0001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) 17:05:31 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/55) 17:05:31 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/85) 17:05:31 executing program 0: add_key$keyring(&(0x7f0000001800), &(0x7f0000001840)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) 17:05:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:31 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x7617256d5cff856) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x50000040) 17:05:31 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="60adeac086b38e049a788adc675bd0a4e27313ba4737aeea3c265098c0ac978c"], 0x6) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:31 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x7617256d5cff856) (async) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x50000040) 17:05:31 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/85) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/85) (async) 17:05:31 executing program 0: add_key$keyring(&(0x7f0000001800), &(0x7f0000001840)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) 17:05:31 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x7617256d5cff856) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x50000040) 17:05:31 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="60adeac086b38e049a788adc675bd0a4e27313ba4737aeea3c265098c0ac978c"], 0x6) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:31 executing program 0: add_key$keyring(&(0x7f0000001800), &(0x7f0000001840)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) 17:05:32 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/55) 17:05:32 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:32 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59ebbc446) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{@none}]}) 17:05:32 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="60adeac086b38e049a788adc675bd0a4e27313ba4737aeea3c265098c0ac978c"], 0x6) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="60adeac086b38e049a788adc675bd0a4e27313ba4737aeea3c265098c0ac978c"], 0x6) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) 17:05:32 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) (async, rerun: 32) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/85) (rerun: 32) 17:05:32 executing program 0: add_key$keyring(&(0x7f0000001800), &(0x7f0000001840)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) 17:05:32 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/55) 17:05:32 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) 17:05:32 executing program 0: add_key$keyring(&(0x7f0000001800), &(0x7f0000001840)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) 17:05:32 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59ebbc446) (async) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{@none}]}) 17:05:32 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) 17:05:32 executing program 4: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x1, 0x2, 0x79a28b7a}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) [ 442.464986] audit: type=1400 audit(1652807132.362:179): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24159 comm="syz-executor.4" 17:05:33 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) 17:05:33 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(r0, 0x40045701, 0x0) 17:05:33 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59ebbc446) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{@none}]}) 17:05:33 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) 17:05:33 executing program 4: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x1, 0x2, 0x79a28b7a}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x1, 0x2, 0x79a28b7a}) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) 17:05:33 executing program 4: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x1, 0x2, 0x79a28b7a}) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:33 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/55) 17:05:33 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r1 = inotify_init1(0x800) inotify_add_watch(r1, 0x0, 0xeb4e41c59dbbcf16) inotify_rm_watch(r1, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000040)) 17:05:33 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="736d6163066d000000001734aef8a7af4542b3d56e24a8b7c68876e0000065e26d0ea7a703d2c4cc2cce8b3665bc039bc3d2f4e01e899bde15528ba179f52f69fd5c26a9e0a15fa36bfdbb0808a18926b4e7d3b9d837ed21691520c0313aa4b54596f15500000000000000000800"/131], 0xb) 17:05:33 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(r0, 0x40045701, 0x0) [ 443.224151] audit: type=1400 audit(1652807133.122:180): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24169 comm="syz-executor.4" 17:05:33 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r1 = inotify_init1(0x800) inotify_add_watch(r1, 0x0, 0xeb4e41c59dbbcf16) inotify_rm_watch(r1, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000040)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) inotify_init1(0x800) (async) inotify_add_watch(r1, 0x0, 0xeb4e41c59dbbcf16) (async) inotify_rm_watch(r1, 0x0) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000040)) (async) 17:05:33 executing program 2: r0 = msgget(0x1, 0x484) msgctl$IPC_RMID(r0, 0x0) msgget(0x0, 0x88) r1 = shmget(0x3, 0x4000, 0x800, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/116) 17:05:33 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="a2e7f30a819dff12b3bfc01bc13d6fdc560e99f8dae875e4d741e5ba4f676082ab74eda8797e4511a48219e13f246f535edb6c304a3f95d06f47e42d6769ed8c2dc5b4cfc2f2e6df26d7ac13189d26daa884f7db68e5e48e99a7d58d1919d850fdbaa424069ea8fb69a573af74bcf5b0dcb84f60de304aeb1d6ef201815774bf5351aba140f6cb42db49f73094271d8d6ae6fa3c56bab0511044259aec3cb354fd580e8b145f27e0c7040e71c788128a5f26cc0823bf9bad625b3b5def39725e5a90fd4baff35737a7aeddd6e8d219a2b85a7a41225bd09f19aa69f58ddd8168c41bfb14f1e890f96ad7dc94ad411cd2183654f8a8443de9d2380177431af434ea9fcac8b9310860252f76b0738761f2d08cd77b672e91a685d936cdcb503ac8ea7a8434762c4a443dd6ee86d154381383385469962e38285647da21959d93c7dd82768e023a74d691168ae1a356c0b846de60d63548f4bfb302158c312f0d7f897d6d20fc3097f33a58a92693f6c0f088e79ce2687c1b3d90dc97add6b9d9086e3d36279aa0c3ad5818f9ca71272cc5341dbdab45617a5c62ea0e42a6697362155f35ece5bb28e85d2fdcb80d99fedda5e791e9f0b4fd625cb0e44add51e9ded273134a9e825eda5d7d11a1191cc73622f04b330be4962540ef03cae45a98c9ad262608b83468a81a6a42c329ca5c207fff4a61f932e7465c0d76b8c7bb5b1c08780757796bb8190c33e61a51dd24fd2170be604c635268345407fe0e270a890c946e90108a14b8234197c5731a0c7b363f41dec594e44d41068dec2f2150f0033154da8c1ae262354ac225bd68eac9a4b8b1f7867a0b293b6442f8585eae62a03ae9e273355ba87f741dd6c9a10b638d2275470972146e351f13f98df4796c64768f1560ae8dc0c0aabed7d2450c38e3da6d8066307133f43d4661335fb45a8be8ec7f9e2b40a0340ffd26dfcd431ce70c3a9dd2ca4ac18f33bdf5d2e6e9fb974a0b988899b06608d05f5807d202c69722d3f17ae86e7b48507f93f88edc1a88ce918b2ad726716f371f97f102e703afa7627cc2698678ed40052fffdd1f59798e8b5fc02012af4a6a7e3e41da46ba42d4812b1614181b744791d654c33c7e8e1fbb6e53a49afa16112bf0d028c9c2e387d690ebe02a2d638d3725a3f483d197325433c6558d4f251e9b3b2e4bf46927582afc1ec903b49a37c10540b29cd4686f816a288fdb3158b214b57fba507fef77b5501005dbe181b541e9260469f6de1256ec7354b6524523a6e54dc507fda4b9e0254499d7e4089bcc5474650de9ba5a6970bbda06024a7f1eeab7f418fa39ecbe21c793ebf4a2499b2f56ec4ccc99552d37ce69bd851a395950ec92d672e3332c7414a4d74143a07d3511e0da7003cd4a6d923e95c794421af0bb25541037457ad7eda433895c7d7ac6016565fc62e4944838ea51e3a8c9f813c9fdbac4400b787c14bd836f5f2eb55b8f2bb8192d551f1fad74ee759986e9aaf21bfa5f6ed953c652eac9dbe91adc0f4a69f177e9098f8fc553884598a65060efff1502d0e2934d65ae9cea5c9bd662f78967fce22eafa368d7e310e8815112e364afbe4526cfcece7af7108560b022dc8a435d145d07c5db24beff22187ab4033280a0351ff11c8058a1f859d20fd5069eb60b2ff9936c3f27fb0c2ecac089bc5f2fb2a26b51f0eac60442678c7777486557b83522ce3257223b6a68c01f65d06250daef0e9c36a9e3d8f2a52d32e74566ff3be972498c23a16497eb0277507b1e18be4b714db09d03718a04dba34e4f6f7fdff923c418022d4467985aa45a9344814d099d82671282ace11665bfcaf9b3f9520f4ca30015c5248b3fbf87bc2e92f14f3b014799081cef37c51819e139cf35822d00647d9d795c391309b1cd12316ca11e4b8651f84bcc75859dd5503e0e598e915c41546e785de655dbda183c3d44aad1635ac5b880f257587957a5d61fe23ddd0095237268750e22b050814aa64d27e4eaeef3a60552218d593e1ea8860418d28a53b8710ea8c616f40e3d21fa08dd635af6b23543db9643efd0003b5934972123d67a7fc6f75cf47b42f73199e44630ea73de373303bc1fa9a9466a39582eec45fa108a60351e154b1280ad4d63a4f4c9988e26fa856c32b756ecb68907d318b4e1098ba406bb0a23c55a42676ab8cbb7458caced21e7b13489fb46e0111aa236d550d0cf08c61a70b6ab5dd025dc853bc1b8a5ed07682cbdf4989d0802f41d866ed9d79ee38479e009d5068ddf6dc7a7d85121d103b8b78dcfb332772dcf86b393be3c4a2f743f7db19e4ef8d39a9a09d85612f1e7bc150a376a43f55772fff0830839a6f68cde41244ac0d07e511630c7e70e3b445e28fec09bea3c1d36317379b3462f4aeac7ddba2d1dbe89d5fa65d7b8660df90562ec5705c789f7ea0c13fd5e891953c4179502b364ea1779bef1f2a4f577d67dbda49e1e8175f6f9a437b04f03f53226d59a5ead79ebd98d4ddd617b692c588ef12521191f6358939e8835d8b52107b437f341124be53baa3f6aa4ccd08fe66d47819a0ec099209fda99e99cafe7578aa7d09a5a5d97ba00293f6d7f34a9c2adf44d57fb115c0c0e4fcfc8e55a0985f26aa30d70b6b6c74d666b360cdd4929e75f1d2e5845866cd8908cc0da7f66389c135be763f8b4c5366d081aa541e92b46dafe48ab52474ae2e63d0aee1c377c277b9cc765fc34459373468a8c2429ddbca4f8235d19f653ac527bae64616a755767daccd2cc57dd3c81b7c572ff12a5cf889d2ef83c764c1a313cb94531c3f44ee03c0594420b33c84e66d8b5df7c71ab3d6f3bd9d34728f5795415640d6a86f82e0e26e9c5ce9cdae3932b56555517bf8013b807347d03ac17a095d38a12f26e83ff6342142741bced943a6b1b91b84ba407f37c6c7f7d5dce15e42492c7ecdae98a79cba7a5e0508a4e7821cfb3a3773451170494b5c5a7462450f8df69c7d8f807ce0449750101d8e75deedfe076b8aac090c3f9be89df024874c2b1e304330a257770c0b03e3890d6196cc8a14de9d09d572e4309ce676d4259ea7549b046b690aaa67b7824d01ea8f6afdb239fa9e47034646efe296219e220622b07ad579cadcd29ebf9631b542acdcf3564232ce5378dff4afa2763ef157602bd2e87e44d3a3c7cf11011e6240a92cc371880095918a6488a997e33b9d16e125cd5084fec62bafcaa52993f26403b23a051c8aef6efa91125e205cd4e5d4671869f40de9d3b41d6c5bd52fd11ef59fce18317545bdb042acb0b114ecfeaf3c4846f55cfe0a6ba586784f83c4fc0b9da9c6845a97f87a8fb409e9e84883a9d7b1702da791292fe90f06d431384a89fb92438f8b8fd1921ed68a1089f890dbf1310e794aeabebd3dca93568c849a714445297514cb5a5343809e15019d27a73c853202bf5ba6bf7b4c5fe09f8a6dac18d9437f6a5940e8cbc03888773a0e68d50b960160a4cf2e1eb1a354c90cd50effdab54ef0d74ca0613b058d1f4a714054c356e013688cc9b85b30f31946c09bab7ebe87561e396e58ec33cf2f7242ef8af03b43ffca6207da37dcf2df279445e933b3a92ad470fbfd4f3fdfeecbad4a59d8e15a83088c2c17668031e868513d046842b6fc97bcb347d4d