e442bc09b14bbddd96b04f6954e74fa8fbfc1e9fb4833c851a29c948528cc2cb09be52697bd1332fc005001894011dc8f0b3300e25a24e5f91f48c55183276ecb0f2bb7fc9d2470b6d013b71414aba912468901636506f405ed0bbea483a1791e1ca80f3367c7408025c39ce16b21e36ae25"}) [ 310.167308] ? mark_held_locks+0x130/0x130 [ 310.167325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.167344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.176350] ? fqlookupn_profile+0x88/0xc0 [ 310.176366] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 310.176383] ? aa_label_strn_parse+0x1d6/0x1230 [ 310.176398] ? ima_get_action+0x7e/0xa0 [ 310.176418] aa_audit+0x21d/0x740 [ 310.213019] ? audit_file_mask+0x180/0x180 [ 310.217271] aa_audit_file+0x53d/0xa20 [ 310.221172] ? update_file_ctx+0x340/0x340 [ 310.225415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.231015] ? refcount_add_not_zero_checked+0x330/0x330 [ 310.236500] aa_change_profile+0x1736/0x3260 [ 310.240923] ? aa_change_hat+0x1890/0x1890 [ 310.245191] ? is_bpf_text_address+0xd3/0x170 [ 310.249723] ? __mutex_lock+0x85e/0x1700 [ 310.253799] ? proc_pid_attr_write+0x28a/0x540 [ 310.258394] ? mutex_trylock+0x2b0/0x2b0 [ 310.262459] ? save_stack+0xa9/0xd0 [ 310.266107] ? save_stack+0x43/0xd0 [ 310.269738] ? kasan_kmalloc+0xc7/0xe0 [ 310.273637] ? __kmalloc_track_caller+0x14a/0x750 21:59:43 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000400)=[@in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0x4, @mcast1, 0xfffffffffffffbff}, @in6={0xa, 0x4e23, 0x2, @loopback, 0x7}, @in={0x2, 0x4e24, @loopback}], 0x58) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0xd6f}, &(0x7f0000000080)=0x8) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000002c0)={@dev, @rand_addr, @dev}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x2, 0x0, 0x6, 0x800}, &(0x7f0000000180)=0x18) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000001c0)=0xc1b9) setsockopt$inet6_udp_int(r0, 0x11, 0x1000000b, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0xc2d}, 0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x4e23, @multicast2}, {0x306, @remote}, 0x20, {0x2, 0x4e22, @local}, 'team_slave_1\x00'}) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 310.278487] ? memdup_user+0x2c/0xa0 [ 310.282204] ? proc_pid_attr_write+0x198/0x540 [ 310.286825] ? __vfs_write+0x119/0x9f0 [ 310.286839] ? vfs_write+0x1fc/0x560 [ 310.286852] ? ksys_write+0x101/0x260 [ 310.286865] ? __ia32_sys_write+0x71/0xb0 [ 310.286885] ? do_fast_syscall_32+0x34d/0xfb2 [ 310.298276] ? entry_SYSENTER_compat+0x70/0x7f [ 310.298293] ? mark_held_locks+0x130/0x130 [ 310.298313] apparmor_setprocattr+0xaa4/0x1150 [ 310.320304] ? apparmor_task_kill+0xcb0/0xcb0 [ 310.324810] ? lock_downgrade+0x900/0x900 [ 310.324830] ? arch_local_save_flags+0x40/0x40 [ 310.324860] security_setprocattr+0x66/0xc0 [ 310.337865] proc_pid_attr_write+0x301/0x540 [ 310.342283] __vfs_write+0x119/0x9f0 [ 310.346007] ? proc_loginuid_write+0x4f0/0x4f0 [ 310.350596] ? kernel_read+0x120/0x120 [ 310.354495] ? lock_release+0x970/0x970 [ 310.358492] ? arch_local_save_flags+0x40/0x40 [ 310.363086] ? fsnotify_first_mark+0x350/0x350 [ 310.367679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.373348] ? check_preemption_disabled+0x48/0x200 [ 310.378389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.383932] ? __sb_start_write+0x1b2/0x370 [ 310.388290] vfs_write+0x1fc/0x560 [ 310.391862] ksys_write+0x101/0x260 [ 310.395500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.401047] ? __ia32_sys_read+0xb0/0xb0 [ 310.405609] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 310.411065] ? mm_fault_error+0x380/0x380 [ 310.415245] __ia32_sys_write+0x71/0xb0 [ 310.419242] do_fast_syscall_32+0x34d/0xfb2 [ 310.423594] ? do_int80_syscall_32+0x890/0x890 [ 310.428191] ? entry_SYSENTER_compat+0x68/0x7f [ 310.432797] ? trace_hardirqs_off_caller+0xbb/0x310 [ 310.437821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.442700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.447547] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.452576] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.457623] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.462668] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.467528] entry_SYSENTER_compat+0x70/0x7f [ 310.471952] RIP: 0023:0xf7f49ca9 [ 310.475329] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 310.494247] RSP: 002b:00000000f5f450cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 310.501978] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000280 [ 310.509250] RDX: 0000000000000654 RSI: 0000000000000000 RDI: 0000000000000000 [ 310.516521] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 21:59:43 executing program 0 (fault-call:1 fault-nth:4): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:43 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80, 0x400100) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:43 executing program 5: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='lo\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x53}, 0x28, 0x1) [ 310.523787] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 310.531049] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 310.548048] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 310.556419] audit: out of memory in audit_log_start 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:43 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000080)='trusted\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000140)="55e2ee8db424a384e603343126782e104ee73aaffdec1ea407efbe35c4dc331a1b901c528d514dd766285f2bb9c895621aed9485c6984c937ce567092544", r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x80000000, 0x1}) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') [ 310.672575] audit: type=1400 audit(1539295183.393:143): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=24504 comm="syz-executor0" 21:59:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000001f40000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) clock_settime(0x6, &(0x7f00000000c0)) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:43 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:43 executing program 5: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='lo\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x53}, 0x28, 0x1) 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000020000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 310.796775] audit: type=1400 audit(1539295183.523:144): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=24520 comm="syz-executor0" 21:59:43 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = memfd_create(&(0x7f0000000000)='syz', 0x3) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x40) 21:59:43 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'"tack ', '=:\n'}, 0x654) 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:43 executing program 5: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='lo\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x53}, 0x28, 0x1) 21:59:43 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x77, 0x2}) 21:59:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000b00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 310.936823] audit: type=1400 audit(1539295183.663:145): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=24543 comm="syz-executor0" [ 310.996929] Unknown ioctl -1071075694 [ 311.014031] Unknown ioctl -1071075694 21:59:43 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x440, 0x200000151) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000140)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea429d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee030000000000d9c4dd0304d34c4f1dee483b157624c5bc719a099e6a3509000000398c340f564dc527592381b6a1b2a61998a23574df765200ae84097a41a2470b2bcc230eb6d31c3bcf7df0d3aecebe1c9d35992fd9b21b3ca208825fcb8fba6774c45cd0273ef9f068537bc9fe115718c1a3ab0559aed03b21f31a4ab20debf364cca4ea78255acc2d916216ac760e04547b7d65ac14cbcebc42f1", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x200000000000015c) write$cgroup_pid(r1, &(0x7f0000000040), 0x3) clock_gettime(0x0, &(0x7f0000000100)) 21:59:43 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'s"ack ', '=:\n'}, 0x654) 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:43 executing program 5: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='lo\x00', 0x0) 21:59:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000006a0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:43 executing program 2: 21:59:43 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x8, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x40}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40086437, &(0x7f00000000c0)={r1, 0x10001}) 21:59:43 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'s%ack ', '=:\n'}, 0x654) 21:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 311.200943] audit: type=1400 audit(1539295183.923:146): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=24569 comm="syz-executor0" 21:59:44 executing program 5: request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:44 executing program 2: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) connect$can_bcm(r2, &(0x7f0000000440)={0x1d, r3}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000080)={0x0, @loopback, 0x4e20, 0x2, 'lblcr\x00', 0x25, 0xc3d, 0x80}, 0x2c) fchmod(r4, 0x2) 21:59:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000200e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 311.318557] audit: type=1400 audit(1539295184.043:147): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=24584 comm="syz-executor0" 21:59:44 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0xa8200, 0x0) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xa4) r1 = signalfd4(0xffffffffffffff9c, &(0x7f00000000c0)={0x7fff}, 0x8, 0x80800) flistxattr(r1, &(0x7f0000000100)=""/107, 0x6b) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40200, 0x64) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000240)={0x100}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) writev(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000280)) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:44 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'st%ck ', '=:\n'}, 0x654) 21:59:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:44 executing program 5: request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:44 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000002c0)={0x2, 0x9}, 0x2) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000340000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:44 executing program 5: request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:44 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'sta"k ', '=:\n'}, 0x654) [ 311.554811] audit: type=1400 audit(1539295184.273:148): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=24604 comm="syz-executor0" 21:59:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000ffffe6ce0000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:44 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f398f9f802dc97dc74c65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$sock_bt(r0, 0x541b, &(0x7f00000000c0)="937b535de29d0b56cb67fc7d47f1517e73e4324c432f5b08") 21:59:44 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'sta%k ', '=:\n'}, 0x654) 21:59:44 executing program 2: r0 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="44103a5909c1bf244e3609bb4d1d4b96e02988084174c7526bd856ef47c8a1a0810fd20dcdc98c13b824dea7b4796acf8f6ee6c120722b354829f5458605ea01479dc055dbb169de31fd46feffdb0c134d12ed1c75a9b79f07f7c0305772188b9b5e3c5524cd9fedfd72fdd6e4e3eb4cd212602a2d7d2d933badb1067c995d2357d1dfb81f67f021907a521989386c164bd64359e6af651462991a75df4a0727fa045ae35cbea197d887d44e0f4afeb7328614fd78544a40b441cc2dcecf5c0b86b7ba065c232e92bc12cd4e7e430dbbafb471465fa7b75d3e6177011a9c56b0c3a84d4b4638feb7fc261ca1f2e575cf77be", 0xf2, 0xfffffffffffffffd) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", r0) 21:59:44 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000002c0)={0x2, 0x9}, 0x2) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000003400e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:44 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000040)=""/109, &(0x7f00000000c0)=0x6d) 21:59:44 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack%', '=:\n'}, 0x654) 21:59:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000001f400000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:44 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000002c0)={0x2, 0x9}, 0x2) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:44 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0xffffffffffff8d3e, 0x6, 0x6}) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e20, 0x9, @mcast1, 0xfbeb}, {0xa, 0x4e23, 0x0, @remote, 0x8001}, 0xfffffffffffffffe, [0x7, 0x3, 0x6, 0x8, 0x0, 0x4f, 0x8, 0x4]}, 0x5c) 21:59:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x1, 0x0, 0x8002, 0x200, 0x2, 0xdf, 0x200, 0x2, r1}, &(0x7f0000000240)=0x20) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) clock_gettime(0x0, &(0x7f0000000180)) 21:59:44 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack/', '=:\n'}, 0x654) 21:59:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:44 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000002c0)={0x2, 0x9}, 0x2) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:44 executing program 2: request_key(&(0x7f0000000040)="646e735f72d76a590876657200", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='userselinuxwlan1cpuset]\x00', 0x0) 21:59:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000700000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:44 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '&:\n'}, 0x654) 21:59:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x30}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:44 