12d88439cb358ac0d6d2f891606f4736ffd45fb4a8a0d241f51b933e1c808d9f907972906524c644226174b8a5706ec9dd798217b391f2d02ec25b8dcb9a320df3195bb31a7b29cb16a77cb7605c3514aa5ef533c479dba4c83238b59e68405b269237dd2ecca70c3e723ad62e70dcdde931da674a9b437cf7976046d1708b698ba54f1cf7d2a1f75b0fefad6213d531048a5f5afed46d303018c1cbddb6daa9a4154ed84212a0e1af87fa33ec3bc7c3ee9062cbc181cdee8358d2d3dffbdf8e82769ed7c5f430019c2f2bf28e3c6106e70d10a01bddd3d2a35d246ddb85eba2a73246d49aa6899be9922e5a1539abcd5618521688a4db02b1418d6816c10c7190660e9cfb168d740b10bd03b847258d5ef9fc8ecc976ca340e02b1038a9f9e0b4328e3123bafda8494508f5f9182adf39cfa0b3cc88c4180dd1576362b69650cfabc7df5e251892110d5f96cea160f060f02b4a0d175dade36b0357bb8b284125f82ee02789fd4afa9713df70f6d0c45462e1f79708681051e8f2c27e29b17a7c6eb91505c6b2455671aaf3456160f9ac9e2af7bcb0f6daf0130d09ce4f7b7739a3146c1a11e554c4dec3ac9fb95f10126c5ff6ed86643832fb3d9f672445a8130862dc3e8ad5ed1a78123dca93c1dd987a1d7999528867f841c33a7f4a3fe98d5aadf72e6b9634e8ada9174ec6a021ee370096c49752de8bf606f96028ea039f4bc0671cd5d94903e7c95a039c751ba224d31857b30176ea6df453e8460b6280561e2a867b9b20e33d864c8edb26c90ea6acd28fb7f6373af78d17b5cd0b28de258974596917dac03e5a1a24d81f996f5530dbb0a4a94301da892bca4bef72c8e42af78098d7337fdcfd64c702c1271685add680f9caf3668dd62f5ffe96603ec7f2461c5e4d8b71c5a09732edf38ef3fe866da7f797e107b1fe758d776f531307524573e57c0d826ccb6d65046326d62fd7d8e6f5b6ad87fd946215df1485a2494a8dc29492a3aa6dd16b1043022fd9ee70ad788106cd857abfe4ad56fc4c82e896144c3b4ae477e7ee264d557b4373ecb5abcc9b9bc74da97886cd297044363d0f42a8647901658529f33527ebd993011682e8e9c35da2d5bba855e22bf79241fc980c87b49da5155f828f494cf36f91f739085a4e3e7d08aa61d27a7dcefb547b46791852dfc96951a251609a6240313c1118346bc81b4ea670dc3149af007df22cf13d19b554bfdd4172f0d94e6bc572f68eec3b1714abec350dc1e3755aa5b6d0907da214396e83cf4889decf2fde7bbecfe0765a5cc929034ec93dc23abbdee592bf89a8ee6748cc17ed68cf443e525f5cd193607985c487f88d46891e040ffe61e340b0459adc0459e6a469e78441e2962aa4e48b9c2f5095c1be7f9d930375732bc75d3e2f6d05460e4fa9eaace052c542153af784f0bd75c9cdb5e78759d0bdb1f060a51156183f2c3a83b19533fcc80d9cacfda22591177ad0ffe1f6de550cbed7ddd6b413863c16c0c371b0bb95eb95eeacdf6950dfcdcf33da4e1d8825a49f8e36eb271ff928729b6c05fbea3fdecbf6ddd6d062b2cb3c643aae019858e6f27e6fb0e5a9aa0c514cecd4d39549dff3b303224912c6877e535aa58af0f8722a0d1f559af87b11348af11c0678458786b5dc0bc686399d53b2bcf4b953d428e7bb3798b6e44ddb6e63ad186a968f893b038b8277921318066030b36e35d2f73305123c76ea8c8abab45c0ecbda8ff82cd7a63e1bc93b02ef46e331dacb5d40e3b516aa2c34623d8850b17e2400ab6c0a0ccf0e3ca5fb7cb56163b03cf25338425098a7c3f256c2d9efa3e4be603fc5745e775d39736cf754b2dccdfc22f6915bb04719cf0e36d41aa9a9ed51a356d7138b5d589699c1dc386242ac07c507d035796694cd8f9d344812a7c604c855c04066dbe064aeec2398b7d1a9153d93a458cd5c6300c397dab715f73cc4838142aa4f20456b8efe8d3749df2ed06ca2d09491591982cba210d472c3eb9cc3f952c0688b2700fbcaf58e028546984df15eda667f455d68d79a38b6f3ed30cb6c0994afd6863f26c07f251e642b0a9787cca3f0584b60b80504f255ccf62565c4be334b19bd29acf84d6e300f02c49c", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) 17:05:33 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(r0, 0x40045701, 0x0) 17:05:33 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) r1 = inotify_init1(0x800) inotify_add_watch(r1, 0x0, 0xeb4e41c59dbbcf16) inotify_rm_watch(r1, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000040)) 17:05:33 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="736d6163066d000000001734aef8a7af4542b3d56e24a8b7c68876e0000065e26d0ea7a703d2c4cc2cce8b3665bc039bc3d2f4e01e899bde15528ba179f52f69fd5c26a9e0a15fa36bfdbb0808a18926b4e7d3b9d837ed21691520c0313aa4b54596f15500000000000000000800"/131], 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="736d6163066d000000001734aef8a7af4542b3d56e24a8b7c68876e0000065e26d0ea7a703d2c4cc2cce8b3665bc039bc3d2f4e01e899bde15528ba179f52f69fd5c26a9e0a15fa36bfdbb0808a18926b4e7d3b9d837ed21691520c0313aa4b54596f15500000000000000000800"/131], 0xb) (async) 17:05:33 executing program 2: r0 = msgget(0x1, 0x484) msgctl$IPC_RMID(r0, 0x0) (async) msgget(0x0, 0x88) (async) r1 = shmget(0x3, 0x4000, 0x800, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/116) 17:05:33 executing program 0: ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, 0x0) 17:05:34 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="a2e7f30a819dff12b3bfc01bc13d6fdc560e99f8dae875e4d741e5ba4f676082ab74eda8797e4511a48219e13f246f535edb6c304a3f95d06f47e42d6769ed8c2dc5b4cfc2f2e6df26d7ac13189d26daa884f7db68e5e48e99a7d58d1919d850fdbaa424069ea8fb69a573af74bcf5b0dcb84f60de304aeb1d6ef201815774bf5351aba140f6cb42db49f73094271d8d6ae6fa3c56bab0511044259aec3cb354fd580e8b145f27e0c7040e71c788128a5f26cc0823bf9bad625b3b5def39725e5a90fd4baff35737a7aeddd6e8d219a2b85a7a41225bd09f19aa69f58ddd8168c41bfb14f1e890f96ad7dc94ad411cd2183654f8a8443de9d2380177431af434ea9fcac8b9310860252f76b0738761f2d08cd77b672e91a685d936cdcb503ac8ea7a8434762c4a443dd6ee86d154381383385469962e38285647da21959d93c7dd82768e023a74d691168ae1a356c0b846de60d63548f4bfb302158c312f0d7f897d6d20fc3097f33a58a92693f6c0f088e79ce2687c1b3d90dc97add6b9d9086e3d36279aa0c3ad5818f9ca71272cc5341dbdab45617a5c62ea0e42a6697362155f35ece5bb28e85d2fdcb80d99fedda5e791e9f0b4fd625cb0e44add51e9ded273134a9e825eda5d7d11a1191cc73622f04b330be4962540ef03cae45a98c9ad262608b83468a81a6a42c329ca5c207fff4a61f932e7465c0d76b8c7bb5b1c08780757796bb8190c33e61a51dd24fd2170be604c635268345407fe0e270a890c946e90108a14b8234197c5731a0c7b363f41dec594e44d41068dec2f2150f0033154da8c1ae262354ac225bd68eac9a4b8b1f7867a0b293b6442f8585eae62a03ae9e273355ba87f741dd6c9a10b638d2275470972146e351f13f98df4796c64768f1560ae8dc0c0aabed7d2450c38e3da6d8066307133f43d4661335fb45a8be8ec7f9e2b40a0340ffd26dfcd431ce70c3a9dd2ca4ac18f33bdf5d2e6e9fb974a0b988899b06608d05f5807d202c69722d3f17ae86e7b48507f93f88edc1a88ce918b2ad726716f371f97f102e703afa7627cc2698678ed40052fffdd1f59798e8b5fc02012af4a6a7e3e41da46ba42d4812b1614181b744791d654c33c7e8e1fbb6e53a49afa16112bf0d028c9c2e387d690ebe02a2d638d3725a3f483d197325433c6558d4f251e9b3b2e4bf46927582afc1ec903b49a37c10540b29cd4686f816a288fdb3158b214b57fba507fef77b5501005dbe181b541e9260469f6de1256ec7354b6524523a6e54dc507fda4b9e0254499d7e4089bcc5474650de9ba5a6970bbda06024a7f1eeab7f418fa39ecbe21c793ebf4a2499b2f56ec4ccc99552d37ce69bd851a395950ec92d672e3332c7414a4d74143a07d3511e0da7003cd4a6d923e95c794421af0bb25541037457ad7eda433895c7d7ac6016565fc62e4944838ea51e3a8c9f813c9fdbac4400b787c14bd836f5f2eb55b8f2bb8192d551f1fad74ee759986e9aaf21bfa5f6ed953c652eac9dbe91adc0f4a69f177e9098f8fc553884598a65060efff1502d0e2934d65ae9cea5c9bd662f78967fce22eafa368d7e310e8815112e364afbe4526cfcece7af7108560b022dc8a435d145d07c5db24beff22187ab4033280a0351ff11c8058a1f859d20fd5069eb60b2ff9936c3f27fb0c2ecac089bc5f2fb2a26b51f0eac60442678c7777486557b83522ce3257223b6a68c01f65d06250daef0e9c36a9e3d8f2a52d32e74566ff3be972498c23a16497eb0277507b1e18be4b714db09d03718a04dba34e4f6f7fdff923c418022d4467985aa45a9344814d099d82671282ace11665bfcaf9b3f9520f4ca30015c5248b3fbf87bc2e92f14f3b014799081cef37c51819e139cf35822d00647d9d795c391309b1cd12316ca11e4b8651f84bcc75859dd5503e0e598e915c41546e785de655dbda183c3d44aad1635ac5b880f257587957a5d61fe23ddd0095237268750e22b050814aa64d27e4eaeef3a60552218d593e1ea8860418d28a53b8710ea8c616f40e3d21fa08dd635af6b23543db9643efd0003b5934972123d67a7fc6f75cf47b42f73199e44630ea73de373303bc1fa9a9466a39582eec45fa108a60351e154b1280ad4d63a4f4c9988e26fa856c32b756ecb68907d318b4e1098ba406bb0a23c55a42676ab8cbb7458caced21e7b13489fb46e0111aa236d550d0cf08c61a70b6ab5dd025dc853bc1b8a5ed07682cbdf4989d0802f41d866ed9d79ee38479e009d5068ddf6dc7a7d85121d103b8b78dcfb332772dcf86b393be3c4a2f743f7db19e4ef8d39a9a09d85612f1e7bc150a376a43f55772fff0830839a6f68cde41244ac0d07e511630c7e70e3b445e28fec09bea3c1d36317379b3462f4aeac7ddba2d1dbe89d5fa65d7b8660df90562ec5705c789f7ea0c13fd5e891953c4179502b364ea1779bef1f2a4f577d67dbda49e1e8175f6f9a437b04f03f53226d59a5ead79ebd98d4ddd617b692c588ef12521191f6358939e8835d8b52107b437f341124be53baa3f6aa4ccd08fe66d47819a0ec099209fda99e99cafe7578aa7d09a5a5d97ba00293f6d7f34a9c2adf44d57fb115c0c0e4fcfc8e55a0985f26aa30d70b6b6c74d666b360cdd4929e75f1d2e5845866cd8908cc0da7f66389c135be763f8b4c5366d081aa541e92b46dafe48ab52474ae2e63d0aee1c377c277b9cc765fc34459373468a8c2429ddbca4f8235d19f653ac527bae64616a755767daccd2cc57dd3c81b7c572ff12a5cf889d2ef83c764c1a313cb94531c3f44ee03c0594420b33c84e66d8b5df7c71ab3d6f3bd9d34728f5795415640d6a86f82e0e26e9c5ce9cdae3932b56555517bf8013b807347d03ac17a095d38a12f26e83ff6342142741bced943a6b1b91b84ba407f37c6c7f7d5dce15e42492c7ecdae98a79cba7a5e0508a4e7821cfb3a3773451170494b5c5a7462450f8df69c7d8f807ce0449750101d8e75deedfe076b8aac090c3f9be89df024874c2b1e304330a257770c0b03e3890d6196cc8a14de9d09d572e4309ce676d4259ea7549b046b690aaa67b7824d01ea8f6afdb239fa9e47034646efe296219e220622b07ad579cadcd29ebf9631b542acdcf3564232ce5378dff4afa2763ef157602bd2e87e44d3a3c7cf11011e6240a92cc371880095918a6488a997e33b9d16e125cd5084fec62bafcaa52993f26403b23a051c8aef6efa91125e205cd4e5d4671869f40de9d3b41d6c5bd52fd11ef59fce18317545bdb042acb0b114ecfeaf3c4846f55cfe0a6ba586784f83c4fc0b9da9c6845a97f87a8fb409e9e84883a9d7b1702da791292fe90f06d431384a89fb92438f8b8fd1921ed68a1089f890dbf1310e794aeabebd3dca93568c849a714445297514cb5a5343809e15019d27a73c853202bf5ba6bf7b4c5fe09f8a6dac18d9437f6a5940e8cbc03888773a0e68d50b960160a4cf2e1eb1a354c90cd50effdab54ef0d74ca0613b058d1f4a714054c356e013688cc9b85b30f31946c09bab7ebe87561e396e58ec33cf2f7242ef8af03b43ffca6207da37dcf2df279445e933b3a92ad470fbfd4f3fdfeecbad4a59d8e15a83088c2c17668031e868513d046842b6fc97bcb347d4d12d88439cb358ac0d6d2f891606f4736ffd45fb4a8a0d241f51b933e1c808d9f907972906524c644226174b8a5706ec9dd798217b391f2d02ec25b8dcb9a320df3195bb31a7b29cb16a77cb7605c3514aa5ef533c479dba4c83238b59e68405b269237dd2ecca70c3e723ad62e70dcdde931da674a9b437cf7976046d1708b698ba54f1cf7d2a1f75b0fefad6213d531048a5f5afed46d303018c1cbddb6daa9a4154ed84212a0e1af87fa33ec3bc7c3ee9062cbc181cdee8358d2d3dffbdf8e82769ed7c5f430019c2f2bf28e3c6106e70d10a01bddd3d2a35d246ddb85eba2a73246d49aa6899be9922e5a1539abcd5618521688a4db02b1418d6816c10c7190660e9cfb168d740b10bd03b847258d5ef9fc8ecc976ca340e02b1038a9f9e0b4328e3123bafda8494508f5f9182adf39cfa0b3cc88c4180dd1576362b69650cfabc7df5e251892110d5f96cea160f060f02b4a0d175dade36b0357bb8b284125f82ee02789fd4afa9713df70f6d0c45462e1f79708681051e8f2c27e29b17a7c6eb91505c6b2455671aaf3456160f9ac9e2af7bcb0f6daf0130d09ce4f7b7739a3146c1a11e554c4dec3ac9fb95f10126c5ff6ed86643832fb3d9f672445a8130862dc3e8ad5ed1a78123dca93c1dd987a1d7999528867f841c33a7f4a3fe98d5aadf72e6b9634e8ada9174ec6a021ee370096c49752de8bf606f96028ea039f4bc0671cd5d94903e7c95a039c751ba224d31857b30176ea6df453e8460b6280561e2a867b9b20e33d864c8edb26c90ea6acd28fb7f6373af78d17b5cd0b28de258974596917dac03e5a1a24d81f996f5530dbb0a4a94301da892bca4bef72c8e42af78098d7337fdcfd64c702c1271685add680f9caf3668dd62f5ffe96603ec7f2461c5e4d8b71c5a09732edf38ef3fe866da7f797e107b1fe758d776f531307524573e57c0d826ccb6d65046326d62fd7d8e6f5b6ad87fd946215df1485a2494a8dc29492a3aa6dd16b1043022fd9ee70ad788106cd857abfe4ad56fc4c82e896144c3b4ae477e7ee264d557b4373ecb5abcc9b9bc74da97886cd297044363d0f42a8647901658529f33527ebd993011682e8e9c35da2d5bba855e22bf79241fc980c87b49da5155f828f494cf36f91f739085a4e3e7d08aa61d27a7dcefb547b46791852dfc96951a251609a6240313c1118346bc81b4ea670dc3149af007df22cf13d19b554bfdd4172f0d94e6bc572f68eec3b1714abec350dc1e3755aa5b6d0907da214396e83cf4889decf2fde7bbecfe0765a5cc929034ec93dc23abbdee592bf89a8ee6748cc17ed68cf443e525f5cd193607985c487f88d46891e040ffe61e340b0459adc0459e6a469e78441e2962aa4e48b9c2f5095c1be7f9d930375732bc75d3e2f6d05460e4fa9eaace052c542153af784f0bd75c9cdb5e78759d0bdb1f060a51156183f2c3a83b19533fcc80d9cacfda22591177ad0ffe1f6de550cbed7ddd6b413863c16c0c371b0bb95eb95eeacdf6950dfcdcf33da4e1d8825a49f8e36eb271ff928729b6c05fbea3fdecbf6ddd6d062b2cb3c643aae019858e6f27e6fb0e5a9aa0c514cecd4d39549dff3b303224912c6877e535aa58af0f8722a0d1f559af87b11348af11c0678458786b5dc0bc686399d53b2bcf4b953d428e7bb3798b6e44ddb6e63ad186a968f893b038b8277921318066030b36e35d2f73305123c76ea8c8abab45c0ecbda8ff82cd7a63e1bc93b02ef46e331dacb5d40e3b516aa2c34623d8850b17e2400ab6c0a0ccf0e3ca5fb7cb56163b03cf25338425098a7c3f256c2d9efa3e4be603fc5745e775d39736cf754b2dccdfc22f6915bb04719cf0e36d41aa9a9ed51a356d7138b5d589699c1dc386242ac07c507d035796694cd8f9d344812a7c604c855c04066dbe064aeec2398b7d1a9153d93a458cd5c6300c397dab715f73cc4838142aa4f20456b8efe8d3749df2ed06ca2d09491591982cba210d472c3eb9cc3f952c0688b2700fbcaf58e028546984df15eda667f455d68d79a38b6f3ed30cb6c0994afd6863f26c07f251e642b0a9787cca3f0584b60b80504f255ccf62565c4be334b19bd29acf84d6e300f02c49c", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/55) 17:05:34 executing program 2: r0 = msgget(0x1, 0x484) msgctl$IPC_RMID(r0, 0x0) msgget(0x0, 0x88) r1 = shmget(0x3, 0x4000, 0x800, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/116) msgget(0x1, 0x484) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget(0x0, 0x88) (async) shmget(0x3, 0x4000, 0x800, &(0x7f0000ffc000/0x4000)=nil) (async) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/116) (async) 17:05:34 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5d9bbc516) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0xff) 17:05:34 executing program 0: ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, 0x0) 17:05:34 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="736d6163066d000000001734aef8a7af4542b3d56e24a8b7c68876e0000065e26d0ea7a703d2c4cc2cce8b3665bc039bc3d2f4e01e899bde15528ba179f52f69fd5c26a9e0a15fa36bfdbb0808a18926b4e7d3b9d837ed21691520c0313aa4b54596f15500000000000000000800"/131], 0xb) 17:05:34 executing program 0: ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, 0x0) 17:05:34 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:34 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) 17:05:34 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5d9bbc516) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0xff) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5d9bbc516) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0xff) (async) 17:05:34 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/1}, 0x9, 0x1, 0x3000) r1 = msgget$private(0x0, 0x80) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/82) 17:05:34 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(r0, 0x40045701, 0x0) 17:05:34 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) (async) 17:05:34 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) 17:05:34 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5d9bbc516) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0xff) 17:05:34 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/1}, 0x9, 0x1, 0x3000) r1 = msgget$private(0x0, 0x80) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/82) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgrcv(r0, &(0x7f0000000000)={0x0, ""/1}, 0x9, 0x1, 0x3000) (async) msgget$private(0x0, 0x80) (async) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/82) (async) 17:05:34 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(r0, 0x40045701, 0x0) 17:05:34 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) (async) 17:05:34 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={@none, 0x10000}) 17:05:35 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:35 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:35 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(r0, 0x40045701, 0x0) 17:05:35 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={@none, 0x10000}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={@none, 0x10000}) (async) 17:05:35 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/1}, 0x9, 0x1, 0x3000) r1 = msgget$private(0x0, 0x80) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/82) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgrcv(r0, &(0x7f0000000000)={0x0, ""/1}, 0x9, 0x1, 0x3000) (async) msgget$private(0x0, 0x80) (async) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/82) (async) 17:05:35 executing program 2: r0 = msgget(0x3, 0x20a) msgctl$IPC_RMID(r0, 0x0) 17:05:35 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) 17:05:35 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) [ 445.814063] audit: type=1400 audit(1652807135.712:181): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24302 comm="syz-executor.4" 17:05:35 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={@none, 0x10000}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={@none, 0x10000}) (async) 17:05:35 executing program 0: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, 0x0) 17:05:35 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:35 executing program 2: r0 = msgget(0x3, 0x20a) msgctl$IPC_RMID(r0, 0x0) [ 445.888721] audit: type=1400 audit(1652807135.782:182): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24322 comm="syz-executor.4" [ 445.978508] audit: type=1400 audit(1652807135.842:183): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24332 comm="syz-executor.4" 17:05:36 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x0) request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:36 executing program 1: ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x1}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:36 executing program 0: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, 0x0) 17:05:36 executing program 2: r0 = msgget(0x3, 0x20a) msgctl$IPC_RMID(r0, 0x0) msgget(0x3, 0x20a) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:36 executing program 4: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000480)={'stack ', '!*}%-]\x00'}, 0xd) 17:05:36 executing program 0: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, 0x0) 17:05:36 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:36 executing program 2: r0 = msgget(0x0, 0x44) msgctl$IPC_RMID(r0, 0x0) 17:05:36 executing program 4: socket$l2tp6(0xa, 0x2, 0x73) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) (async) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) (async) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) (async) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) (async) write$apparmor_exec(r2, &(0x7f0000000480)={'stack ', '!*}%-]\x00'}, 0xd) 17:05:36 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:36 executing program 1: ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x1}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:36 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000480)={'stack ', '!*}%-]\x00'}, 0xd) 17:05:36 executing program 2: r0 = msgget(0x0, 0x44) msgctl$IPC_RMID(r0, 0x0) 17:05:36 executing program 1: ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:36 executing program 3: msgget(0x1, 0x646) request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:36 executing program 4: socket$l2tp6(0xa, 0x2, 0x73) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) (async) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) (async) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) (async) write$apparmor_exec(r2, &(0x7f0000000480)={'stack ', '!*}%-]\x00'}, 0xd) 17:05:36 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000480)={'stack ', '!*}%-]\x00'}, 0xd) 17:05:36 executing program 3: request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:37 executing program 2: r0 = msgget(0x0, 0x44) msgctl$IPC_RMID(r0, 0x0) msgget(0x0, 0x44) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:37 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:37 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf96) inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x2, 0x10001, 0xaa1, 0x2, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0xd}, 0x48) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x6, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x1, 0xa, 0x7, 0x8, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x20e00956}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x98, &(0x7f0000000180)=""/152, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x9}, 0x10, 0x12e57, r0, 0x0, &(0x7f00000002c0)=[r2, r1, r3, r1, r4, r1, 0x1, r5, r0, r1]}, 0x80) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) 17:05:37 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[], 0xb) 17:05:37 executing program 3: request_key(0x0, &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:37 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000480)={'stack ', '!