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000740)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x40000) pwritev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="f249c9b937b07c2cbeae932f685f69a91ef4598a3a878f869a017e1300332d9b75be87ca4da3438d109e0998eea8b6cbc1b00347fa026381f22fd7e727963aa2e3fd51acb06b18f84e03f9f239ced6fea63fffa2fe9f316122a580f2346716d90c3c7f25b1995df157350cd065a9abc2eb733b424490b0cc", 0x78}, {&(0x7f0000000400)="9f465a3012823e0334db8e4e4aa6b5a3d6c267f62374156ccdca96146047a03232d5cf51f50c8d9644946519e9065956d110ee5ab5c6c92dad5ac8924440b972895b5b0728be12e1ef2d610afe1e86ab4e4d00548bb89311fbf27081aa91362277d65d7ec91bc8cb68a9e221ff63d7fff6d9ddf2085abf423edea3ef52c89954c2d4eddb3441cdd96ae03751316cd1fbd43db7ae503cfec83712773a446c25d760e9a2ca099f227867b743527530d9732993f93928544231f904e2123e9de22f6832bfe15b246e5371e4189969238ae15ec18b8b0b1752f44ce711fbf8bc2160d2a428e56e3401e7ca20b7eab39c28ea056b5e9775b81f", 0xf7}, {&(0x7f0000000500)="c7a8e25e9973f1de", 0x8}, {&(0x7f0000000540)="8d34b6417fa9e1edbe4c81161bdf564888175ad204", 0x15}], 0x4, 0x0) r2 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="64f5d0756ff7fb3b6090dfc3d35cd9b2ef1797365ba8ca7db84b823b05458478292f5edf13f065e2160f846c423ee40d7e766aca4842063c64513df272571f7b98fc1875941bced0dc042d6115cd3b3f95aaa7b16a97413e3313f79755d8fad05529c54ffd9ea2e0bc839a85a02394cd3bd301b6f87758511a1ea5e82d103b809d28109c17c83bc4017a60ad9c0e887fe3b55af27d9f2902e3531d2aa590e0e6afd0ae18b20eea3ab2838157e4fea36140421927c71700dca3db4ad78ace05035a70d6b9e350c55004fbe2f15dd832babaad1f1d413812a905", 0xd9, 0xfffffffffffffffa) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000780)={'yam0\x00', 0x4}) request_key(&(0x7f0000000300)="646e735f72657377e1766572009ea75be56fe2ab88f6563c5ee1693287d4d3af", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", r2) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000040)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000940)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00012dbd7000fbdbdf25010000004800020008000700beddd16208000b000a00fc5c00000800070002000000080009002000000008000600010000000800070040000000140001007f000001000000000000000000000000090a7e7f98a94a1621037e54e10b2cfc643ebaa64f51c8320ed104628d8c2251af3e84b51b3beb3899f90d333fe97a874b55b981673262999634a9ad55823945d9c30b3d1db0e17fa6aebcacec55b8ddd382ab4d3c5fccb0788fad9419040453c330ddd1834240e87b77e3944a0eaccfa8018415af41c161250d10093a0a0729c4ea02fcd111370b3f07699cd2000000000000000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000040}, 0x5) 21:59:44 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000002c0)={0x2, 0x9}, 0x2) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:44 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 2: r0 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$TIOCSCTTY(r1, 0x540e, 0x5) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@md5={0x1, "275e020fe4095ed912f190574bfd535c"}, 0x11, 0x1) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='dns_resolver\x00', r0) 21:59:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000040000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '":\n'}, 0x654) 21:59:45 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:45 executing program 3: io_setup(0x1000000000000004, &(0x7f0000000400)=0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x400, 0x20800) io_cancel(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xf, 0x100, r1, &(0x7f00000001c0)="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", 0xfb, 0x1, 0x0, 0x2, r2}, &(0x7f0000000340)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f5e3743bc30c1cb4b2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2bc7e16cc03945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x917fb03d) writev(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000380)={0x73, 0xc, [0x6, 0x3, 0x0]}) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f00000000c0)=0x2, 0x4) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '%:\n'}, 0x654) 21:59:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000150000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000080)) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='dns_resolver\x00', 0x0) 21:59:45 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '="\n'}, 0x654) 21:59:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000008c9d03000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:45 executing program 2: r0 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="e185ea812ef79c000ee33c28f05f83931eb09b0d6f3d7e253ea42da7aead62290970980efa7b1d2fa7b7346cc6cac6c043e5b037bb0470b4157999b832520e3ca415e2cea6f3e6f32dbd4ae7bb39e51df1a0ecc879dd308f0d4e03e628e293015293ba78ff0f009732c8ae1a47b03120a58c49091c68c9b54ae6866178f81e21b22e8e19d5dbf854adf7c581bf324ff34fe7d66083f83e5e41faa7", 0x9b, 0xfffffffffffffff9) request_key(&(0x7f0000000040)="646e735f725ef0f4f5343960998c3a25ab0000f0fbf40000010000007200", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", r0) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=%\n'}, 0x654) 21:59:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x7, &(0x7f0000000280)) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000140)=0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000400200000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3d3acf"}, 0x654) 21:59:45 executing program 2: r0 = add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="eb579793350c774c0f0ca7ba69d35ccc5d7e480b1738b7b47b9866220f5af4bcbc54a8ab61b796bd1746e7ef51a0bda6172f87b6940539c1fc0dfb2f83fa32e6080cbf05ea7795262c5d352e6559cbb997428ce97e7299c86ce2bbd92a201efdcbec61d994046640fd8b1be54b5948cea73765c886cacf1a8373c381bafd45592f8d5d2e0241fedde5a69af77de8b547183acd5321c6413ce5fa5897caf26051de9f", 0xa2, 0xfffffffffffffffc) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x80, 0x2) request_key(&(0x7f0000000040)='dns_resolrer\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", r0) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\t'}, 0x654) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000a0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:45 executing program 2: request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000000)="736563757269747900c79b9aecf18aba7a4f174e14c36332d726674af8b78b38c122de0c262e5af1d557d983f45f39dc425af80703dcac8b2639ef001fc9c98440d87817ecee8a41fd75a9ab62160a1779c5ef4b210ea6e76c4ad0897834d193b60a59b805d33a6b8f13a87829bc8e0c8a4c93770f1bce5bfe6c285653892635fb59ca0dedce96d971e180d94b000000000000000000000000000000443f466bef8e20059b2d7e1e3c543c69253271f51487f39b2bab68fb1f9e1fb69be325e263dc", 0x0) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3d3a02"}, 0x654) 21:59:45 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000100), 0x7b) clock_gettime(0x0, &(0x7f0000000180)) 21:59:45 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x40) recvfrom$unix(r0, &(0x7f0000000040)=""/100, 0x64, 0x10100, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3d3a90"}, 0x654) 21:59:45 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000e0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:45 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\v'}, 0x654) 21:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:45 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x100000082, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) 21:59:46 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:46 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3d3ac8"}, 0x654) 21:59:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000001f400e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000), 0x0) rt_sigsuspend(&(0x7f0000000000)={0x8000}, 0x8) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x7, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) 21:59:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x68000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:46 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x101000) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 21:59:46 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x9) 21:59:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000700e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:46 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:46 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x8, 0x4000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000400)=0x0) write$FUSE_ENTRY(r2, &(0x7f0000000440)={0x90, 0x0, 0x6, {0x2, 0x2, 0x0, 0x5, 0x8237, 0xc9e, {0x2, 0x3f, 0x6, 0x5, 0x30000000000, 0x2, 0x521f, 0xfffffffffffffffe, 0x3, 0x10000, 0x329, r3, r4, 0x6c, 0x6}}}, 0x90) sendto$inet(r0, &(0x7f0000000040)="c88cec175ce8f49edda13f3b935899fa93072d506f8190fef2bfb6873321604e433dc04a5bafd8252e6ca6edf7265bf2e9e927d1697f05a8ff974ff9da9387be6ab49d3206fc497585f0a0fe01aca567ec8a7f1fdbe26b6cf0dcc6762fd68401975b2f632e06a72c75a0cd9c788a093c98fe8d21bad37f06b73ee1304d6ec542a85a33e8f346e28a57e5db58b34da3a0e46aafe34f750efa5d9b8ff61bab06a194caa9afaf9044789d2b1f406801692aa357cfee42f5a8027790933cf5711a3a0d47f69d15a8d6f6ecd0eb96c542c72c18a53c136d9a2ed5300b9194bf56a85d2422a67c3ab21ab3", 0x3cf, 0x44000, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) 21:59:46 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x7) 21:59:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:46 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000ffffe6ce00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:46 executing program 5: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x58}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:47 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000280)={0x2, 0x9}) r1 = add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000080)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04dbdf5d0c48f56e02288b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000240)={0x1d, 0x0, 0x4605}) 21:59:47 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x200008d4) 21:59:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3d3ac8"}, 0x654) 21:59:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000100)={0x3, 0x0, {0xffffffffffffffff, 0x2, 0x0, 0x1, 0x81}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r1, r0}}, 0x18) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000400e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', "3d3ac8"}, 0x654) 21:59:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000002400000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:47 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x65d) 21:59:47 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/192) 21:59:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffc88) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000100)=0xdf) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl$TIOCCONS(r0, 0x541d) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x7, 0x10001, 0x40000, 0x0, 0x0, 0x3}) clock_gettime(0x0, &(0x7f0000000180)) 21:59:47 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x404000) 21:59:47 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000080)) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)='dns_resolver\x00', 0x0) 21:59:47 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='-vmnet0keyringlo*keyring!\x00', 0xfffffffffffffffc) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x5}, 0x28, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f00000003c0)={0x18, 0x71, 0x1, {{0x0, 0x1, 0x1}, 0x12}}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0xa6841, 0x83) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000005c0)="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", r0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) lsetxattr$trusted_overlay_nlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U-', 0x5}, 0x28, 0x0) 21:59:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:47 executing program 5: r0 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$TIOCSCTTY(r1, 0x540e, 0x5) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@md5={0x1, "275e020fe4095ed912f190574bfd535c"}, 0x11, 0x1) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='dns_resolver\x00', r0) 21:59:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000900000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:47 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) [ 314.653657] kauditd_printk_skb: 19 callbacks suppressed [ 314.653669] audit: type=1400 audit(1539295187.373:168): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=24939 comm="syz-executor0" 21:59:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x1}, 0x7) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100)=0x3, 0x2) clock_gettime(0x0, &(0x7f0000000180)) 21:59:47 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1a3000, 0x0) [ 314.759615] audit: type=1400 audit(1539295187.483:169): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=24956 comm="syz-executor0" 21:59:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000040000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:47 executing program 2: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:47 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x101, 0x2100) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc2c45512, &(0x7f00000002c0)={{0xa, 0x2, 0x1, 0x2, '\x00', 0xfffffffffffffff8}, 0x0, [0x5, 0x6, 0xfb, 0xe6, 0x3, 0x0, 0x3, 0x7, 0x1, 0x7, 0xde, 0xffff, 0x7, 0x5, 0x10000, 0x4, 0x0, 0x100000001, 0x0, 0x3, 0x6, 0x401, 0x8, 0x1, 0x1, 0x4, 0x6, 0xf87, 0x0, 0x7d, 0x80000001, 0x0, 0x100, 0x400, 0x401, 0x4, 0xc1, 0x6, 0x80000001, 0x1f, 0x4, 0x7, 0xaa6d, 0x619c, 0x5, 0x6, 0x1ff, 0x80000000, 0x20, 0x200, 0x0, 0x7, 0x800, 0x6fa, 0x4, 0x5, 0x401, 0xff, 0x0, 0x3, 0x80000001, 0x0, 0x1, 0x3, 0xfffffffffffffffa, 0x4, 0x6, 0xf033, 0x1283, 0x40, 0x98d, 0xffffffffffffffff, 0x100000000, 0x1a382652, 0x8, 0x80000000000000, 0x4, 0x3, 0xff, 