*}%-]\x00'}, 0xd) 17:05:37 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf96) (async) inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x2, 0x10001, 0xaa1, 0x2, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0xd}, 0x48) (async) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x6, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x1, 0xa, 0x7, 0x8, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x20e00956}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x98, &(0x7f0000000180)=""/152, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x9}, 0x10, 0x12e57, r0, 0x0, &(0x7f00000002c0)=[r2, r1, r3, r1, r4, r1, 0x1, r5, r0, r1]}, 0x80) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) 17:05:37 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) 17:05:37 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[], 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r1, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[], 0xb) (async) 17:05:37 executing program 2: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 17:05:37 executing program 3: request_key(0x0, &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:37 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf96) (async) inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x2, 0x10001, 0xaa1, 0x2, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0xd}, 0x48) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r5) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x6, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x1, 0xa, 0x7, 0x8, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x20e00956}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x98, &(0x7f0000000180)=""/152, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x9}, 0x10, 0x12e57, r0, 0x0, &(0x7f00000002c0)=[r2, r1, r3, r1, r4, r1, 0x1, r5, r0, r1]}, 0x80) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) 17:05:37 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:37 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[], 0xb) 17:05:38 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 3: request_key(0x0, &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:38 executing program 2: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgget(0x0, 0x0) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:38 executing program 1: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c51cbbcb36) 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$MEDIA_REQUEST_IOC_REINIT(r1, 0x7c81, 0x0) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) 17:05:38 executing program 1: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c51cbbcb36) 17:05:38 executing program 2: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgget(0x0, 0x0) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:38 executing program 3: request_key(&(0x7f0000001680)='blacklist\x00', 0x0, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$MEDIA_REQUEST_IOC_REINIT(r1, 0x7c81, 0x0) [ 448.529161] audit: type=1400 audit(1652807138.422:184): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24458 comm="syz-executor.4" 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) 17:05:38 executing program 3: request_key(&(0x7f0000001680)='blacklist\x00', 0x0, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:38 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c043, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 17:05:38 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c043, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c043, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) 17:05:38 executing program 1: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c51cbbcb36) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:38 executing program 3: request_key(&(0x7f0000001680)='blacklist\x00', 0x0, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) [ 448.630951] audit: type=1400 audit(1652807138.522:185): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24474 comm="syz-executor.4" 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$MEDIA_REQUEST_IOC_REINIT(r1, 0x7c81, 0x0) 17:05:38 executing program 5: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 3: request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) 17:05:38 executing program 5: msgget(0x1, 0x646) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c043, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c043, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) 17:05:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm], 0x1) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000180)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_QUEUE(r3, 0x7c80, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r4) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000000c0)={0x7, 0x1, {}, {0xffffffffffffffff}, 0x8000, 0x7}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 17:05:38 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374610300208e65616d00"], 0xb) 17:05:38 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) [ 448.754856] audit: type=1400 audit(1652807138.652:186): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24497 comm="syz-executor.4" 17:05:38 executing program 2: r0 = msgget(0x2, 0x700) msgctl$IPC_RMID(r0, 0x0) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) 17:05:38 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374610300208e65616d00"], 0xb) 17:05:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) (async) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm], 0x1) (async) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000180)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_QUEUE(r3, 0x7c80, 0x0) (async) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r4) (async) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000000c0)={0x7, 0x1, {}, {0xffffffffffffffff}, 0x8000, 0x7}) (async) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) 17:05:38 executing program 5: add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 2: r0 = msgget(0x2, 0x700) msgctl$IPC_RMID(r0, 0x0) 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374610300208e65616d00"], 0xb) 17:05:38 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) 17:05:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm], 0x1) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000180)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_QUEUE(r3, 0x7c80, 0x0) (async, rerun: 64) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$team(&(0x7f0000000140), r4) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000000c0)={0x7, 0x1, {}, {0xffffffffffffffff}, 0x8000, 0x7}) (async) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 17:05:38 executing program 5: add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 2: r0 = msgget(0x2, 0x700) msgctl$IPC_RMID(r0, 0x0) msgget(0x2, 0x700) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'team\x00'}, 0xa) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) 17:05:38 executing program 3: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 5: add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:38 executing program 2: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd0, r0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x44080}, 0x400c099) 17:05:38 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) 17:05:38 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'team\x00'}, 0xa) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'team\x00'}, 0xa) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) [ 449.003375] audit: type=1400 audit(1652807138.902:187): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24562 comm="syz-executor.4" 17:05:38 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0)='THAWED\x00', 0x7) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x101, 0x1ff, {}, {0xffffffffffffffff}, 0x3, 0xe96}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x5, "4268e6390619d4cf05223a018bf357924a8dabddbf1cdb81a265d910dff63c47"}) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 2: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd0, r0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x44080}, 0x400c099) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) (async) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r1, 0x0) (async) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd0, r0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x44080}, 0x400c099) (async) 17:05:39 executing program 3: msgget(0x1, 0x646) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) [ 449.066862] audit: type=1400 audit(1652807138.922:188): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24562 comm="syz-executor.4" 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0)='THAWED\x00', 0x7) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x101, 0x1ff, {}, {0xffffffffffffffff}, 0x3, 0xe96}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x5, "4268e6390619d4cf05223a018bf357924a8dabddbf1cdb81a265d910dff63c47"}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0)='THAWED\x00', 0x7) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x101, 0x1ff, {}, {0xffffffffffffffff}, 0x3, 0xe96}) (async) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x5, "4268e6390619d4cf05223a018bf357924a8dabddbf1cdb81a265d910dff63c47"}) (async) 17:05:39 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0)='THAWED\x00', 0x7) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x101, 0x1ff, {}, {0xffffffffffffffff}, 0x3, 0xe96}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x5, "4268e6390619d4cf05223a018bf357924a8dabddbf1cdb81a265d910dff63c47"}) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'team\x00'}, 0xa) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 2: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) (async) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd0, r0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x44080}, 0x400c099) [ 449.155489] audit: type=1400 audit(1652807139.012:189): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24579 comm="syz-executor.4" 17:05:39 executing program 0: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd0, r0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x44080}, 0x400c099) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0)='THAWED\x00', 0x7) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x101, 0x1ff, {}, {0xffffffffffffffff}, 0x3, 0xe96}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x5, "4268e6390619d4cf05223a018bf357924a8dabddbf1cdb81a265d910dff63c47"}) 17:05:39 executing program 3: add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 449.218791] audit: type=1400 audit(1652807139.012:190): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24579 comm="syz-executor.4" 17:05:39 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x2, 0x7b0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) msgctl$IPC_RMID(r1, 0x0) 17:05:39 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x11000a26) 17:05:39 executing program 3: add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x2, 0x7b0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) msgctl$IPC_RMID(r1, 0x0) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget(0x2, 0x7b0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) (async) msgctl$IPC_RMID(r1, 0x0) (async) [ 449.307506] audit: type=1400 audit(1652807139.102:191): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24599 comm="syz-executor.4" 17:05:39 executing program 3: add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x11000a26) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) [ 449.378561] audit: type=1400 