0x2000000000000000, 0x7a, 0x800, 0x8, 0x8, 0xcc5d, 0x4, 0x73b03282, 0x0, 0x5, 0x0, 0x1, 0x9, 0x1, 0xaf06, 0x1000, 0x6, 0x401, 0x5, 0x30000000000, 0x2, 0x3ff, 0x100000000, 0x6, 0x3, 0xffffffffffffffa1, 0x5, 0x7, 0x1000, 0x14, 0x4, 0x5, 0x52, 0x5, 0x6c, 0x7ff, 0x1ff, 0x101, 0xcefd, 0x20, 0xdb6, 0x2, 0x1, 0x9, 0x4, 0x9, 0xffffffffffffff80, 0x3f, 0x2], {r3, r4+10000000}}) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc2c45512, &(0x7f00000005c0)={{0x1, 0x0, 0x1, 0x95f, 'syz1\x00', 0xfffffffffffffffe}, 0x0, [0x0, 0x0, 0x401, 0x6, 0xfffffffffffffffe, 0xfffffffe0000000, 0x1, 0x80000000, 0x6, 0x80000000, 0x8, 0x8, 0x1, 0x8, 0x8, 0x9, 0x6, 0xd34, 0x2, 0xcc, 0xfff, 0x9, 0x6, 0x8, 0x8, 0x6da86fe4, 0x2, 0x4, 0x7ff, 0x97, 0x8, 0x0, 0x1ff, 0x7, 0x3, 0xaff, 0x5, 0x1, 0x7, 0x6, 0x4, 0x0, 0x1000, 0x8000000000, 0x3, 0x1, 0x3, 0x3, 0x4, 0x401, 0x3ff, 0x9, 0x3, 0xe300000000000, 0x1188, 0x9, 0xe000000000000000, 0xff, 0x100, 0x2, 0x0, 0x100, 0x9, 0x1000, 0xfff, 0x3ff, 0x2fbe, 0x4, 0xffffffffffffffff, 0x80000000, 0x6, 0x3, 0x82d, 0x1, 0x80000000, 0x4, 0x40, 0x80, 0x4, 0x5, 0x7, 0x4bc, 0x5, 0x7ff, 0x4ab, 0x44097d46, 0x9, 0x3, 0x8000, 0x7, 0x2, 0x1ff, 0xffffffff, 0x90, 0x1, 0x8, 0x5, 0x100, 0x100000000, 0x8000, 0x4, 0x0, 0x1f, 0x80000000, 0x0, 0x80000001, 0x7, 0xff, 0xffffffffffffffff, 0x4, 0x3, 0x7, 0x6, 0x81, 0xffffffffffff8001, 0x4, 0xffffffffebfd13fe, 0xfffffffffffffe00, 0x7fffffff, 0x9742, 0x3f, 0x401, 0x5b7, 0x100000001, 0x2, 0x8, 0xda0, 0x7180000000000000], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x117, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000008c0)={0x6, 0x118, 0xfa00, {{0xffffffffffffffe2, 0x7371f6c3, "02d84b3c709c98625c5f9e6830e286199eb790a64261872de79373bb557a6b4db692bb257b85f90dd13fad1b13de4a82a28f6735e2cac9e8f88776c4d2e715e83b43d78ef59dea7997b632726c67cb658ad9625b50e08561f7884c23ac58a3e245b89dc5e3ed58d31b950f24349505a414343948abef9263fdbc7a17081483e3f783e4b391976cb4728873815dd3b5e657d3ea2aff637ef2753ef438f816ad85c87dbffb8dd180529841eefbb1d629a2f64b669e2763b5fe5ecaabbfd3387d0ede27486e225d09269ff1e6d6fe41309c39cbe320979e5e0200fa1547cfee731b0deef5ec57e8d256a02f6ad1bbdac913367f2b3fe6528525e1fac27fa7a08b91", 0xca, 0x3ff, 0x9, 0x2, 0x7c66, 0x7, 0x7ff}, r5}}, 0x120) 21:59:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000a00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:47 executing program 2: r0 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffb, 0x101000) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000040)={0x0, 0x9, 0x401, 0x3, 0x6, 0x31ed}) request_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', r0) 21:59:47 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r0, 0x0) clone(0x81280100, &(0x7f0000000080), &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x200080) setsockopt(r1, 0x4, 0x100000000, &(0x7f00000004c0)="677011e7033f3daebb8625cdd40c8a81c7beaa49c73c8cca9bf6ee9f6204b4eb016c22ececa1c41bf2ddb6d806dbc13eb0dbda077a254606b7e5fd409a1ef40d8790bbce7b95f0673285a59fd59da995c369b00d06190dfed58673395bfd5e2fe4e83cfd27ebfd760fd3dbf0f366723c5645478613ca8237309998cf76c3431f74fd0b615c359d669adf84f6bfa164957e126b88122023cbf497a7898740d5838400cd5f107c4551ed900df6969bdbcdc1195b307835ba021807386ea35dde3b618d4331d081f29718de41", 0xcb) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000002c0)={0x2, 0x9}, 0x2) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 314.953706] audit: type=1400 audit(1539295187.673:170): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=24984 comm="syz-executor0" 21:59:47 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xa083, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x3, 0xf4df}) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000100e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 315.025187] audit: type=1400 audit(1539295187.713:171): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=24984 comm="syz-executor0" [ 315.116737] audit: type=1400 audit(1539295187.773:172): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25000 comm="syz-executor0" 21:59:47 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x84001) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) accept4(r1, &(0x7f0000000100)=@rc, &(0x7f00000001c0)=0x80, 0x80800) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0xda) clock_gettime(0x0, &(0x7f0000000180)) 21:59:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:47 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x200) write$apparmor_exec(r0, &(0x7f0000000280)={"f3740d1b4715", '=:\n'}, 0x60f) 21:59:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000340000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:47 executing program 2: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x80000) r1 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x406400) sendfile(r0, r1, &(0x7f0000000180), 0x5) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4, 0x0) bind$unix(r2, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 21:59:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 2: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000005c0)="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", 0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000200), &(0x7f0000000240)) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9955, 0x2000) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x200, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x1f) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @remote}]}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x7}, 0x8) 21:59:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:48 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40100, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'posix_acl_access\x00'}, 0xfffffffffffffe2d) clock_adjtime(0x2, &(0x7f00000000c0)={0x5, 0x1f, 0x49, 0x6, 0x4aeed62a, 0x4, 0x6, 0x101, 0x0, 0x7fff, 0x1ff, 0x7, 0x1000, 0xbb7, 0x1f, 0xfff, 0x1ff, 0x4, 0x400, 0x7fff, 0x7df5f46e, 0x7601, 0x5, 0x9, 0x8, 0x16ea}) 21:59:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000340000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000090000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffff26, 0x501000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000040)) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="53e3d5b24cccbc391cdd32e2aa831fad81825f862d267812d7b0e1238799ddf5329b166d8e01b0f0e9f91f2c8da930033deb8045be5aedf543079656161850307ff015e27e94836716b67843f7ee8f0085e3f28af31c4c0b1d1aaf35b4da5a33e465f54eacf673ad58e8c23047e91b8bb0cf534d221ae57665a17d665ebe7e27b17e03d1936584ba73cb", 0x8a}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:48 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x204000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000080)={0x0, 0x1fffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x600400) preadv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x3}], 0x1, 0x0) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000340000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x53000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000400000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 2: 21:59:48 executing program 2: r0 = socket$inet(0x2, 0xa, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000000)='attr/keycreate\x00') syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) 21:59:48 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$sndseq(r1, &(0x7f00000002c0)=[{0xd9e9, 0x4005e45, 0x3, 0xf8f, @time={r2, r3+30000000}, {0x3}, {0x8, 0x266}, @control={0x100, 0x180000000000000, 0x8001}}, {0x200, 0x3f, 0x0, 0x0, @tick=0x2, {0xf7, 0x7}, {0x6b75, 0xfd}, @raw8={"68b04ed027bd1e1f5a6df9c1"}}, {0x7, 0x2, 0x7, 0x6, @time={0x0, 0x989680}, {0x2, 0xe9}, {0x49a, 0x7ff}, @time=@time}, {0xf04, 0x40, 0x1, 0x4, @time={r4, r5+30000000}, {0xffffffff, 0xffffffffffffffff}, {0x4, 0x6}, @queue={0x8, {0x8, 0x1}}}, {0x7ff, 0x1, 0x9, 0x8, @time={0x77359400}, {0x9, 0x7}, {0x86b8, 0x794a}, @result={0xfffffffffffffffb}}, {0x101, 0xc38a, 0x2, 0x0, @time={r8, r9+30000000}, {0x8, 0x20}, {0x5, 0x6}, @note={0x3ff, 0x1f, 0x1, 0x5, 0x8}}, {0x7f, 0xb192, 0x101, 0x100000001, @time, {0x3, 0x3ff}, {0x6, 0x1}, @time=@time={r6, r7+10000000}}, {0x9, 0x10000, 0x7fffffff, 0x8, @tick=0x7, {0x4, 0xc5}, {0x9, 0xfffffffffffffff7}, @control={0xffffffff00000000, 0x7fff, 0xc0d}}, {0x17, 0x3, 0x9, 0x8, @time, {0x8, 0x2}, {0xb3dc, 0x400}, @result={0x1}}, {0x800, 0x401, 0xc3fb, 0x7e64, @tick=0x7, {0x7, 0xfffffffffffff800}, {0xfff, 0x800}, @ext={0x2c, &(0x7f0000000100)="1612c105e62d8e23626761c7a8ff14b2949f59f25231fdd26c8ca539e62631f2525c302cd46ffcbf2807bfe9"}}], 0x118) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e0660400000028b30a"], 0x654) [ 315.535759] audit: type=1400 audit(1539295188.263:173): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25061 comm="syz-executor0" 21:59:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000001500000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:48 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'st%ck ', '=:\n'}, 0x654) 21:59:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000cee6ffff0000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 315.650346] syz-executor2 uses obsolete (PF_INET,SOCK_PACKET) [ 315.685036] audit: type=1400 audit(1539295188.403:174): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=25084 comm="syz-executor5" 21:59:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) 21:59:48 executing program 0: pause() pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x1, 0x8, 0x4, 0x0, 0x6, 0x81, 0x4, 0x6, 0x1, 0x8, 0x5, 0x200, 0x0, 0x7ff, 0x2cd63b70, 0x0, 0x20a, 0x9, 0x4}) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f00000000c0)=0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) fremovexattr(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="6f94782e736800"]) r4 = dup2(r3, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000b40)=0xe8) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000d00), &(0x7f0000000d40)=0x0, &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000600)='system.posix_acl_access\x00', &(0x7f0000000f40)={{}, {0x1, 0x2}, [{0x2, 0x3, r5}, {0x2, 0x1, r6}, {0x2, 0x2, r7}, {0x2, 0x1, r8}, {0x2, 0x6, r9}, {0x2, 0x4, r10}, {0x2, 0x1, r11}], {0x4, 0x1}, [{0x8, 0x0, r12}, {0x8, 0x4, r13}, {0x8, 0x3, r14}, {0x8, 0x7, r15}, {0x8, 0x6, r16}], {0x10, 0x1}, {0x20, 0x1}}, 0x84, 0x0) sendfile64(r3, r3, &(0x7f0000000200)=0x9, 0xe5) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x87, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e21, 0x0, 'sh\x00', 0x4, 0x100000000, 0xe}, 0x2c) readahead(r4, 0x2, 0x5) 21:59:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:48 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) connect$can_bcm(r2, &(0x7f0000000440)={0x1d, r3}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000080)={0x0, @loopback, 0x4e20, 0x2, 'lblcr\x00', 0x25, 0xc3d, 0x80}, 0x2c) fchmod(r4, 0x2) 21:59:48 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000180)="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", 0xfffffffffffffffb) 21:59:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000004000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 2 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:48 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) connect$can_bcm(r2, &(0x7f0000000440)={0x1d, r3}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000080)={0x0, @loopback, 0x4e20, 0x2, 'lblcr\x00', 0x25, 0xc3d, 0x80}, 0x2c) fchmod(r4, 0x2) 21:59:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000004000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:48 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) connect$can_bcm(r2, &(0x7f0000000440)={0x1d, r3}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000080)={0x0, @loopback, 0x4e20, 0x2, 'lblcr\x00', 0x25, 0xc3d, 0x80}, 0x2c) fchmod(r4, 0x2) [ 315.982210] IPVS: set_ctl: invalid protocol: 135 172.20.20.22:20001 [ 315.995907] FAULT_INJECTION: forcing a failure. [ 315.995907] name failslab, interval 1, probability 0, space 0, times 0 21:59:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000006a00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 316.065429] CPU: 0 PID: 25117 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #181 [ 316.072842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.082189] Call Trace: [ 316.084787] dump_stack+0x1c4/0x2b4 [ 316.088453] ? dump_stack_print_info.cold.2+0x52/0x52 [ 316.093667] should_fail.cold.4+0xa/0x17 [ 316.097743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.102860] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 316.108666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.114213] ? find_vpid+0xf0/0xf0 [ 316.117790] ? __f_unlock_pos+0x19/0x20 [ 316.121764] ? lock_downgrade+0x900/0x900 [ 316.125911] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.131445] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 316.136651] ? fs_reclaim_acquire+0x20/0x20 [ 316.140967] ? lock_downgrade+0x900/0x900 [ 316.145118] ? ___might_sleep+0x1ed/0x300 [ 316.149279] ? arch_local_save_flags+0x40/0x40 [ 316.153892] ? wait_for_completion+0x8a0/0x8a0 [ 316.158478] __should_failslab+0x124/0x180 [ 316.162753] should_failslab+0x9/0x14 [ 316.166554] __kmalloc_track_caller+0x2d0/0x750 [ 316.171224] ? strncpy_from_user+0x510/0x510 [ 316.175641] ? digsig_verify+0x1530/0x1530 [ 316.179885] ? strndup_user+0x77/0xd0 [ 316.183682] memdup_user+0x2c/0xa0 [ 316.187218] strndup_user+0x77/0xd0 [ 316.190860] __ia32_sys_request_key+0x13b/0x410 [ 316.195538] ? __x64_sys_request_key+0x400/0x400 [ 316.200305] ? entry_SYSENTER_compat+0x70/0x7f [ 316.204885] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 316.210338] ? mm_fault_error+0x380/0x380 [ 316.214491] do_fast_syscall_32+0x34d/0xfb2 [ 316.218816] ? do_int80_syscall_32+0x890/0x890 [ 316.223401] ? entry_SYSENTER_compat+0x68/0x7f [ 316.228005] ? trace_hardirqs_off_caller+0xbb/0x310 [ 316.233051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.237908] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.242747] ? trace_hardirqs_on_caller+0x310/0x310 [ 316.247765] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 316.252792] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.257806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.262646] entry_SYSENTER_compat+0x70/0x7f [ 316.267057] RIP: 0023:0xf7f6aca9 [ 316.270439] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 316.289346] RSP: 002b:00000000f5f660cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 316.297050] RAX: ffffffffffffffda RBX: 0000000020000380 RCX: 00000000200003c0 [ 316.304330] RDX: 00000000200005c0 RSI: 0000000000000000 RDI: 0000000000000000 21:59:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioperm(0x9, 0x5, 0x80000000) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) tgkill(r1, r2, 0xb) [ 316.311597] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 316.318861] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 316.326125] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 21:59:49 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:49 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) connect$can_bcm(r2, &(0x7f0000000440)={0x1d, r3}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000080)={0x0, @loopback, 0x4e20, 0x2, 'lblcr\x00', 0x25, 0xc3d, 0x80}, 0x2c) 21:59:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:49 executing program 2 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000070000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:49 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x12400, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x4a0040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhci\x00', 0x4000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x10000, 0x0) pipe(&(0x7f0000000500)) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x10000, 0x400000) openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x2761, 0x0) write$cgroup_pid(r5, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000340)="0a9201f74b165b7c14183a75bb34b129c3f822d7215c404dce92f2252abbb72c18e9a651f9ebe715271f4fa55c0e3e79d6a1c65f25", 0x35}], 0x2000000000000182) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0x10}, 0x4}}, 0x1, 0xfb5}, &(0x7f0000000100)=0x88) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40046607, &(0x7f0000000480)=0xffff) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000580)={r6, 0x1fd}, &(0x7f0000000280)=0x89295a6593e81d3b) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000640)={r7, @in6={{0xa, 0x4e20, 0x1, @mcast1}}, 0xbce4, 0x8}, &(0x7f0000000300)=0x88) clock_gettime(0x0, &(0x7f0000000180)) [ 316.740394] IPVS: set_ctl: invalid protocol: 135 172.20.20.22:20001 [ 316.769727] audit: type=1400 audit(1539295189.493:175): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25144 comm="syz-executor0" [ 316.791151] FAULT_INJECTION: forcing a failure. [ 316.791151] name failslab, interval 1, probability 0, space 0, times 0 [ 316.827420] CPU: 1 PID: 25151 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #181 [ 316.834808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.844167] Call Trace: [ 316.846766] dump_stack+0x1c4/0x2b4 [ 316.850402] ? dump_stack_print_info.cold.2+0x52/0x52 [ 316.855591] ? __kernel_text_address+0xd/0x40 [ 316.860086] ? unwind_get_return_address+0x61/0xa0 [ 316.865019] should_fail.cold.4+0xa/0x17 [ 316.869083] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.874185] ? save_stack+0xa9/0xd0 [ 316.877825] ? save_stack+0x43/0xd0 [ 316.881446] ? kasan_kmalloc+0xc7/0xe0 [ 316.885333] ? __kmalloc_track_caller+0x14a/0x750 [ 316.890170] ? memdup_user+0x2c/0xa0 [ 316.893876] ? strndup_user+0x77/0xd0 [ 316.897674] ? __ia32_sys_request_key+0x13b/0x410 [ 316.902516] ? entry_SYSENTER_compat+0x70/0x7f [ 316.907099] ? __f_unlock_pos+0x19/0x20 [ 316.911071] ? lock_downgrade+0x900/0x900 [ 316.915239] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.920780] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 316.925986] ? fs_reclaim_acquire+0x20/0x20 [ 316.930309] ? lock_downgrade+0x900/0x900 [ 316.934455] ? ___might_sleep+0x1ed/0x300 [ 316.938606] ? arch_local_save_flags+0x40/0x40 [ 316.943221] ? lock_release+0x970/0x970 [ 316.947203] ? arch_local_save_flags+0x40/0x40 [ 316.951793] __should_failslab+0x124/0x180 [ 316.956028] should_failslab+0x9/0x14 [ 316.959826] __kmalloc_track_caller+0x2d0/0x750 [ 316.964494] ? strncpy_from_user+0x510/0x510 [ 316.968934] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.974486] ? strndup_user+0x77/0xd0 [ 316.978331] memdup_user+0x2c/0xa0 [ 316.981872] strndup_user+0x77/0xd0 [ 316.985516] __ia32_sys_request_key+0x18b/0x410 [ 316.990188] ? __x64_sys_request_key+0x400/0x400 [ 316.994938] ? entry_SYSENTER_compat+0x70/0x7f [ 316.999519] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 317.004984] ? mm_fault_error+0x380/0x380 [ 317.009133] do_fast_syscall_32+0x34d/0xfb2 [ 317.013457] ? do_int80_syscall_32+0x890/0x890 [ 317.018057] ? entry_SYSENTER_compat+0x68/0x7f [ 317.022649] ? trace_hardirqs_off_caller+0xbb/0x310 [ 317.027675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.032515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.037360] ? trace_hardirqs_on_caller+0x310/0x310 [ 317.042374] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 317.047392] ? prepare_exit_to_usermode+0x291/0x3b0 [ 317.052429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.057291] entry_SYSENTER_compat+0x70/0x7f [ 317.061725] RIP: 0023:0xf7f6aca9 [ 317.065096] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 317.083997] RSP: 002b:00000000f5f660cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f 21:59:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:49 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000"], 0x8) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x42000) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', "5e776c616e30255c5c70726f6327656d31d800"}, 0x18) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000000c0)={0x7, [0x1, 0x7, 0x80000000, 0x8001, 0x3, 0x935a, 0x80000000]}) write$9p(r1, &(0x7f00000002c0)="5fc0dc63f6d6e59aba307a10efc0c8bb75fdd8ba277670bee58f938141b4f8f94b1e9a28736aab85e58534c77abd5540967c823eea0bdb6428a2ab3e14650d23f544232a4f9f7d5993fcf85bf090370d140de35b4dd8533053c2365b90f37c84866cde026a71ec956f8c8915bd6cd40debcfe0ac2f931e85aba23544b5e15059f6d7defdbddf6a3d0214c0e9d941f9f84ec3cb3f89731a4dbb61c36d3dc4b26f5f7c266985a183accb654dff969dddc44484b087e1edb4f6a7312ee7306dbbef65ff5c016c5500ce2a8a794ca7ed0cad0b0fe06bc04b50e82ba4e77f00aa9569f7e10e37bf136296cf3c090100f07b676cb42769b0d7af74f876057a426b3957a8a731bbb4ebed8cc1e9c7cac8d81692940726b727afd5e916e74b9c06cf33b8b5ae222a283261300859a799c5bab6ca4d96e297db9d2ad96bf178d4571830d73574b78d351555626ead2e99a32220ddcca853dcdbf974c96a7c274cb870a3ac6ffcc56504183bd1af7942e83d7eb5a5810ca58c185c677d0e01f42a83a0e19456ce47ed575c783ee7113f348c76e51686d0ed161e66faf62532886d2787d605219acacba9d5da3ebca4adf72cd9e526f732af0973a8cd9abf8d6a332c25c1402ba64b5887f6a04995002480192e40287b0a3843289d47522a5ab74ebba4ad34b4cbf8a0def6360746b0fdc8f9cb34eb68f760ecae17daac6ae3de88b22eeadac591f3634528eaac80d5bad607d0b9ed75fd641fbc3015a94bd107bc285c5957196f509d26f02924cf97ea231d24fd9ea081d25864e06b54167f8e0b04b0e8f204522f76bc4ce50961bef62da81a8a9edf704deb5f10a2f53fd8200fa3ceca809ea90b4ab3c1942ef9e58c170c812b19aa47b6ecdb75d7206142fb849d367801c31b3419f7c4e24c0342c96fe7d9e07711d80c31f933c0a1e1934f54999999da5aa9fb3db59cbf8df21e8d79fe5f95eb1204f618a4fc052d01f3003deba95e6c93d534197b5f3d3d2648a327a00132ac0f0c527beca57b4beccb45d9616a8836ff5908f52392db4a66ea44908fb59dfbf87f0b8114f943f2680a1d3a8cab3b94678e60e58e31c4a511b7e275258ff32e5f7518d550fa1e91ddaebdea44c3c01eedd2fed174bcfe3f34c51dafa934096566fada10e876d954c9b716eacdb28ef47faeb8926bc6763b9020808efb7f1755a72bbbdf4d6bc1de7f66383898e2713345102b01d64d9d63df07a2e8e8ba615e88c46033fa88aaaa16448293e74039e1c7cd71df1f3da5e07a08dcc13e5301c598a5b30fb6219d4d3e7b16208818b115ecc86642474e952e4e0f2df377ba776582ae85d63729652a0a1a6a45e9a20c04e8d86afb31dfcdb5a743dc3dbba14ee07839614d75e2dd4c3f1b7326c88295887a56f9aad765e4635d2cffd24f46800f06ed70275b1e88007cef576b1866babe96c24bb457ee37009615014a1472d232c61698d48e5ccb84337ceb0f9ae7cf1fd4abce9fcbf043b392012fd71984eb3b292515266ebc0e289aeb13d9535669be305f9bb8071f7d1f05c6800fb6029df6ece09b66aa4573e01e6fa832bde55adde79b8e0107381741b3393c400951d0e730a92fe832ebf7e835e7c3ca4442117acdd862862423ac7a4101679fb8e4dfda629a25d6bf8a92bc5f0814e17127460518c71c6f5c9c2afe0b34a9bf3a13b6908639b4c552e944d5076f1fd1c2423a160f8ef93998cb585e0f973277c714bbb64b9fc5467008002ff8a2c7797433a312fcac525811572fe08e088a5b00a8faa7608787f2dd9806c5f7ad81996be821dbb9012a26c31bab7a1e096856cbad51cdc38ddbefb05d1c39f49653edf472de6507fa301333cc9af2cdd6a48c11cd94df2b2726bb45473b307fd7db9041a1bbeb95321b38b849067512de7ca38ff051613e3be1afb24b11e62a23000dbbf19605854cc629976eeb859801e5cec1b014b9520070defb26c9f5ef71248104c970bdb92e7aa4a4302b2cae53966cff4ea77775a8e94afdfd78753258ec355246d95f881b2c919c36c523dcdf971060897ded30d4a769db1d7aaa65446d41a2ac46fca0b23b8b13ef4d24dca957078b23a0c2db70c1f3c142766ea3912a19b700f68283bd7fe48416e97a37d46306cd75f93bb7afbb087aafa56d5ba5291273b1bee66fc7c9cf4173c755d524a0f853e34ea4893fd861502845b694894f51f8d7b139a62d880ccf7e12c37cd0d40e8e4353569f6948a6f61018d90d40fd6c0ea7550f3624d2fd202aab995c7eaa2ad7c2b0c1d806597756404a83646a4a95094aafe8248af0399ee94ba8fb2c6e157f8e235d1c1e20548563f31f0184117fb591d0e964209f3ccf3fda5cf71e483d06f0059ae3cf55e961b359c517c12ceac3680dd8d71061f0697b1d7d3cb268a237f03dc53f2381d6d71017e492851254f6ba666488bed5afa2f35e2de3a2857793729377a6d09a6d770bd8820ba0739c499c9e6e9a3df7e5166ebdb86f0a31e2fe97da591ca9933e6f16d248824cb5d52d137a1103d31f17a4a5aeb1a2056563252a424420248c1cb88549cec4f4f5633a8efa5d328378702ca886554ec7001666b48dfdd96b73f914cfad0a66444a494231554f02f1c159fe26f1a7e2979bfd14094eb696be17b09626f0a246dd171513f89d6ac3022c1c9302bb698dccc115425b177275ff7aa096ba233f3e4e1962885df42b584c3254202055c0f5a610224d4a71fb118adbe5840b0d5934d2af89dfc1db9bcdff080d3368296ca49464bcdb15c94b14b8c0133b7b6147a03cbf2494cef5c311054d1945c395afe67854d4050b74b864f99dd1d56be84e9e0823894004304ca521753f9da23786d5a10c73ebf11313178488f4e28ee4ef105b408329d7f66374493b30753539af28195d165eab00aae5aa3dfa341f4f13f50f4707106c26e3f65cafa00c05a926771cfb8086db50d5cdf37639b3a21629e679e0b8175c3611bb5850f70ffe49e5dfca4a17be3c6d0dfebefa3c09a3934c4c0caa0fafd2f0be7d5f8d58245d7cc5c7e7d56bf9619c27a99c647c45d9b950f2dd1ebaedf494be9ffd0b491ea97ea010135da7a5dbb49394a0f2296539f96301f2121fc9a259a720e488fc0f2fa4ccd7defd874c9083b4a126775e4e7eeb8ed6ef296e068afdeed604f15efd87235d730e523fb2b82b11e13259d37c38e29733f7f70a65d5f4d8d904356c10afc8e06de7452979469f131cfb0ad6f3f7684f48028cd0dbf8c9eb247874f270ff0c20a178fe7774669c3587f52012418c1acc353a6e53d1c40f8969bb59dfee934c33b57a86da7aa3e3ccb390c926abe487b4c6ebb8451c244aeb12c4d88da8705a8634185cde4ff2b553bb4e97c00ee146cc3195a0782a394e70e01dd69fe1b7543552b170d039f11610e20a7c45de6d2c41babc4a10f9f3bfcfaa210d9024cb2e0717f3f3846e7af16d2a13f62018ccb4e5e45b5ca0d9fb2ab68456faf04f56e0dcfb9def27281859ef6537941e2300d2eaa9eff41080e9fa46b7cd430a610ae7795b98046cc91efd72ee50a5881920c762ab8c71da9da6e3845e14877af3d2f9d73d441a4454d6d00663b5eab9778008fcb21c7025ea55e16c1324093e3e1c630ce3adbe67e5a544dea3e48cb06dd147ac5d619d92456929ae3bd40e65d6d63b0044890e735e457d7482068c2f4bd6e2eb3bd904c7dfabf089ed28d067c8e36b5d56d25ea3363038616f9ab9bb1c8d5f6be1749b85b546552a9cf67f0cf547916ee68fabfe232be4341b1e180abe30cb4a4599b9803c5fd40d6c91ab884b8793a45db63dd0eb4ac88cc2215bc0333bf51580f8ab0be1a58cacc67a0b061e62b193b02f731bdc460829757f930394e3a32de9a5ac9ef918d6d74ff390b87c9fc59ad17f5bee721c11a3e31b4a88e41b5ad9567952f1605edc9d70f999c43198c1d775093416b6513a7824503eedb4ed35faca5064e3e7ad7ef0eaecb1f9e91b4de0dab0a4bdb56d0982938a8357bc2aaa3afb0d1bc4f2e2931ae295438937902ebabbafa14f4a717b0be195a78b9eb86e6ff83c937448531e5778b7729dde14b74fd281027e0e7ebf0c84f8fec35e3032b45fe2a33a9cff1b5cdae48c29bb28ad01e4e0ec10ec527cdc1fbc09c0981013c6a954e27cc333b44def75fe069e0b6380c5cc7434241f2c879e36b7576dd33c598f16fb5af53635db519baf03308dc12a2dddd6fbfd97f847fb5d3b19e7652ee32950a89d552bb7e9474b1e74bbe919f5de5976e6901029b9e2cb386e26a8e07f561c9054e132ebbcc4f0ab6e54132271cc4afec06c51cc06b0671ab190e57da533d2a90d12e008bfcf1e418d4394ca3097b9778dfc419ce4287f0bd4f9bc06f7d0cfc024a6b0b4c050d795e461a3a305d20079e4e2ef55816a871e5caafef2da462c8a3ef62df5d92068109b5d9790abb41281e74b1959810c6271ea1ee710696c43a6edd3efebd2308d363ddfc13d16611e4a88dfe0debf416794f9fb02d50a63817231791600b7b12e22df97d410574fb7c841c241a737537ca449dd80f69f59c99453df14a819b06e9d803ad830932ceeba318a2d98a5760a57cb9090f9a39ec9628c4252c1943d7b69316178d31572d54fcbc9395fd2076056dca586335e8e98d9b246641e964a8e5384f6b94c3e3594ec7c9eaabeaede20b0deaa4928a3697855df65f9fe9281bc6d391341792ed5a6ee86541a0a7d3e6222d670e7c1b3d6445871a6d219ecd7b8388874bf56d8772bbd3341b85397db9a5f79ffbc7df97f24f2d942bf8cc67b034b4ff56bd667e47b43408f31a6192a5e55c48893925afc18f66895c90a446ebe5c5b056bc8eb1910005c5bdd717e5cb3e5f2678afc38247ce33d6a73fac05584f1cc8929bc90ba04d0bca3f522e14c58b9c09706440894e32c1195e09820efc61a835d94cfc9205c47a2d29e212d11af31fcb16d8d9076cf285631a6897289023312f33e92dd838ad94fdebe2fe151463c0241743f7c6a555212fe7e864f470566f4e70806f82b02ccfdd272ecbccc02e5c0573213dc5431eee1b2d486104a8d23e16c6c735680407452765e40faefbcd6559e4225a37e7d4443b10b0351c85cd6ddbf89dda00c4c2ae982cf8bfcb710265e30553fadf407809f652d7418878709b48c222d4a437de55f2b0ec53d2d95b5dc357311093a8d88552198f075386cec995952c42a1473a5f2aa31ad32c3799356170c6398bada34a70d0f9ec155f29846960a8fce399d60c52cc0f4644873e19bcb7c0403bd4442c7ea99cf424a5cf3175828b2f81b15ca772aee62a48261b0396a6efe3c0dc74a1b91bd7152ba48ec11beee84eeafc05708370f65cbda1efc2e14c949f55ef6bc5365df75e00f7326d4d752cc8e3432971453a5b5dacceb4f4475dea860c2bf56ac127a8b9d2a6a82209988c53fcb0f63790e4a7afc1aa158b4726510121fe3cdb6a538f37e7558ed37ce71589878cd480d7c11dd0ab21f397b63f3e86b38e5ff714ea066d68a0b941d177d937542e1841f4924db52383866b3feb5c597c3995c4b582aa047fa9bcec91eafa1e7af2814dc6f2b152ed85a425d811b059a6e6de54bc5c41d85ebfb0107166ee4dac4770e756060a77a5cb56c980213040ef32b77a285b986706894c3d707a1e3e97f0084d2f890b3f9a1a0217caaea82ae11117e60413532d063dfbcb6a5325a184c0e24a5f8033cce069f3a549bba27a86a92fdc27b31d0bb50cbea8658d15903fa2fb2604887c1c239c934bdda1b5b607260442cf4ebc5a5", 