audit(1652807139.202:192): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=24620 comm="syz-executor.4" 17:05:39 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x2, 0x7b0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) (async) msgctl$IPC_RMID(r1, 0x0) 17:05:39 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x11000a26) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:39 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'stack ', '\x00'}, 0x7) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="177b4f182bc5e46e6e89031ff9ab5af2fa300e2ecabf5c3b5df311c538952b71b310275c893341bfe4b1c81666bfea08281abc6b6637fcacc3d6b765973c41", @ANYRES32=r0, @ANYBLOB="0002000023c9cd2f538768c1fa1f2c3ec3cbf81da11d6d3d498653d4afb2376f62e525f8122662dc0cf322f695dc4ebe82d7cbd8e42551741d86e408c1066f4d8ba7544812ae74923a67318b55be0cf7b9e99e3f4e0ffc39049dee01652edfc1a224c645572582fdedf9f4a26ad20a7ae7aa24daf7c47b74bf82be7533bf788f75830f5d2e109f10010567c12fd22495fdf7edf889a1f98f390df2c8b4eab319"], 0xb) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 17:05:39 executing program 2: ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000080)={0x0, 0xffffffc0, 0xebd, &(0x7f0000000040)=0x80}) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f00000002c0)={0x0, 0x20, 0x5, &(0x7f0000000280)=0x9}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x8, 0x8, 0x401, 0x964, 0x1, 0x100, '\x00', r1, r2, 0x4, 0x2, 0x2}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x1e}, 0x10) r4 = msgget(0x3, 0x100) msgctl$IPC_RMID(r4, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000200)=ANY=[@ANYBLOB="f8eb0000081d00000800000003000000"]) [ 449.463732] audit: type=1400 audit(1652807139.202:193): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A942F3A7D pid=24620 comm="syz-executor.4" 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59cbbcf12) 17:05:39 executing program 2: ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000080)={0x0, 0xffffffc0, 0xebd, &(0x7f0000000040)=0x80}) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) (async, rerun: 32) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) (rerun: 32) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f00000002c0)={0x0, 0x20, 0x5, &(0x7f0000000280)=0x9}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x8, 0x8, 0x401, 0x964, 0x1, 0x100, '\x00', r1, r2, 0x4, 0x2, 0x2}, 0x48) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x1e}, 0x10) r4 = msgget(0x3, 0x100) msgctl$IPC_RMID(r4, 0x0) (async, rerun: 64) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000200)=ANY=[@ANYBLOB="f8eb0000081d00000800000003000000"]) (rerun: 64) 17:05:39 executing program 0: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'stack ', '\x00'}, 0x7) (async, rerun: 32) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 32) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="177b4f182bc5e46e6e89031ff9ab5af2fa300e2ecabf5c3b5df311c538952b71b310275c893341bfe4b1c81666bfea08281abc6b6637fcacc3d6b765973c41", @ANYRES32=r0, @ANYBLOB="0002000023c9cd2f538768c1fa1f2c3ec3cbf81da11d6d3d498653d4afb2376f62e525f8122662dc0cf322f695dc4ebe82d7cbd8e42551741d86e408c1066f4d8ba7544812ae74923a67318b55be0cf7b9e99e3f4e0ffc39049dee01652edfc1a224c645572582fdedf9f4a26ad20a7ae7aa24daf7c47b74bf82be7533bf788f75830f5d2e109f10010567c12fd22495fdf7edf889a1f98f390df2c8b4eab319"], 0xb) (async, rerun: 64) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (rerun: 64) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59cbbcf12) 17:05:39 executing program 2: ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000080)={0x0, 0xffffffc0, 0xebd, &(0x7f0000000040)=0x80}) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f00000002c0)={0x0, 0x20, 0x5, &(0x7f0000000280)=0x9}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x8, 0x8, 0x401, 0x964, 0x1, 0x100, '\x00', r1, r2, 0x4, 0x2, 0x2}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x1e}, 0x10) (async) r4 = msgget(0x3, 0x100) msgctl$IPC_RMID(r4, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000200)=ANY=[@ANYBLOB="f8eb0000081d00000800000003000000"]) 17:05:39 executing program 0: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59cbbcf12) 17:05:39 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'stack ', '\x00'}, 0x7) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="177b4f182bc5e46e6e89031ff9ab5af2fa300e2ecabf5c3b5df311c538952b71b310275c893341bfe4b1c81666bfea08281abc6b6637fcacc3d6b765973c41", @ANYRES32=r0, @ANYBLOB="0002000023c9cd2f538768c1fa1f2c3ec3cbf81da11d6d3d498653d4afb2376f62e525f8122662dc0cf322f695dc4ebe82d7cbd8e42551741d86e408c1066f4d8ba7544812ae74923a67318b55be0cf7b9e99e3f4e0ffc39049dee01652edfc1a224c645572582fdedf9f4a26ad20a7ae7aa24daf7c47b74bf82be7533bf788f75830f5d2e109f10010567c12fd22495fdf7edf889a1f98f390df2c8b4eab319"], 0xb) (async) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea", 0x78, 0xfffffffffffffffe) 17:05:39 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/63) 17:05:39 executing program 0: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) syz_open_dev$dri(&(0x7f0000000100), 0x2, 0x400000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x113c02, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f0000000000)={0x0, 0x4, 0x1, 0x62000000, 0x2, 0x1, 0x0, 0x1, 0x1b, 0xfffffe00, 0xfd7, 0x74}) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="636b20e931ccfa402edc7486616d00"], 0xb) 17:05:39 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/63) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/63) (async) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) syz_open_dev$dri(&(0x7f0000000100), 0x2, 0x400000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x113c02, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f0000000000)={0x0, 0x4, 0x1, 0x62000000, 0x2, 0x1, 0x0, 0x1, 0x1b, 0xfffffe00, 0xfd7, 0x74}) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) (async) syz_open_dev$dri(&(0x7f0000000100), 0x2, 0x400000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x113c02, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f0000000000)={0x0, 0x4, 0x1, 0x62000000, 0x2, 0x1, 0x0, 0x1, 0x1b, 0xfffffe00, 0xfd7, 0x74}) 17:05:39 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/63) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="636b20e931ccfa402edc7486616d00"], 0xb) 17:05:39 executing program 0: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/63) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="636b20e931ccfa402edc7486616d00"], 0xb) 17:05:39 executing program 2: r0 = msgget(0x2, 0x39) msgctl$IPC_RMID(r0, 0x0) 17:05:39 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) prctl$PR_SET_DUMPABLE(0x4, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)="33eea6269e9af45499e05d41c700ff1c5ca9efd5f34b4b34a6ae78f64d79a34805ffaad90b6652d5a6a6a8cc0ebb51f44032158dfd7c9d17887568076172431d6dfde6", 0x43) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000040)) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea", 0x78, 0xfffffffffffffffe) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11], 0xb) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) prctl$PR_SET_DUMPABLE(0x4, 0x2) (async) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)="33eea6269e9af45499e05d41c700ff1c5ca9efd5f34b4b34a6ae78f64d79a34805ffaad90b6652d5a6a6a8cc0ebb51f44032158dfd7c9d17887568076172431d6dfde6", 0x43) (async, rerun: 64) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000040)) (rerun: 64) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67", 0x3d, 0xfffffffffffffffe) 17:05:39 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 2: r0 = msgget(0x2, 0x39) msgctl$IPC_RMID(r0, 0x0) msgget(0x2, 0x39) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:39 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11], 0xb) 17:05:39 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa", 0x2, 0xfffffffffffffffe) 17:05:39 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:39 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) prctl$PR_SET_DUMPABLE(0x4, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)="33eea6269e9af45499e05d41c700ff1c5ca9efd5f34b4b34a6ae78f64d79a34805ffaad90b6652d5a6a6a8cc0ebb51f44032158dfd7c9d17887568076172431d6dfde6", 0x43) (async) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000040)) 17:05:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11], 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11], 0xb) (async) 17:05:40 executing program 2: r0 = msgget(0x2, 0x39) msgctl$IPC_RMID(r0, 0x0) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x0, 0x250) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000080)=""/109) r2 = getegid() r3 = getpgid(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x3, 0xee00, r2, 0xffffffffffffffff, 0x0, 0x9, 0x7}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x1000, 0x800, 0x80, 0x8, 0x6, 0x0, r3}) 17:05:40 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 0: add_key(0x0, 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:40 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'st\x06\x00\x00\x00\x00\x00\x00\x00\x05J\xc3\x97Gjd$+d\xb1\xb3\x8c\xeb\f\xb8\xfc\x1d\x85>\xbcls\xee]\x84\xf1\xc37k8\xed\xf5\xb6\xd9\x10\x9e\x95\x1c\xa5}?\xd5\xa4\xd2R\xde\xc6'}, 0x3f) 17:05:40 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x0, 0x250) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000080)=""/109) r2 = getegid() r3 = getpgid(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x3, 0xee00, r2, 0xffffffffffffffff, 0x0, 0x9, 0x7}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x1000, 0x800, 0x80, 0x8, 0x6, 0x0, r3}) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget(0x0, 0x250) (async) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000080)=""/109) (async) getegid() (async) getpgid(0xffffffffffffffff) (async) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x3, 0xee00, r2, 0xffffffffffffffff, 0x0, 0x9, 0x7}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x1000, 0x800, 0x80, 0x8, 0x6, 0x0, r3}) (async) 17:05:40 executing program 0: add_key(0x0, 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:40 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'st\x06\x00\x00\x00\x00\x00\x00\x00\x05J\xc3\x97Gjd$+d\xb1\xb3\x8c\xeb\f\xb8\xfc\x1d\x85>\xbcls\xee]\x84\xf1\xc37k8\xed\xf5\xb6\xd9\x10\x9e\x95\x1c\xa5}?