0x1351) [ 317.091707] RAX: ffffffffffffffda RBX: 0000000020000380 RCX: 00000000200003c0 [ 317.098971] RDX: 00000000200005c0 RSI: 0000000000000000 RDI: 0000000000000000 [ 317.106279] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 317.113545] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 317.120808] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 21:59:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x2000000000000034) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:49 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) connect$can_bcm(r2, &(0x7f0000000440)={0x1d, r3}, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) 21:59:49 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r3 = getuid() syncfs(r0) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) open$dir(&(0x7f0000000600)='./file0\x00', 0x8200, 0x20) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000002c0)={0x160, 0x0, 0x2, [{{0x2, 0x0, 0x9, 0x5, 0x2, 0x7fffffff, {0x3, 0x800, 0x5, 0xfff, 0x8, 0xfffffffffffffff8, 0x80, 0x8, 0x8, 0x0, 0x44, r1, r2, 0x2, 0x1000}}, {0x6, 0x3fff80000000000, 0x0, 0x400}}, {{0x2, 0x0, 0x29f7, 0xfffffffffffff801, 0x0, 0x6, {0x6, 0xf7d, 0x6, 0x7, 0x5, 0xffffffffffffffff, 0x200, 0x80000000, 0xfff, 0x1, 0x80000000, r3, r4, 0x9, 0x7}}, {0x5, 0x4, 0x1c, 0x8001, '/proc/thread-self/attr/exec\x00'}}]}, 0x160) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000480)={0x0, 0x39, "b2d320b3e77d137e0e36cea8f688b735edfc29f40c25e403901f8d8c5179195d9eca6a3f72cb9d7a8404907bc522245d52636524e1dc4b431f"}, &(0x7f0000000500)=0x41) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000540)={r6, 0x7ff}, &(0x7f0000000580)=0x8) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f00000005c0)=@assoc_value={r7, 0x3}, 0x8) 21:59:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:49 executing program 2 (fault-call:0 fault-nth:2): request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 317.270906] audit: type=1400 audit(1539295189.993:176): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25174 comm="syz-executor0" [ 317.305585] audit: type=1400 audit(1539295190.023:177): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25174 comm="syz-executor0" 21:59:50 executing program 0: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="737461636b2007000000000000001d5b6f1d19ae8409644a7d5ba15f7feb58cb1b8b1687b125f11941abc65517611f27dabce71d1deb53880304bd5c6e727ad8349878fae5ba78fa8b005ddb8a1d2e080b4471ea5e98c8cdd78be2507a4bb225ace8658d70e5cac3e761b4bdb44a"], 0x654) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) tgkill(r1, r2, 0x34) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x50) 21:59:50 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000039d8c0000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) connect$can_bcm(r2, &(0x7f0000000440)={0x1d, r3}, 0x10) 21:59:50 executing program 2: request_key(&(0x7f0000000380)='.ns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:50 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="57a0a410f720158d24"], 0x654) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000140)=0x401, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x1000, "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"}, &(0x7f0000000100)=0x1008) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r2, @in={{0x2, 0x4e22, @rand_addr=0x7b0}}, 0x8, 0x5}, 0x88) 21:59:50 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0xfffa) 21:59:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000000c0)=0x8) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000100)) 21:59:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000024000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) wait4(r1, &(0x7f0000000040), 0x80000000, &(0x7f0000000100)) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='s\t\x00\x00\x00\x00\x00\x00\x00'], 0x654) 21:59:50 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2402, 0x0) 21:59:50 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000040000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x53}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:50 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) request_key(&(0x7f0000000040)="000000000000002c900000eeff0000", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:50 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000010000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)) write$P9_RREADLINK(r0, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 21:59:50 executing program 5: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) 21:59:50 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x40500, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x1, 0x1, 0x5, &(0x7f0000000080)}, 0x20) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000100)=0x1, 0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="b295e9d4c05985fc1505b3d99f61636b203e74fb"], 0x654) 21:59:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000f40100000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:50 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000006a00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x8) inotify_init() 21:59:50 executing program 2: request_key(&(0x7f0000000380)="646e735f7265736f6c7665720f", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000039d8c00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="9c183a6566edbd4581ec5d53ffb36389c32d098c322c807d4f0670c85fa74db43f58d6373f3efaeef8fc8306f755091d036e320b4ae4a6f4519f2e9221f469f3cfed089dbcfe956edfc1bb3263dfd8190c477feb2f10c8ba4bf71138951a8ec423932451286bc0ba386c48fb5cc7f44f98f9629c8adf707adc11b491169336ee305b68a685c96d75e3eb6e8aa2109016354597183d9636", 0x97}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x6000, 0x0) 21:59:50 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) 21:59:50 executing program 0: socketpair(0x11, 0x7, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e21, 0x3, @mcast1, 0x6}, {0xa, 0x4e20, 0xff, @loopback, 0x1}, 0x5, [0x3, 0x3, 0x7fffffff, 0x5, 0x8, 0x7, 0x1f, 0x328]}, 0x5c) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) r2 = memfd_create(&(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100)=0x7, 0x4) 21:59:50 executing program 2: request_key(&(0x7f0000000380)="646e735f7265736f6c76657202", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:50 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) 21:59:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:50 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="a98c3f89f518e8638965d10595cbbdc7d00e88568923ca6a37b8dc4445e7d78d2ccf4530f45309000000e016c718f6c9ec7be0480e692107b007999e6dcc51d4d85ae9ce02de2e9c682454af04af6de5afccc524308d2ee2cc0ad7e96df9cce24bc3ce6d85cb4febc84efa6b27e0503030dbbb183ae35a280dc9a7afd0892560eb0b292bb96fd456ebcea60e459b0b5d658be2bc2becaaf291605f3df581e14672a4bcd746377ab9271f50bb7a2b705007fe6072aefa7d25c052452b918843afc91fa4418f0c3ae8"], 0x654) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x7, 0x20000) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000180)={'vcan0\x00', 0x6}) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x480080, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'vlan0\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x10, 0x4, 0xfffffffffffffffb, 0x81, 0x3, 0xb1, 0x3, 0x7, 0x100}}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000040)={0x6, 0x3ff, 0x101, 0x47}) 21:59:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000b0000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:50 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:51 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getrlimit(0x7, &(0x7f0000000000)) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="73821c636b203d3a0a"], 0x654) 21:59:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, &(0x7f0000000180)) lsetxattr(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000300)=@random={'btrfs.', '\x00'}, &(0x7f0000000400)='#-vmnet1\x00', 0x9, 0x2) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240), &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000580)) mount$fuseblk(&(0x7f0000000440)='/dev/loop0\x00', &(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='fuseblk\x00', 0x0, &(0x7f0000000980)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fowner_lt={'fowner<'}}, {@fowner_eq={'fowner'}}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>'}}, {@appraise='appraise'}]}}) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x4) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:51 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000ffffffff00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:51 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edfdc33c12f4c2d409e24625ef59b07a55db8a51079e730eb2e539dfa83e465f961c8e26d0c9c2aaa90164b9f43e9d4536f8e7cf18f382b0c2224330d7251ae6b99ceaf25e1b0ba787275d8f07d6a2ecd9312d071688296a35f3e4b7634", 0xb8, 0xfffffffffffffffb) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x4000000}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={r2, 0x7, 0x1, [0x8]}, 0xa) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x15f}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r3, 0x81, 0x1, [0x8]}, 0xa) time(&(0x7f0000000380)) statx(r1, &(0x7f0000000080)='./file0\x00', 0x5100, 0xfff, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000003c0)={r3, 0x63e5dc18}, 0x8) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="5b2527e97d0419da0a"], 0x654) 21:59:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000a00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:51 executing program 0: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0xba}, 0x8) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:51 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500), 0x0, 0xfffffffffffffffb) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cdcd5f4272d2f39dca044397ba4aa0d2e46c10096e1cc8631770bcb64d36614636816d196c0d12e17197cf24515edf", 0x5c, 0xfffffffffffffffb) 21:59:51 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="737461616b203d3a0a6780a74a91f97f09d69467a6657b361831d5e446d7827ca7cd9e59d889f50f764dbb62c6a95a56488060ccfc94df6a2ea42de79f54a80fbb17eef10099110adeeb5c229d5398f54faf1c81cfb42934d6e766b4d99306d0cfc1d895c6058e417708ca43fc2294c30c8e81fa032035375dbde8bf332eb0e4b608954e07b1dce49ae422fb67d24031e88b3ef15c8e00d2da29503b58985b452f1378d91b3eb9f286170f8adc74a67ce5245ae4b131a92046cdc089324ba5d0f24873d1ca99697d9cea7f456e9ce85284a70a70c7877fe5efe1ebc2fc21c186e45ce418c912a0b1ef179335c6b2c02e178c"], 0x654) 21:59:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000e0000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:51 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x7, &(0x7f0000000180)) write$binfmt_aout(r0, &(0x7f0000000500)={{0xcc, 0x9, 0x0, 0x83, 0x367, 0x658f, 0x1b0, 0xfffffffffffffff2}, "766547277dd6189a42864df4489a59c5f85047793873ae7cc87cc439e83d3d5bf079a02627cc08ad76dfa7658391ee6b56e49549f66fed0d7d286da8ca4149c3ba48bbb0c49975d47503320cec604b0c39efb42b282f30fefa0627032e1a54360ccc7b558b497b845b35f27a552c86f8aba0478aea8d52b926b8634ec490ce", [[], [], [], []]}, 0x49f) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500), 0x0, 0xfffffffffffffffb) 21:59:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000150000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x83}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000e55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) 21:59:51 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1f, 0x8600) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x9e1}, 0xf) 21:59:51 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324cd44e391e5a1673e1c9132eb674f3d4960cd5e3a9ab3cd", 0x2e, 0xfffffffffffffffb) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000ffffffffffffffff00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:51 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)=""/30) 21:59:51 executing program 2: request_key(&(0x7f0000000380)="646e735f7265736f6c76657205", &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:51 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:51 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500), 0x0, 0xfffffffffffffffb) 21:59:51 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40000, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="57746104fcc8d8150a8b1b7b0cc48dcb9947d8546c9c6bcae0cd652b882e722e4972d2a0c3befdd12543b165db0470cf502b797f7022d25161fc0a70de062c9ef15fdc78425b3b4c2652fbaad4b89b"], 0x654) sendfile64(r0, r0, &(0x7f0000000000), 0x7fffffff) socket$xdp(0x2c, 0x3, 0x0) 21:59:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x7, &(0x7f00000001c0)) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:vhost_device_t:s0\x00', 0x24, 0x3) 21:59:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000b0000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:52 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'sy.'}, &(0x7f00000005c0)="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", 0x0) 21:59:52 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000001380)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000014c0)=0xe8) r4 = getegid() r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) sendmsg$unix(r1, &(0x7f00000015c0)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001340)=[{&(0x7f00000000c0)="bb14958de21be7854f9d50f150ac4610adfc16f57b4f9b3017a0b55428e87ac69fe9e205696916a4ee719282c2f3c4fceaa641903b78d61af418c201f19858c911f8cf70c570bb2be90d1a50066b66208f59da21a974e3161c15c6157f164388abef78b4fb73e6973be89551271cea61b4d4", 0x72}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000140)="3ddd9c1b6500e2a3dacb6551ec6420878dcbc50b72589a3f5fb5e3fd", 0x1c}, {&(0x7f0000000180)="b07b269aafd89a16c944f687a9128058825ee35458936b34eba28d0997843ad0f3106a83d552aaf5d7a9c73c21b383f274c67cd2230d7e6b21a1562a2aeb19ec76206d2e49fb647d0896717effb3094fc741395bf9e5df60ed1611025936a503abb2e09b940bceed801f8e644f32d044e6789f0432e0ce", 0x77}, {&(0x7f0000000200)="5907aaf62dd90300f493e2de0ec919b4b6e11a", 0x13}, {&(0x7f00000012c0)="27fcc1b153eb3300a5d30f7e093d075800bfc24980934847a92f4f1cf436e2264f4ccd9aad3b66834fc2f4ebbe644ba683f6e04fb53ca9061584309d41623eaf8366f5b4bf45551d3f0eeed03b6e47988efc7e1cbff35f2f2a8830930c7aa6039d24536822dcd415aa897fd463a3122ce4edaffbe252c96bef09ff1406", 0x7d}], 0x6, &(0x7f0000001500)=[@rights={0x2c, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x2c, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x14, 0x1, 0x1, [r0, r0]}, @cred={0x18, 0x1, 0x2, r2, r3, r4}, @rights={0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r5, r0]}], 0xb8, 0x4004054}, 0x20040000) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000001600)=0x5, 0x4) 21:59:52 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7895a0e54ae45d73aa3c324", 0x17, 0xfffffffffffffffb) 21:59:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000020000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:52 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x5}, &(0x7f00000005c0)="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", 0x0) 21:59:52 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0x8, 0x35, 0x2}, 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x88200, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'exec ', '=:\n'}, 0xffffff66) 21:59:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:52 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500), 0x0, 0xfffffffffffffffb) 21:59:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r0, &(0x7f0000000040), 0x3c7) clock_gettime(0x0, &(0x7f0000000180)) 21:59:52 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2002, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000640), 0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000680)={0x424, 0x1, 0xf, 0x612, 0x70bd25, 0x25dfdbfb, {0xf, 0x0, 0x3}, [@generic="1cbfa9f1c249f510dbb726201da04cc89a8f2083346cfe12e72741e9e3ce8213a0b6eea1a65f7ab2d0cbc821e45ac087f3b2acd827be87f3866c93de2f767275d1eeb87ce1ffb52913f0be927f0511bfa3dc036c0a94cf8eede3c2652fc09701b36053da9d01c2137967e2f6412f3d0b82d3552aca7433770cbb3c721b268cfadfa79a6170dec3f6a3d2de3e872c80370e33fcd10b485f31d4bd57da3c5e32b7f7b72f056004b38eda9b8abae27cf389ae86ce867f69d4ef281d249b2f7a93a30b20e5201786b83450e2f484b2ec82eb9a71bee52a9ec37b47bea5b8", @nested={0x68, 0x26, [@typed={0xc, 0x74, @u64=0xfffffffffffffff7}, @typed={0x8, 0x74, @ipv4=@loopback}, @generic="9664a7dfcece8c099beb19805d87cd60b25fdac220abd10dedaaf927c20adf31d1a153e438a14d91d7b2eb588597b050357ac58fc4862eec332f132077147fd4670994b340de7e772b3d388bc1"]}, @typed={0x8, 0x40, @ipv4}, @typed={0x100, 0x45, @binary="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"}, @typed={0x8, 0x61, @fd=r1}, @generic="5451a0bd2fca66d52d790f14f77fcfc1f535f0748f84", @nested={0x3c, 0x5f, [@generic="d55dad0f7932078adec3c51834c323ea5aa2bfb5e3eaa81d5ff4a1d426afb288063d437415f120e51f5ea05c16bfbe31ab1603c3e36d"]}, @generic="2d77d21b9c4b4534b1b457c301ae1effc18a5d91646ffc39d1b97d720ac26b1f40498a57d162c594c6fe7b61d451d9f6906e3be4011cebeacad7f06f861e5158fdccfc1a7b9cd29832d1e33b3b104ee6db2705b925379a24539ebc720342f3b2c7ca8f306d6b134619e03be3c5976fdfd41defea8c1db7bf7581006bdc3cc8b64cdd68a05ff56c2070ea37882178d8f6db13dd3087e77c712135dbcfa1448d85", @generic="8cd334fe66ec246efd84bb0ff0c51fb3abcfaf4826f2f3a2686bb467042bfa6d7c1680112bafb604530b999ea2b873f72f0cf1f29ddef2605057b07eb61bfc51dacc90c4a47432b3a70a4ea8892b192523e17032c2019bab375b43ed10330fed0a6c3ec005943bf4c3822a2b7673ca2a685ebefc1a1c6c5e6ac773df06e97fdb0caad0593f0db5eefc7c79f87a7562e87d3cfb9c9cfe47200c5910ed1423e696f8634ce01410ac8270b7be69d2e9e92a3cdddcf85c26809f1a4d7f95662945007ad6b76ff131e6"]}, 0x424}, 0x1, 0x0, 0x0, 0x4000850}, 0x20000000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000100)={0x7, 0x0, 0x81, {0x0, 0x1c9c380}, 0x61054d5a, 0x889}) 21:59:52 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x500000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000090000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x68}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:52 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7558be88ecdce9ec54617e7", 0xc, 0xfffffffffffffffb) 21:59:52 executing program 0: socketpair(0x3, 0x1, 0x1f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x0, 0xbd0, 0x7e99f0af, 0xf28b, 0xff, 0x8000, 0x61f4f984, {0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x4000000000}}, 0x417, 0x2, 0x8, 0x8, 0x9}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x7, 0x8006, 0x10001, 0x1, r1}, &(0x7f00000001c0)=0x10) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = dup(r2) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000000)=0x92) write$apparmor_exec(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="730600000000000000"], 0x654) 21:59:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:52 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000003400000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:52 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x2000000}, &(0x7f00000005c0)="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", 0x0) 21:59:52 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500)="c7", 0x1, 0xfffffffffffffffb) 21:59:52 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{r1, r2/1000+30000}, 0x11, 0x2, 0xffffffffffffffff}, {{0x77359400}, 0x4, 0x8, 0xfffffffffffffff9}, {{0x0, 0x7530}, 0x17, 0x1c, 0x6}, {{r3, r4/1000+10000}, 0x1f, 0x5, 0x9}, {{0x77359400}, 0x17, 0x3, 0xac18}, {{0x0, 0x7530}, 0x14, 0x5, 0x180}], 0x60) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r5, &(0x7f0000000080), 0xfffffe38) writev(r5, &(0x7f0000000400)=[{&(0x7f0000000800)="6dbdc72a7036d1caa82e6326d7bbc2ca6e684cabc618dcdfbf0bf6c4ed2816c9a361ecba14f6992479f68bc62594fde82b0ab2c15ceb28c7df2403b7640be3eb40a7c27efb164afa4b1e50eaefc4b0918ccba6066407cb194559993314852ea3ac104cf71c6ecdbc384e5382fab9269866a9e0ff1159a000c1667cee933a7fef608344d3f1d8a3d22fbdf57d7e09d2611214af5cecfe4d97fbbee680", 0x9c}, {&(0x7f0000000500)="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", 0xfa}, {&(0x7f0000000600)="14755317ba24311cce3f4b56e9b69af8ff29bc8e8de22b9f594c43e23f9d874e859717935056387918b7bc07f28c69361148938e885fd85c6112df7beecf33cb88d541c7dcb2cc9ea524fdb273ae9ae9618982a30f8e58661de61cb9bd62690871ca8c74e489e274c4d70543cb57920d4b6b445b6eb863f248a2344fcb9481c73acc386849edaa4276a06d1904e87adc11bbe575f5c2fe5394c14124aa5bc55cb4a8bcc5d587e25aecb25b3f14cef2eec18fa2b2abf6a374bc460ca734ce00e37973a343d2ef88091b9e6124c25e3538b0c125661b168f67c5f3614a20d0e3dddab48e5e", 0xe4}, {&(0x7f0000000700)="64148844661ac1eeee1b2d511b768dacde71b5eac2f76a732b2a5e478a3524378cf73266f97b2dde1fa9c507dfe2612b9623995891af83e9ae7e2dcd689edad9470e27097c30931f8208ab307d3d305549d3b9b87e6e6e7afd719038f412cc32ca3505e50f39e44cb2d45a3754dc8c0fb89cf3bbf970592f9dc25b8ea69a7e5844622b715e6e20ca152e3be1481e96f004c64ae3ed0f36d7f8be7f1d780d34bf675d4f5637c827c0ca6cf12c9a354a92447d5ae2c7da4680fc34c484ae117b278e3a6597916ed57dfd88b3ce5adb234d", 0xd0}], 0x4) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) 21:59:52 executing program 0: personality(0x4400015) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x8, 0x100) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '=:\n'}, 0x9) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) rt_sigpending(&(0x7f0000000040), 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20200, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06055c8, &(0x7f00000000c0)={0x2, 0x200, {0x54, 0x9, 0x8, {0x200, 0x8}, {0x4, 0x9}, @rumble={0x1, 0x8}}, {0x52, 0x80000000, 0xffffffff, {0x8, 0x4}, {0x3, 0x4}, @rumble={0x8, 0xdc}}}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x3) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)={0x0, 0xfffffffffffff640, 0x4, [0x9, 0x7, 0x7fff, 0xffffffffffffc1f3]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r3, 0xfffffffffffffffc}, &(0x7f0000000200)=0x8) 21:59:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000e00000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:52 executing program 5: add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000500), 0x0, 0xfffffffffffffffb) 21:59:52 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x2}, &(0x7f00000005c0)="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", 0x0) [ 319.944866] kauditd_printk_skb: 15 callbacks suppressed [ 319.944877] audit: type=1400 audit(1539295192.663:193): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25523 comm="syz-executor0" 21:59:52 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) fchmod(r0, 0x12) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0x1000, "362973520cdec37b705f3b5a497535422e70f0bfff2c86339876fccd13d69752bb4c62f14b216e45735cbb823dcd39f7cc427e4d2fb7b73cf9cd531240527d7f5505b9e7d455004d028af1394e14b1901b391ae537a7a1ca340634db9db7401317758ee95e57cc082815aff36a0c04ceb93cfd2311aaf919de0459faff5b5d664b3e6a896bc217603f10c19073506f43303b2ed2c8ec4ae79228d4a2716b2b6ae78a98465dc9363148f58fbed1b47ff7ae51979d968f06cfba03af4fca4a378954548026f1377d735af78ee86fa65d44b7ab171aa3c98089e797d66e5abebede55097c586c2552c8900c2832c65ac8708d8319c86abe74d59229d5385cc6ccf76e2003c83ba65c0fd06e435bbb8a87fb51d41c60abc0f6b2234b124f466c0ab901c0d29b1c544f1e353191afb142da132ae0757d4bf90858bef262dbbe73fc9dd197cdc1230191110caf4304799db54436bcca9102c0cce757364940c8a6cdaebf0902db93dc29fd7ffb28cdac642ccefc0f08378e9c365a2d8f9426bf6220983bb88057f29f232c8c2b2cd637414b66d3eb5b47099bb652006dc22c349a9d9347377c9b3dd14fd1ea08b37e5ac8857bcd432b24b1f241d1bd7b0125d0ebe26eca0fc6bb011c1343fcd072985bdff2aaf12a2114a8277b8e71519139bed9ea7d29ffdcd4a08a82c9eb2cf6145a945a94f69e108ffaa6762f83bfeed9395f72cf4c255321ab28cf67069f52560367c430f1bdad5172bebfa8ef5fed9e14905bebd4218dc934d2aa4f56fe7b234c3160a21c1b3f87243a61fb06181d3c442f21b960ed69195b1600a7c678c3c1aae6d790cdc608cac383296581e9e6a2265111ec6daa0ed66fc63b3d46929193b5fde9fb1fafc802081a10c2737bc83ca343b7e81b5f005358fde1a9b7e812d1f4f95aeddab906b00fa9db1dfae03d6d28b5c0a16b8dd22f9d09e8b9ddf1a61140e52ab8cc621cb342de9c84d81ee450369bdb9df05c2c8a7c7dfb69e76c6e6c32d4ba9caac833d766fa36f24855ca72f4b8453ee85cb48cd6c087ba9f32e104892e1d1bb858d2a4c1eb7215f2bfcf687f86ff421e8fe56e5831d7be24137dc08db8572120e3c3e9b1b2f78a6bb5ee1da13bf1188572e49e89ef31199f7e485d4571d41397ec3c3193b55c91e62c6cd5e10a0fb5ab9974acad7603f1072e4be3970d9faf3c7ab5d4d7d0eb93d09bb01f8777dd46b1d18f44712093f9d3c444a12dae4c63c1890aba9666785f8959e2d800c0b7ebbcf14ae556583845f3052a7a7e7e57e2c890dc4c4c61559f9c1ac4d145f0962c85a87b29b2a1bbe8cc3de4b70bddf9f65d351fd5f069f13ff027326fb80d94eac2ce3db0906cdc1b7f00ec90b56269d8acf893bb26b2d828f97c932ecf536cf5552b2026768a27c31d752b02b33f1e192943a3be278d128828625e159e27c2655334f40f7610bd5d1ea53d2a300401cc854ab496609903953925384dab70272131e69fc406c5f6f45add4e49fc94e6e343a6868cc6047ea26a30b8073730eefe1273c0ddbb157f48bedc40c66a3c9e0654bc286e5224a686b0f60784430adcebd48f9b60fda738f13223f2b4874ba8cf045f23010231c88359c1635831899a20844e533f8c41b6cf5d047c2e096062d406fb796f20b8533f5e10416fa99f37b8cf31aa37624c081b185fdb6fb71c8164f28d723faddb063cd1b3df0b081dca67a06b0c8e9c2ca737d281bae86da109b39a8bd046caa02e5096483c90d46d4b8437ad4becb8085b8f110b4e8727294047af5bdc2fd052a721a35be354b773e18aa6fc7340c81046ef7ace739efac9e08ec76fe837ee1294957b02f674c60ca2f129b2d430145c03eb02a8916b21650dd2e964bd06bf3cb73e49254f420242d2ce3ff8335d4d4ebf1ed44c344236544ca757e51881c82d2a71078e45c04d697ebd963a2a81a02ae3cb9a2eb6953d9a2bfccf97794d13f431a3a6214193f078642d42e8feacf1334b6801a21ea9ca069c320cc17fe6f5e9d39dfbc9d95e3919160d6d7aa826e623aa5a6ea9f4d87c494e7432850682084ddfd8b6c97e62e79463333581d1e45f40d5da0116540dba55808bf1ab26a3f5148c3090b55abba8258cc5a4e471279e03e62155c1c2bb0e2c50131513f9984d0ea8f7a9d6dc9378be55c5f02a858ed08b3a745f8812ef32b16a3ec0c5d264aab9503617ac3e2cac8fb3a25d042078a3ca2d13956893acd72fe44eeabc6dfbe3ec85fc6895d660be8e5b62fe0a8b3391e6ffd5b475270282215bfc12e3b65bea5fd6e7803361d369f8b99fdb4bf48e92858a481745b875c44e3604074ad08b1aa4bf1cf1d27b620565bb5de26f5c7f1309e98c80f56a3d28d65ba7d4c875c4b170d5b699b9aa55d9b904afa5cd9e3bfb7431927a3c90439ad71f6ac995e9fa4b8daa5b51762d37e259352303cee60329403e12fca97d06ae8f6467925883d41528c32f9c656f8696557505d944eab2e4ace3e9340de4631b0af993c11d5491dff142443296306c5b46e51f45bf4b5be45529c157844693b0fa22485362693269d7c80c273e941b0cfc180aaacd546e9151f023b8d195abceb6424d2e2d4aea18d11ac45bd2f8681a22b41bfc36a826043f7b9607b61cfe8affd60abeda395b863808a33097cadf7563ac02f986237e6b304f51b6f4d15c9d4986800fc383e2a0261a064b0eb97e8267405fb6dc7be4e81e8fc2c5833e9dc81237a5c1a0761bbcca4732b1d0376d7ffba59ba00726c212718faa02cefbe0a925605c94be4f666926e63920bffdddad1995b6a5f4168a252e584489070b6bd20e5504bb7d1cf9f85be4e5333d3c6d7e12bda64f900575076091c5d1ba0e398c338782c6592bdf9cb849dfb30e6b1d7c3118660e6a443bb5894cb0ed276fadb5aaba17a54c4253a9c42ee08ad6e72d28142d58c92547c9733fb2c9237c4c4e708d8709b6d0714a821e8281d8128d3dd05b7be7329f55e9eefef370851e8e07946a36ca2ff5cef634ad37246de44a95bcdfc5c63443680ae6c1ad672b4387fc90dfa26cc7cbebce38bc6766fdf5217eeb51ece3852f3c26adce3ab06fdeba90ae66b52a1b24d85ed16d1af7579be4fd2b237535af4dd40701bb9ffca8d9d2b98edbf7b77e56621022e85810dd63a165d863c53ca7894de1ecf46ffd7ed935c22ce31d9c007580312ee54b4917056911d08d6b387417fc2f02e1e765db9e7b6444daba916fc554b6e6dd162a7f7b10e8f391e22d4f64952754ce4ac41c445205f49c9ce2fbf8648fc85fe59d271b5f5206eacdbee68b4f6b94e8d62a8907dc95bd8d7bbfb14df95cf2366e4e2f9202e2a3e592614da08355f66607b78ebc76a847c9ef