\xd5\xa4\xd2R\xde\xc6'}, 0x3f) 17:05:40 executing program 5: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67", 0x3d, 0xfffffffffffffffe) 17:05:40 executing program 0: add_key(0x0, 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x0, 0x250) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000080)=""/109) r2 = getegid() r3 = getpgid(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x3, 0xee00, r2, 0xffffffffffffffff, 0x0, 0x9, 0x7}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x1000, 0x800, 0x80, 0x8, 0x6, 0x0, r3}) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget(0x0, 0x250) (async) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000080)=""/109) (async) getegid() (async) getpgid(0xffffffffffffffff) (async) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x3, 0xee00, r2, 0xffffffffffffffff, 0x0, 0x9, 0x7}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x1000, 0x800, 0x80, 0x8, 0x6, 0x0, r3}) (async) 17:05:40 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'st\x06\x00\x00\x00\x00\x00\x00\x00\x05J\xc3\x97Gjd$+d\xb1\xb3\x8c\xeb\f\xb8\xfc\x1d\x85>\xbcls\xee]\x84\xf1\xc37k8\xed\xf5\xb6\xd9\x10\x9e\x95\x1c\xa5}?\xd5\xa4\xd2R\xde\xc6'}, 0x3f) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) (async) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'st\x06\x00\x00\x00\x00\x00\x00\x00\x05J\xc3\x97Gjd$+d\xb1\xb3\x8c\xeb\f\xb8\xfc\x1d\x85>\xbcls\xee]\x84\xf1\xc37k8\xed\xf5\xb6\xd9\x10\x9e\x95\x1c\xa5}?\xd5\xa4\xd2R\xde\xc6'}, 0x3f) (async) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa", 0x2, 0xfffffffffffffffe) 17:05:40 executing program 1: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x3f, 0x6, 0x400, 0x7, 0x7f, 0xd1}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/32) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/211) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x7ff, 0x1, 0x1}) msgctl$IPC_RMID(r0, 0x0) 17:05:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'st\x06\x00\x00\x00\x00\x00\x00\x00\x05J\xc3\x97Gjd$+d\xb1\xb3\x8c\xeb\f\xb8\xfc\x1d\x85>\xbcls\xee]\x84\xf1\xc37k8\xed\xf5\xb6\xd9\x10\x9e\x95\x1c\xa5}?\xd5\xa4\xd2R\xde\xc6'}, 0x3f) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '\x00\x00\x00\x00\x00'}, 0xb) prctl$PR_SET_DUMPABLE(0x4, 0x3) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:40 executing program 1: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x3f, 0x6, 0x400, 0x7, 0x7f, 0xd1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/32) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/211) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x7ff, 0x1, 0x1}) msgctl$IPC_RMID(r0, 0x0) msgget(0x3, 0x200) (async) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/32) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/211) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x7ff, 0x1, 0x1}) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'st\x06\x00\x00\x00\x00\x00\x00\x00\x05J\xc3\x97Gjd$+d\xb1\xb3\x8c\xeb\f\xb8\xfc\x1d\x85>\xbcls\xee]\x84\xf1\xc37k8\xed\xf5\xb6\xd9\x10\x9e\x95\x1c\xa5}?\xd5\xa4\xd2R\xde\xc6'}, 0x3f) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) (async, rerun: 32) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '\x00\x00\x00\x00\x00'}, 0xb) (async, rerun: 32) prctl$PR_SET_DUMPABLE(0x4, 0x3) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 17:05:40 executing program 1: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x3f, 0x6, 0x400, 0x7, 0x7f, 0xd1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', 'st\x06\x00\x00\x00\x00\x00\x00\x00\x05J\xc3\x97Gjd$+d\xb1\xb3\x8c\xeb\f\xb8\xfc\x1d\x85>\xbcls\xee]\x84\xf1\xc37k8\xed\xf5\xb6\xd9\x10\x9e\x95\x1c\xa5}?\xd5\xa4\xd2R\xde\xc6'}, 0x3f) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '\x00\x00\x00\x00\x00'}, 0xb) prctl$PR_SET_DUMPABLE(0x4, 0x3) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/32) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/211) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x7ff, 0x1, 0x1}) (async) msgctl$IPC_RMID(r0, 0x0) 17:05:40 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x2000001) 17:05:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:40 executing program 3: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa", 0x2, 0xfffffffffffffffe) 17:05:40 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x2000001) 17:05:40 executing program 2: r0 = msgget(0x0, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/78}, 0x56, 0x0, 0x800) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0xb4, 0x0, &(0x7f00000002c0)=[@free_buffer, @release={0x40046306, 0x2}, @exit_looper, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000200)={@fda={0x66646185, 0x7, 0x2, 0x16}, @fda={0x66646185, 0x4, 0x2, 0x1a}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000280)={0x0, 0x20, 0x40}}}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000000)={@flat=@handle={0x73682a85, 0x10a, 0x1}, @fda={0x66646185, 0x400000000000006, 0x1, 0x1}, @fda={0x66646185, 0x2, 0x5, 0x6}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @acquire, @register_looper], 0x4c, 0x0, &(0x7f0000000140)="124d44522cc62f27ef59cba4cb58055510980cfc894a380f2eaaf033f346e07522fa3067ddf9b42c30307b35d0c9e92f6ed851dcb5402359f19b5885d45d84eaed0cc52d3ad0be5e64532532"}) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket(0x25, 0x5, 0x1) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:40 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket(0x25, 0x5, 0x1) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) socket(0x25, 0x5, 0x1) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) 17:05:40 executing program 2: r0 = msgget(0x0, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/78}, 0x56, 0x0, 0x800) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0xb4, 0x0, &(0x7f00000002c0)=[@free_buffer, @release={0x40046306, 0x2}, @exit_looper, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000200)={@fda={0x66646185, 0x7, 0x2, 0x16}, @fda={0x66646185, 0x4, 0x2, 0x1a}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000280)={0x0, 0x20, 0x40}}}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000000)={@flat=@handle={0x73682a85, 0x10a, 0x1}, @fda={0x66646185, 0x400000000000006, 0x1, 0x1}, @fda={0x66646185, 0x2, 0x5, 0x6}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @acquire, @register_looper], 0x4c, 0x0, &(0x7f0000000140)="124d44522cc62f27ef59cba4cb58055510980cfc894a380f2eaaf033f346e07522fa3067ddf9b42c30307b35d0c9e92f6ed851dcb5402359f19b5885d45d84eaed0cc52d3ad0be5e64532532"}) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 17:05:40 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x2000001) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x2000001) (async) 17:05:40 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:40 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 2: r0 = msgget(0x0, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/78}, 0x56, 0x0, 0x800) (async) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0xb4, 0x0, &(0x7f00000002c0)=[@free_buffer, @release={0x40046306, 0x2}, @exit_looper, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000200)={@fda={0x66646185, 0x7, 0x2, 0x16}, @fda={0x66646185, 0x4, 0x2, 0x1a}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000280)={0x0, 0x20, 0x40}}}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000000)={@flat=@handle={0x73682a85, 0x10a, 0x1}, @fda={0x66646185, 0x400000000000006, 0x1, 0x1}, @fda={0x66646185, 0x2, 0x5, 0x6}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @acquire, @register_looper], 0x4c, 0x0, &(0x7f0000000140)="124d44522cc62f27ef59cba4cb58055510980cfc894a380f2eaaf033f346e07522fa3067ddf9b42c30307b35d0c9e92f6ed851dcb5402359f19b5885d45d84eaed0cc52d3ad0be5e64532532"}) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket(0x25, 0x5, 0x1) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea", 0x78, 0xfffffffffffffffe) 17:05:40 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:40 executing program 1: inotify_init1(0x80000) inotify_init1(0x80400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) inotify_add_watch(r0, 0x0, 0x2000156) 17:05:40 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) r4 = msgget(0x3, 0x200) msgctl$IPC_RMID(r4, 0x0) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="60735a999f89a95b5df7c7"], 0xb) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000100)=""/196) 17:05:40 executing program 1: inotify_init1(0x80000) inotify_init1(0x80400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) inotify_add_watch(r0, 0x0, 0x2000156) 17:05:40 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) (async) r4 = msgget(0x3, 0x200) msgctl$IPC_RMID(r4, 0x0) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 1: inotify_init1(0x80000) (async, rerun: 64) inotify_init1(0x80400) (rerun: 64) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) inotify_add_watch(r0, 0x0, 0x2000156) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) (async) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="60735a999f89a95b5df7c7"], 0xb) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000100)=""/196) 17:05:40 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) (async, rerun: 64) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) (async, rerun: 64) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) (async, rerun: 64) r4 = msgget(0x3, 0x200) (rerun: 64) msgctl$IPC_RMID(r4, 0x0) 17:05:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 1: ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@any, 0x2b88}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5bdbbce14) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67", 0x3d, 0xfffffffffffffffe) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="60735a999f89a95b5df7c7"], 0xb) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000100)=""/196) 17:05:40 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) getuid() msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x180) 17:05:40 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9fa", 0x2, 0xfffffffffffffffe) 17:05:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:40 executing program 1: ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@any, 0x2b88}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5bdbbce14) 17:05:40 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x18, 0x0, &(0x7f0000000040)=[@enter_looper, @exit_looper, @clear_death={0x400c630f, 0x1}], 0x5a, 0x0, &(0x7f0000000200)="9e3e075208dabd595bd489ece9d788e515e3a6dbbe26119fae85f645354459cd7af66415134cb9bd36108d751041cfd0e503a034c5eb8d4e8e8bbeabd4cdd25b1601351fb7fcfef3e11cbcb764688137cd425617439beeb3e586"}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgrcv(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcff00"/202], 0xd2, 0x2, 0x1800) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r3) 17:05:40 executing program 1: ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@any, 0x2b88}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5bdbbce14) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@any, 