3d04873134da30432507b68be94e798a7c8a7a51b24c5e6e8ea9b477fb8fde2719299e75d2e2aecdd5a6bf5e94f8a8ea4c391c3a7c2028df203893a0ef342d9f1a11d01a54f8c89396836746d4b26382b160c44adc9e4c0422ae749a6efc012d3310e9a85a400a5fd09472b9481d3addf13ea2d5ce4171390f04afbf3eae5fe3d4002b6bee0806fbba0b3758b7296d42d3797c5a684fbda710cc55a2312307332dd8ea33b8fa4a149935120bfb60e9755a9895876627758818f87b5cba0d53ed76eb9fcbfe4d3a076b831922ff1e8a5241d711828abe20a36ea4328631605cef893b038447c779ce0a68c6755aa87a33cb50b6c301bc83fc3f083dcc8e152a6859bb7980200e4045bbc6fad9f3da6030fda749c2e6be27e1304c7664419308912fc8cccefa777a3ef86490e2a00fbd36f13e7068e8129478f052f20ece2180b2a01dab66bc9aa2aab732c5d0714ab014d2ba66b90853eb3818b5116fdb3fe92eb2a72fbb7f89d5717106f809564ec1c8627678f38e1bee718b141b6e4928bfa7a5bc29700d8aa8d83704252eab8f9a4369033c5219bd42b76a98c6c7071dde985ef751db2bd56ab5ffabb052cd54993de37aacf234749946bc7308cc9ad657a1f4b1fba6a94f8085667c9ae0341dd39094ff3980b7f2bc388644b8db4ee23c2653b75743b16f096aba730e4357bfcc9464a138328628afdea9a8e32bb935630ca390a46da9dfd3ad7bbb1925bf1ff857b8be50a0d5ef5804610018ffce8f77422bf60cd98a45a3c4084cabc96a2c61c778ba173863e24ea5c8ff40259f2d8a7de83f38cc5a1f80e2a78354d5b2b4b4e20041a1015c22a25a3874a86e183b3aee1959ec9b9339961140cf40fabd55c965b82cf8e207ddf7641a257df3993575dbf101ec4bd63de9c3174a73af67f2130ce1c1f6a6903669c810caa51562d82fb554391e914ae150d93ad2df9b7a6aa090f923422e7978da8c6373451f4fcf82cc4dcd2207323fd46ada2e2c50e9d5b349df9687cae71b89908a163cd98e9301a790c06b2788beed7644bd9c6f04bc250fa0d011c0926f17193710153f675ef2f96c4fd4f12cd13c4814bbb3de8ba3aabda539180b951f67eca5f617d333120d6f4357894eed0ff7c3877a22181e58e2b9193d799797abe912693bd3dc29c71cea037b3f5effddb0580d8f759bce1a6156cd9e023989dd1bc0ebe54fe3ebdc1d0d9d79c2c10f9d685e20324e9c48786b3796621cd259ba1bc75db634818dc6e6f82d84fbf259821cf0c8aa071d02566c67196169d55d6ab6da150a5941d0e8a5b3298c28b34133e021fbd69a176013ed016fbbf326e5361a688e4c41bada6498523728dec1b84fe94b925b7d9c6d1197e543c6c1b12220b05f7ef59d7678a97c59050906945490f3c095b044e76929d76aabcd1285e4cb75580f0a85a38de3548407f1ab3d96fc2416c5e863e394009cd67419410966c617f9bc1c884db4e3449f6fa1e0c25a16a4ce6840d74cf006a2a16e7cd74041a9487d08405671fa5a7f367070802a06a016a485777f2a9bf65b808b3badc687aebb5900f1ba2ed0312604e6720cab185d8a977c040b0e03e334d5cbee1997b067a1c95e38321d2bbfba972ea23ca618fd7f2413097f9eaeef8d5eb344bc5fd5a728e5ef09d0a74b8dd354a6522ec4f4de4d5d5d6adf0bf685cba5f5ca8d84d6e48d1996a444b3529a01065a5b56875f7c475a38ce46ff10a3c9507f300ae69fb0b30371104f17d1e3ec89e62f1297ef0ce4c8aaf1a405698cb55e1afcb097cbbe59048b3ac5a7bf98de2ba4c95e5d6734a4b02beea5000e2e734da74a2025b57088878a0a07b2b317cdeaa3972074483a30f128e86c7223682c2435f66bc7dde4a62fe4a41965e0f1ae3362daa460fe2f208c3ba4b05a2d206a1f06823012991eb94db59bb7e6898eefc8cf5f2dda97c4f7cf15b3cf46d17beecc3eff7da1ca8049308e93d73e211052782c543d06a7a72b2944815051760e79d4d4a73ad352020fe95fe6e5a966cad990daf3a3bb3c8500367465a49ec1ace3a0f2a98bb8a1109e3843ac4dcae81392691eb88c9c223e43ad4ce4408d2bbed29769762eaf427b43a5116c50d4c5f69cf6d57b226368bba07bae792e516d3d4b05eb50047001a5e6fad3033375ee0e3fdeeb42b0f1caabe054da265226baad994de697ef4393819d33fc6da98064a781aa75860cd8749ebc1be208a775c34bfc10b064484395f999afe7c65fe51ba0c1322d3b8bc058d1a43bdf288c828fb75c59007460882c74882f96c0483e3d81a47211b2c0c60fbd347e35187f4ce7256464e1116993a0aebeb4eb9e018329161a5e6d1ec1d8b76f4eb27066e0c845c4b2c1f504957eb0ef2533699bf24bacf545e94454d1407368a69560de11819fc14b65cc"}, &(0x7f0000000100)=0x1008) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x8, 0x80, 0x37b4, 0x1, 0x8}, &(0x7f0000000180)=0x14) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x80040) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000040)=0x1f) 21:59:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6200488dd260766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {}, 0x2000000008, {0x2, 0x0, @rand_addr}, "0000000500000000723000"}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local}, {0x0, @link_local}, 0xc, {0x2, 0x0, @remote}}) 21:59:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000340000000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:52 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf}, &(0x7f00000005c0)="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", 0x0) [ 320.021555] audit: type=1400 audit(1539295192.703:194): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25523 comm="syz-executor0" 21:59:52 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73865bd39d207379737465090000000000000064326d5b00"], 0x12) [ 320.095933] audit: type=1400 audit(1539295192.703:195): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25523 comm="syz-executor0" [ 320.177876] audit: type=1400 audit(1539295192.803:196): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25538 comm="syz-executor0" 21:59:53 executing program 3: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e21, 0x400, @empty, 0x6}], 0x3c) r1 = openat$cgroup_ro(r0, &(0x7f00000007c0)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000340)={0x0, 0x0, @pic={0x5de, 0x0, 0x10000, 0xffffffff, 0x800, 0x101, 0x8, 0x79e99e4e, 0xf3, 0x9809, 0x4, 0xd0, 0x7ff, 0x0, 0x0, 0x100}}) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000200)={0x8001, 0x9, 0x5}, 0x8) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r2, 0x12) clock_gettime(0xa, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x7, 0x9, 0x1}, &(0x7f0000000100)=0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40046607, &(0x7f00000002c0)=0x6) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000300)) write$binfmt_aout(r1, &(0x7f0000000500)={{0x0, 0x8, 0x9, 0x1f4, 0x380, 0x100000000, 0x280, 0x8}, "b8d05c95e789f6620d2cd99a223e451b7877fbdcc30c61f3a0e4c27402c044f476de79794620720ab0c7265e4c042852afc7a3d60396955cbb852b24747daea512f23e155d021195ae4470e6b58c75beec0c2aa95c4649d4c35e5c6116565ceae0ca02eee28c3d1ba2129ed08ec4eb93973426ef0dc6e5d00f5f8d2dc88099b137a1a995a387023b873cf401f35cbe8a967dd4d9d96435d2ef", [[], []]}, 0x2b9) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r3, 0x7}, &(0x7f0000000180)=0x8) 21:59:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000001500e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init() readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x18d) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/231, 0xe7}, {&(0x7f00000003c0)=""/65, 0x41}, {&(0x7f0000000440)=""/204, 0xcc}], 0x3, &(0x7f00000007c0)=""/157, 0x9d}, 0x0) inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x2e) dup3(r0, r1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '=:\n'}, 0x27d) [ 320.242388] audit: type=1400 audit(1539295192.813:197): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25538 comm="syz-executor0" [ 320.272556] audit: type=1400 audit(1539295192.903:198): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=25554 comm="syz-executor0" 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf00000000000000}, &(0x7f00000005c0)="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", 0x0) 21:59:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000900e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 320.348595] audit: type=1400 audit(1539295193.043:199): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25569 comm="syz-executor0" 21:59:53 executing program 5: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@filter={'filter\x00', 0xe, 0x1, 0x290, [0x0, 0x20000600, 0x20000630, 0x200008a0], 0x0, &(0x7f00000005c0), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'syzkaller1\x00', 'bridge0\x00', 'veth1_to_team\x00', 'ip_vti0\x00', @dev, [], @remote, [], 0x70, 0x1d0, 0x200}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x4, 'system_u:object_r:ipmi_device_t:s0\x00'}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4d6}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x80000000}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x2cc) 21:59:53 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0xff0b, 0x3, 0x779}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000006a0000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) [ 320.466664] kernel msg: ebtables bug: please report to author: Wrong len argument 21:59:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xffffffffffffffe0, 0x8203, 0x1, 0x6, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x7ff}, 0x8) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) clock_gettime(0x0, &(0x7f0000000180)) 21:59:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x1000000}, &(0x7f00000005c0)="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", 0x0) 21:59:53 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@local, @link_local={0x6c, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0xfffffffffffffffd]}) [ 320.511640] audit: type=1400 audit(1539295193.233:200): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25595 comm="syz-executor0" 21:59:53 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00k =:\n'], 0x654) 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x5000000}, &(0x7f00000005c0)="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", 0x0) 21:59:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000b00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:53 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x4000) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x6, {{0x2, 0x4e22, @broadcast}}}, 0x84) 21:59:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) dup2(r0, r1) 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf000000}, &(0x7f00000005c0)="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", 0x0) [ 320.697396] audit: type=1400 audit(1539295193.423:201): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25625 comm="syz-executor0" 21:59:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x30000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 320.752196] audit: type=1400 audit(1539295193.443:202): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=25625 comm="syz-executor0" 21:59:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="390000001100090469001bfd3f03f5000c450001070000001419001a00040023000700f0000200000809c99183a8a500020000000000000000", 0x39}], 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x20000, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8cd12dcea440d899c22c3790cf652b3a471b98b183e40d9951f9dafa9d4a7db7f3fef6e02e2ae389de133945a385bd81e9bceeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c", 0x2761, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x2, 0x101}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={r3, 0x80, 0x5, 0x0, 0x0, 0x9}, &(0x7f00000002c0)=0x14) r4 = getpgid(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000080)=r4, 0x12) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000540)) writev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000003c0)=[0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) r8 = getegid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) getgroups(0x5, &(0x7f0000000500)=[r5, r6, r7, r8, r9]) clock_gettime(0x0, &(0x7f0000000180)) 21:59:53 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) getpeername$netlink(r1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x106, 0x0) write(r0, &(0x7f0000000040)="efc990a01f255f5d37ae158ddc62019515b3943ef7e42fec4d2236d0777ac6b92aa774796f49bcaafe3e943b71c99de42f43df4d167d0bc715f5291de225c2e2849be3d2b60aed8746f1b27df73e8e22d2ed3515e9c51905115a39ac046393521e6ad7ec60ca0381ee42521732b0c024cd7bfee3d56728a450a759838db6a4b5c0344533fcdd35749446d501bad7b1aee91fdfcf9d025f06b057c8cc8af9b3bbc99712a265495a042120c8bc25fded5b43d2c90a", 0xb4) r2 = gettid() ioprio_get$pid(0x1, r2) 21:59:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)) 21:59:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000002000000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0x500}, &(0x7f00000005c0)="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", 0x0) 21:59:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0xffffffffffffffff, 0xf00}, &(0x7f00000005c0)="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", 0x0) 21:59:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:53 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x101002) write$UHID_INPUT2(r0, &(0x7f0000000180)={0xc, 0x4b, "e179d84755fffd748ae65862e766a6f5c7d5ffcf306d8d45ada76406b6626241263006648c82e053f6ee37c33f759375b620de5ae6aa0c3e52430684677c94966caa221378c5b0fbc38ab8"}, 0x51) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x4, 0x100, 0x1}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0x1, 0x55, "e815827c6dbfb0fe7f79b5edd7ef520bdd4f15da331402b1b7fd0ab70e5d0cee43889eedcbd68cf583ef88e8e3b208c594ac032c1427ec7a093d721aadcebbeb905ca5f9eab9948cc4881e9a22695b2f7f4e51db85"}, 0x5d) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000340), 0x4) ppoll(&(0x7f0000000200)=[{r2, 0x1}, {r0, 0x4000}, {r2, 0x300}], 0x3, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000300)={0x6}, 0x8) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) 21:59:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000a0000000000e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x8040, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect(r0, &(0x7f0000000140)=@un=@file={0x0, './file0\x00'}, 0x80) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x3d, &(0x7f0000164ff0)={0x0, &(0x7f0000000080)}, 0x8) r3 = syz_open_dev$admmidi(&(0x7f00000012c0)='/dev/admmidi#\x00', 0x2, 0x150d1c6b1b09fa8f) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001300)={0x0, 0x7fffffff}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000001740)={r4, @in6={{0xa, 0x4e21, 0x5, @ipv4={[], [], @loopback}, 0x2}}, 0x100}, 0x88) rt_sigprocmask(0x5, &(0x7f0000000580)={0x2}, &(0x7f0000000480), 0x8) sendto$inet(r3, &(0x7f0000000000)="ed5e683e4aff75573525928ec56ee3b5b639cb05d129112eac4216ea3ef2c86e003b8f1048ad68d3b3c6cc15ebb90ded100f2f4adfcd18bb2826e6ecbeb68e7ca2222e58ec1707640af76bdd6870c93188b083e037fe99a1117fcd49f1c0938f56defffac1a42583eabfae96cc32ef4da7c4b95283d08efd30952a16537473cef491214a45062c0cf58c0d42cd99c2145f9430460555acb21bedfdd668db21b8f6b4d26464912f2922099b2598b317982023a36925c3199dc493c66c6fa19f24871dabee920a44e90cf3260fd75b1ae066d230a4c5211017862a226f739d52af01e76fc5d807a13381d7ec2169dfcb5f", 0xf0, 0x1, &(0x7f00000011c0)={0x2, 0x4e21, @rand_addr=0x5322}, 0x10) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000005c0)=@broute={'broute\x00', 0x20, 0x3, 0x83a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f00000003c0), &(0x7f0000002080)=ANY=[@ANYBLOB="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"]}, 0x88a) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x1, 0x2009, 0x20000000000001, 0x1, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/2}, 0x18) socket$inet6(0xa, 0x1, 0x0) recvmsg(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c40)=""/252, 0xfc}, {&(0x7f0000000d40)=""/242, 0xf2}, {&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/93, 0x5d}, {&(0x7f0000000ec0)=""/235, 0xeb}], 0x5, &(0x7f0000000fc0)=""/114, 0x72, 0x80}, 0x2000) [ 321.006739] netlink: 25 bytes leftover after parsing attributes in process `syz-executor3'. 21:59:53 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 321.116541] netlink: 25 bytes leftover after parsing attributes in process `syz-executor3'. 21:59:54 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0x8, &(0x7f00000000c0)='bridge0\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000100)) fcntl$setpipe(r1, 0x407, 0xfffffffffffffff8) 21:59:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x58000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000e00e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:54 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:54 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'exec '}, 0xa) 21:59:54 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x654) 21:59:54 executing program 5: r0 = socket$inet6(0xa, 0x81000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '&&\x00'}, 0x9) 21:59:54 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) 21:59:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f00000004c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 21:59:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 321.418030] kasan: CONFIG_KASAN_INLINE enabled 21:59:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x35}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') sendfile64(r0, r1, &(0x7f00000007c0), 0x80) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003e800e0ffffff00f5ff0000000000004000fd000bc4fa460e14000000140000000000000000000000000000380000000000000000000300000000000000000000000000000000200000000000f33c8f51"], 0x61) 21:59:54 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x8, @remote, 0x20}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x7ff, 0x820d, 0x10000, 0xf6, r1}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r1, 0x1}, 0x8) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x3f, 0x2000) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000000c0)=r2, 0x4) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) [ 321.452081] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 321.486092] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 321.493331] CPU: 0 PID: 25707 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #181 [ 321.500688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.510055] RIP: 0010:memcmp+0x28/0x160 [ 321.514033] Code: 00 00 48 85 d2 0f 84 0a 01 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 f9 48 89 e5 48 c1 e9 03 41 54 53 48 89 fb 48 83 ec 18 <0f> b6 04 01 48 89 f9 83 e1 07 38 c8 7f 08 84 c0 0f 85 98 00 00 00 [ 321.533019] RSP: 0018:ffff88019afdef48 EFLAGS: 00010296 [ 321.538384] RAX: dffffc0000000000 RBX: 1ffff100335fbe40 RCX: 03fffe20066bf7c8 [ 321.545650] RDX: 0000000000000002 RSI: ffffffff883ba3c0 RDI: 1ffff100335fbe40 [ 321.552917] RBP: ffff88019afdef70 R08: ffff88019af3c540 R09: 0000000000000000 [ 321.560179] R10: ffffed00335fbe50 R11: 0000000000000000 R12: 0000000000000002 [ 321.567460] R13: ffffffff883ba3c0 R14: 1fff7901ce5db140 R15: dffffc0000000000 [ 321.574743] FS: 0000000000000000(0000) GS:ffff8801dae00000(0063) knlGS:00000000f5fbdb40 [ 321.583097] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 321.588987] CR2: 0000000000625208 CR3: 00000001c5145000 CR4: 00000000001426f0 [ 321.596263] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 321.603529] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 321.610790] Call Trace: [ 321.613406] strnstr+0x4b/0x70 [ 321.616610] __aa_lookupn_ns+0xc1/0x570 [ 321.620582] ? dequeue_entity+0x1770/0x1770 [ 321.624920] ? aa_find_ns+0x30/0x30 [ 321.628563] ? lock_acquire+0x1ed/0x520 [ 321.632536] ? __aa_lookupn_ns+0x570/0x570 [ 321.636773] ? lock_release+0x970/0x970 [ 321.640749] ? preempt_notifier_register+0x200/0x200 [ 321.645851] ? __switch_to_asm+0x34/0x70 [ 321.649922] ? __switch_to_asm+0x34/0x70 [ 321.653977] ? __switch_to_asm+0x40/0x70 [ 321.658035] ? __switch_to_asm+0x34/0x70 [ 321.662104] ? __switch_to_asm+0x40/0x70 [ 321.666160] ? __switch_to_asm+0x40/0x70 [ 321.670227] ? __switch_to_asm+0x34/0x70 [ 321.674316] ? __switch_to_asm+0x34/0x70 [ 321.678372] ? __switch_to_asm+0x40/0x70 [ 321.682428] ? __switch_to_asm+0x34/0x70 [ 321.686494] aa_lookupn_ns+0x88/0x1e0 [ 321.690293] aa_fqlookupn_profile+0x1b9/0x1010 [ 321.694877] ? aa_lookup_profile+0x30/0x30 [ 321.699157] ? plist_check_head+0xea/0x150 [ 321.703407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.708944] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 321.714396] ? refcount_add_not_zero_checked+0x330/0x330 [ 321.719844] ? mark_held_locks+0x130/0x130 [ 321.724077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.729651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 321.735188] fqlookupn_profile+0x80/0xc0 [ 321.739266] aa_label_strn_parse+0xa3a/0x1230 [ 321.743768] ? aa_label_printk+0x850/0x850 [ 321.748004] ? lock_acquire+0x1ed/0x520 [ 321.751977] ? __might_sleep+0x95/0x190 [ 321.755977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.761544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.767081] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 321.772535] ? refcount_add_not_zero_checked+0x330/0x330 [ 321.777988] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 321.783013] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 321.787775] aa_label_parse+0x42/0x50 [ 321.791591] aa_change_profile+0x513/0x3260 [ 321.795945] ? lock_acquire+0x1ed/0x520 [ 321.799921] ? aa_change_hat+0x1890/0x1890 [ 321.804152] ? is_bpf_text_address+0xd3/0x170 [ 321.808657] ? __mutex_lock+0x85e/0x1700 [ 321.812718] ? proc_pid_attr_write+0x28a/0x540 [ 321.817303] ? mutex_trylock+0x2b0/0x2b0 [ 321.821364] ? save_stack+0xa9/0xd0 [ 321.824988] ? save_stack+0x43/0xd0 [ 321.828610] ? kasan_kmalloc+0xc7/0xe0 [ 321.832510] ? __kmalloc_track_caller+0x14a/0x750 [ 321.837376] ? memdup_user+0x2c/0xa0 [ 321.841083] ? proc_pid_attr_write+0x198/0x540 [ 321.845677] ? __vfs_write+0x119/0x9f0 [ 321.849559] ? vfs_write+0x1fc/0x560 [ 321.853279] ? ksys_write+0x101/0x260 [ 321.857074] ? __ia32_sys_write+0x71/0xb0 [ 321.861220] ? do_fast_syscall_32+0x34d/0xfb2 [ 321.865735] ? entry_SYSENTER_compat+0x70/0x7f [ 321.870318] ? mark_held_locks+0x130/0x130 [ 321.874558] apparmor_setprocattr+0xaa4/0x1150 [ 321.879144] ? apparmor_task_kill+0xcb0/0xcb0 [ 321.883636] ? lock_downgrade+0x900/0x900 [ 321.887805] ? arch_local_save_flags+0x40/0x40 [ 321.892435] security_setprocattr+0x66/0xc0 [ 321.896759] proc_pid_attr_write+0x301/0x540 [ 321.901169] __vfs_write+0x119/0x9f0 [ 321.904879] ? proc_loginuid_write+0x4f0/0x4f0 [ 321.909470] ? kernel_read+0x120/0x120 [ 321.913356] ? lock_release+0x970/0x970 [ 321.917330] ? arch_local_save_flags+0x40/0x40 [ 321.921919] ? check_preemption_disabled+0x48/0x200 [ 321.926949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.932508] ? check_preemption_disabled+0x48/0x200 [ 321.937525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.943073] ? __sb_start_write+0x1b2/0x370 [ 321.947397] vfs_write+0x1fc/0x560 [ 321.950940] ksys_write+0x101/0x260 [ 321.954568] ? __ia32_sys_read+0xb0/0xb0 [ 321.958640] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 321.964106] __ia32_sys_write+0x71/0xb0 [ 321.968081] do_fast_syscall_32+0x34d/0xfb2 [ 321.972403] ? do_int80_syscall_32+0x890/0x890 [ 321.976981] ? entry_SYSENTER_compat+0x68/0x7f [ 321.981563] ? trace_hardirqs_off_caller+0xbb/0x310 [ 321.986596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.991437] ? trace_hardirqs_on_caller+0x310/0x310 [ 321.996458] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 322.001475] ? recalc_sigpending_tsk+0x180/0x180 [ 322.006258] ? kasan_check_write+0x14/0x20 [ 322.010498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.015358] entry_SYSENTER_compat+0x70/0x7f [ 322.019776] RIP: 0023:0xf7fc1ca9 [ 322.023143] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 322.042039] RSP: 002b:00000000f5fbd0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 21:59:54 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 322.049745] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000280 [ 322.057009] RDX: 0000000000000009 RSI: 0000000000000000 RDI: 0000000000000000 [ 322.064276] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 322.071538] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 322.078801] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 322.086072] Modules linked in: 21:59:54 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) [ 322.107302] kobject: 'loop2' (000000006bf1c163): kobject_uevent_env [ 322.113767] kobject: 'loop2' (000000006bf1c163): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 322.116672] kobject: 'kvm' (000000005fad1875): kobject_uevent_env [ 322.146863] kobject: 'loop0' (00000000ef07c662): kobject_uevent_env 21:59:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000a5bc, 0x2}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 21:59:54 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="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", 0x0) [ 322.153341] kobject: 'loop0' (00000000ef07c662): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 322.157806] kobject: 'kvm' (000000005fad1875): kobject_uevent_env [ 322.185358] kobject: 'loop4' (00000000b61b2837): kobject_uevent_env [ 322.194545] kobject: 'kvm' (000000005fad1875): fill_kobj_path: path = '/devices/virtual/misc/kvm' 21:59:54 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', '=:\n'}, 0x654) 21:59:55 executing program 2: request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz'}, &(0x7f00000005c0)="732851c5dd5827a9a83e8b3a37f5161b5474000f55ccd0775131d392c11039a06b4805feeae7863dbe0f2c942898f43d81af82a53ec194c45baa4a5c4f0ad6dfd441c05b35597961e63aa9b2d3279be8ef2deb9d1c150c88db06000000000000000df026a783635ab7e307fcc25c5f1a8151e431d62540475ad224d2e8badb0bcd85a14c62b538e6e1ed7ed921cabb84d5cdcd84d58cf948affd9662f13ed03f39fe04db010573a0ac65bd518b9b5bc3fc65af3fb1e2fa578f6391b62b23ca9897aa71687126953a9bdbccd4043cb5ae2da7696dfb9b3557aa10280d0bbbd7a6be3920d6cb4dbad6d0c66a26af5dd1c73dfb25fe077382a8478487fcc09c769107eeb560228400157fab1bcd5874663ec5ce10f6ce590a3d46cff136b1f72a89644c1096a3f846ad3b85bb01eb55dcdfe45532b91857a33a4385d3349a4c98f3733c1cfc5bd97658f2fa", 0x0) [ 322.204317] kobject: 'loop4' (00000000b61b2837): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 322.214504] kobject: 'kvm' (000000005fad1875): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 322.225851] kobject: 'loop2' (000000006bf1c163): kobject_uevent_env [ 322.230848] cgroup: fork rejected by pids controller in /syz0 [ 322.245341] kobject: 'loop2' (000000006bf1c163): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 322.282047] kobject: 'loop4' (00000000b61b2837): kobject_uevent_env [ 322.291430] kobject: 'kvm' (000000005fad1875): kobject_uevent_env [ 322.297792] kobject: 'kvm' (000000005fad1875): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 322.299660] kobject: 'loop4' (00000000b61b2837): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 322.328340] ---[ end trace 03a6792afa7ec58b ]--- [ 322.328348] kobject: 'loop0' (00000000ef07c662): kobject_uevent_env [ 322.328373] kobject: 'loop0' (00000000ef07c662): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 322.342054] RIP: 0010:memcmp+0x28/0x160 [ 322.350294] kobject: 'loop2' (000000006bf1c163): kobject_uevent_env [ 322.356203] Code: 00 00 48 85 d2 0f 84 0a 01 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 f9 48 89 e5 48 c1 e9 03 41 54 53 48 89 fb 48 83 ec 18 <0f> b6 04 01 48 89 f9 83 e1 07 38 c8 7f 08 84 c0 0f 85 98 00 00 00 [ 322.359885] kobject: 'loop2' (000000006bf1c163): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 322.378930] RSP: 0018:ffff88019afdef48 EFLAGS: 00010296 [ 322.388551] kobject: 'loop3' (0000000094273aec): kobject_uevent_env [ 322.393435] RAX: dffffc0000000000 RBX: 1ffff100335fbe40 RCX: 03fffe20066bf7c8 [ 322.400152] kobject: 'loop3' (0000000094273aec): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 322.407624] RDX: 0000000000000002 RSI: ffffffff883ba3c0 RDI: 1ffff100335fbe40 [ 322.430006] RBP: ffff88019afdef70 R08: ffff88019af3c540 R09: 0000000000000000 [ 322.442732] R10: ffffed00335fbe50 R11: 0000000000000000 R12: 0000000000000002 [ 322.454085] R13: ffffffff883ba3c0 R14: 1fff7901ce5db140 R15: dffffc0000000000 [ 322.461808] FS: 0000000000000000(0000) GS:ffff8801daf00000(0063) knlGS:00000000f5fbdb40 [ 322.470083] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 322.475997] CR2: 00007fec4de25000 CR3: 00000001c5145000 CR4: 00000000001406e0 [ 322.483261] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 322.490587] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 322.497890] Kernel panic - not syncing: Fatal exception [ 322.504325] Kernel Offset: disabled [ 322.507970] Rebooting in 86400 seconds..