0x2b88}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5bdbbce14) (async) 17:05:40 executing program 2: r0 = msgget(0x3, 0x200) (async) getuid() msgctl$IPC_RMID(r0, 0x0) (async, rerun: 64) msgget$private(0x0, 0x180) (rerun: 64) 17:05:40 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x18, 0x0, &(0x7f0000000040)=[@enter_looper, @exit_looper, @clear_death={0x400c630f, 0x1}], 0x5a, 0x0, &(0x7f0000000200)="9e3e075208dabd595bd489ece9d788e515e3a6dbbe26119fae85f645354459cd7af66415134cb9bd36108d751041cfd0e503a034c5eb8d4e8e8bbeabd4cdd25b1601351fb7fcfef3e11cbcb764688137cd425617439beeb3e586"}) (async, rerun: 32) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (rerun: 32) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) (async) msgrcv(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcff00"/202], 0xd2, 0x2, 0x1800) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r3) 17:05:41 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:41 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:41 executing program 2: r0 = msgget(0x3, 0x200) getuid() (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget$private(0x0, 0x180) 17:05:41 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async, rerun: 32) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x18, 0x0, &(0x7f0000000040)=[@enter_looper, @exit_looper, @clear_death={0x400c630f, 0x1}], 0x5a, 0x0, &(0x7f0000000200)="9e3e075208dabd595bd489ece9d788e515e3a6dbbe26119fae85f645354459cd7af66415134cb9bd36108d751041cfd0e503a034c5eb8d4e8e8bbeabd4cdd25b1601351fb7fcfef3e11cbcb764688137cd425617439beeb3e586"}) (rerun: 32) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgrcv(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcff00"/202], 0xd2, 0x2, 0x1800) (async, rerun: 64) r3 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r3) 17:05:41 executing program 1: socket(0x25, 0x6, 0x3) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x8) 17:05:41 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:41 executing program 1: socket(0x25, 0x6, 0x3) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x8) 17:05:41 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:41 executing program 2: r0 = msgget(0x1, 0x128) msgctl$IPC_RMID(r0, 0x0) 17:05:41 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:41 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:41 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'te\xbcV.'}, 0xffffffffffffff94) 17:05:41 executing program 2: r0 = msgget(0x1, 0x128) msgctl$IPC_RMID(r0, 0x0) 17:05:41 executing program 1: socket(0x25, 0x6, 0x3) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x8) socket(0x25, 0x6, 0x3) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x8) (async) 17:05:41 executing program 0: add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000100)="c9", 0x1, 0xfffffffffffffffe) 17:05:41 executing program 4: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:41 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x1c200, 0x0) inotify_add_watch(r0, 0x0, 0xeb4e41c59dbbcf16) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) r4 = msgget(0x3, 0x200) msgctl$IPC_RMID(r4, 0x0) 17:05:41 executing program 2: r0 = msgget(0x1, 0x128) msgctl$IPC_RMID(r0, 0x0) 17:05:41 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:41 executing program 4: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) (async) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) (async) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) (async) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) (async) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x1c200, 0x0) inotify_add_watch(r0, 0x0, 0xeb4e41c59dbbcf16) 17:05:41 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) r4 = msgget(0x3, 0x200) msgctl$IPC_RMID(r4, 0x0) 17:05:41 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 17:05:41 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:41 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x1c200, 0x0) inotify_add_watch(r0, 0x0, 0xeb4e41c59dbbcf16) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x1c200, 0x0) (async) inotify_add_watch(r0, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:41 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) r4 = msgget(0x3, 0x200) msgctl$IPC_RMID(r4, 0x0) 17:05:41 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 17:05:41 executing program 4: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) (async) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) (async) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) write$apparmor_exec(r2, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) (async) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) (async) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) (async) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) (async) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) (async) 17:05:41 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:41 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:41 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xae00024d) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/40, 0x28, 0x0, &(0x7f0000000040)=""/68, 0x44}, &(0x7f0000000100)=0x40) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) msgget(0x3, 0x200) 17:05:41 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 17:05:41 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:41 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xae00024d) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/40, 0x28, 0x0, &(0x7f0000000040)=""/68, 0x44}, &(0x7f0000000100)=0x40) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[r3, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:41 executing program 2: r0 = msgget(0x3, 0x200) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x1, 0x0, {0xffffffffffffffff}, {0xee01}, 0xbafe, 0x8}) r2 = getegid() shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x1, r1, r2, 0xee01, 0xee00, 0x1, 0x1}, 0x2, 0x3, 0x4, 0x4, 0x0, 0x0, 0x6}) msgctl$IPC_RMID(r0, 0x0) 17:05:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)=0x2) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'teLm\x00'}, 0xb) 17:05:41 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xae00024d) (async, rerun: 64) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/40, 0x28, 0x0, &(0x7f0000000040)=""/68, 0x44}, &(0x7f0000000100)=0x40) (rerun: 64) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, r1, 0x0, 0x0, 0x0, r2, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 2: r0 = msgget(0x3, 0x200) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x1, 0x0, {0xffffffffffffffff}, {0xee01}, 0xbafe, 0x8}) r2 = getegid() shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x1, r1, r2, 0xee01, 0xee00, 0x1, 0x1}, 0x2, 0x3, 0x4, 0x4, 0x0, 0x0, 0x6}) msgctl$IPC_RMID(r0, 0x0) msgget(0x3, 0x200) (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x1, 0x0, {0xffffffffffffffff}, {0xee01}, 0xbafe, 0x8}) (async) getegid() (async) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x1, r1, r2, 0xee01, 0xee00, 0x1, 0x1}, 0x2, 0x3, 0x4, 0x4, 0x0, 0x0, 0x6}) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:41 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)=0x2) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'teLm\x00'}, 0xb) 17:05:41 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000876) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) 17:05:41 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 2: r0 = msgget(0x3, 0x200) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x1, 0x0, {0xffffffffffffffff}, {0xee01}, 0xbafe, 0x8}) r2 = getegid() shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x1, r1, r2, 0xee01, 0xee00, 0x1, 0x1}, 0x2, 0x3, 0x4, 0x4, 0x0, 0x0, 0x6}) msgctl$IPC_RMID(r0, 0x0) msgget(0x3, 0x200) (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x1, 0x0, {0xffffffffffffffff}, {0xee01}, 0xbafe, 0x8}) (async) getegid() (async) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x1, r1, r2, 0xee01, 0xee00, 0x1, 0x1}, 0x2, 0x3, 0x4, 0x4, 0x0, 0x0, 0x6}) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:41 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)=0x2) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'teLm\x00'}, 0xb) 17:05:41 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000876) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) 17:05:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000876) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000876) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) (async) 17:05:41 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) socket$nl_generic(0x10, 0x3, 0x10) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 2: r0 = msgget(0x3, 0x208) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) msgget(0x1, 0xc) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0x9) 17:05:41 executing program 0: ioctl$DRM_IOCTL_SYNCOBJ_QUERY(0xffffffffffffffff, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', 'team\x00'}, 0xb) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:41 executing program 2: r0 = msgget(0x3, 0x208) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) msgget(0x1, 0xc) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0x9) 17:05:41 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r4) 17:05:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x59c}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @generic={0x8, 0x0, 0x2, 0x1f6c, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x5, 0x80, 0xa241}, 0x10, 0xfd2e}, 0x80) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0xb}, 0x10) 17:05:41 executing program 0: ioctl$DRM_IOCTL_SYNCOBJ_QUERY(0xffffffffffffffff, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', 'team\x00'}, 0xb) (async, rerun: 64) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) (rerun: 64) 17:05:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x59c}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @generic={0x8, 0x0, 0x2, 0x1f6c, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x5, 0x80, 0xa241}, 0x10, 0xfd2e}, 0x80) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0xb}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x59c}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @generic={0x8, 0x0, 0x2, 0x1f6c, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x5, 0x80, 0xa241}, 0x10, 0xfd2e}, 0x80) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0xb}, 0x10) (async) 17:05:41 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:41 executing program 2: r0 = msgget(0x3, 0x208) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) msgget(0x1, 0xc) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0x9) msgget(0x3, 0x208) (async) msgctl$IPC_RMID(r0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) msgget(0x1, 0xc) (async) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0x9) (async) 17:05:41 executing program 0: ioctl$DRM_IOCTL_SYNCOBJ_QUERY(0xffffffffffffffff, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:41 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) socket$nl_generic(0x10, 0x3, 0x10) 17:05:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', 'team\x00'}, 0xb) (async) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x59c}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @generic={0x8, 0x0, 0x2, 0x1f6c, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x5, 0x80, 0xa241}, 0x10, 0xfd2e}, 0x80) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0xb}, 0x10) 17:05:41 executing program 2: r0 = msgget(0x3, 0x391) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/108) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/26) 17:05:41 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:41 executing program 0: r0 = syz_open_dev$dri(0x0, 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) 17:05:42 executing program 2: r0 = msgget(0x3, 0x391) msgctl$IPC_RMID(r0, 0x0) (async) r1 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/108) (async) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/26) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x1000183) 17:05:42 executing program 0: r0 = syz_open_dev$dri(0x0, 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) 17:05:42 executing program 0: r0 = syz_open_dev$dri(0x0, 0x0, 0x140) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 2: r0 = msgget(0x3, 0x391) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/108) (async, rerun: 32) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/26) (rerun: 32) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x1000183) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="11e2c2eef5a3fd3e309000"], 0xb) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '-\xc2&:-]\xc3,\x00'}, 0xe) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x80000000, 0x4, 0x800, 0x1, 0xffffffffffff524c, 0x3], 0x2, 0xce2992af788ff02e}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)=0xa) socketpair(0x9, 0x1, 0x3, &(0x7f0000000180)) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '-\xc2&:-]\xc3,\x00'}, 0xe) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x6) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x1000183) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r3) 17:05:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="11e2c2eef5a3fd3e309000"], 0xb) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '-\xc2&:-]\xc3,\x00'}, 0xe) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) (async) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x80000000, 0x4, 0x800, 0x1, 0xffffffffffff524c, 0x3], 0x2, 0xce2992af788ff02e}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)=0xa) (async) socketpair(0x9, 0x1, 0x3, &(0x7f0000000180)) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '-\xc2&:-]\xc3,\x00'}, 0xe) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x6) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) 17:05:42 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(0xffffffffffffffff, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r3) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) 17:05:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x9, 0x7f, 0x0, 0x320, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2, 0xd}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x1, 0x9, 0x10000, 0x56, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x8, 0x2, 0x5}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast1}, &(0x7f00000002c0)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x2a0, r2, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x691f}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x0, 0x3, 0x1f, 0x69e3}]}}}]}}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x4000}, 0x20040851) r7 = msgget(0x3, 0x200) shmget(0x1, 0x2000, 0x800, &(0x7f0000ffd000/0x2000)=nil) r8 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r8, 0x0) msgctl$IPC_RMID(r7, 0x0) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="11e2c2eef5a3fd3e309000"], 0xb) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '-\xc2&:-]\xc3,\x00'}, 0xe) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) (async) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x80000000, 0x4, 0x800, 0x1, 0xffffffffffff524c, 0x3], 0x2, 0xce2992af788ff02e}) (async, rerun: 64) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)=0xa) (rerun: 64) socketpair(0x9, 0x1, 0x3, &(0x7f0000000180)) (async, rerun: 32) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '-\xc2&:-]\xc3,\x00'}, 0xe) (async, rerun: 32) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x6) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:42 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(0xffffffffffffffff, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r3) 17:05:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x9, 0x7f, 0x0, 0x320, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2, 0xd}, 0x48) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x1, 0x9, 0x10000, 0x56, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x8, 0x2, 0x5}}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast1}, &(0x7f00000002c0)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x2a0, r2, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x691f}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x0, 0x3, 0x1f, 0x69e3}]}}}]}}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x4000}, 0x20040851) (async) r7 = msgget(0x3, 0x200) (async) shmget(0x1, 0x2000, 0x800, &(0x7f0000ffd000/0x2000)=nil) r8 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r8, 0x0) (async) msgctl$IPC_RMID(r7, 0x0) 17:05:42 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(0xffffffffffffffff, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'tea\xed\x12\xdc\xa6\xf3{c\x87a\xf1m\x00'}, 0x14) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x82000048) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x800, 0x5, &(0x7f0000000080)=0x33e9}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0xec4, 0x3ff, 0x101, 0xc10, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x9, 0x7f, 0x0, 0x320, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2, 0xd}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async, rerun: 32) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x1, 0x9, 0x10000, 0x56, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x8, 0x2, 0x5}}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast1}, &(0x7f00000002c0)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x2a0, r2, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x691f}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x0, 0x3, 0x1f, 0x69e3}]}}}]}}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x4000}, 0x20040851) (async, rerun: 64) r7 = msgget(0x3, 0x200) (async, rerun: 64) shmget(0x1, 0x2000, 0x800, &(0x7f0000ffd000/0x2000)=nil) r8 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r8, 0x0) (async) msgctl$IPC_RMID(r7, 0x0) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r3) 17:05:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, 0x0) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x82000048) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x800, 0x5, &(0x7f0000000080)=0x33e9}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0xec4, 0x3ff, 0x101, 0xc10, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) inotify_add_watch(0xffffffffffffffff, 0x0, 0x82000048) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x800, 0x5, &(0x7f0000000080)=0x33e9}) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) (async) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0xec4, 0x3ff, 0x101, 0xc10, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) (async) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r2) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r2) 17:05:42 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'tea\xed\x12\xdc\xa6\xf3{c\x87a\xf1m\x00'}, 0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'tea\xed\x12\xdc\xa6\xf3{c\x87a\xf1m\x00'}, 0x14) (async) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r1) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r2) 17:05:42 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:42 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/249) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x82000048) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x800, 0x5, &(0x7f0000000080)=0x33e9}) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0xec4, 0x3ff, 0x101, 0xc10, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) (rerun: 32) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'tea\xed\x12\xdc\xa6\xf3{c\x87a\xf1m\x00'}, 0x14) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r1) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r2) 17:05:42 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r2) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r2) 17:05:42 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/249) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:42 executing program 1: getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r1) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r2) 17:05:42 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/249) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/249) (async) 17:05:42 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r3) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:42 executing program 1: getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r1) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r2) 17:05:42 executing program 2: r0 = msgget(0x2, 0x0) msgsnd(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x1008, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_RMID(r0, 0x0) 17:05:42 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(0xffffffffffffffff, 0xc01864cb, &(0x7f0000000180)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x1, 0x6, 0x4106, 0x9, 0x4], 0x7, 0x1}) 17:05:42 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 1: getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) 17:05:42 executing program 2: r0 = msgget(0x2, 0x0) msgsnd(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x1008, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_RMID(r0, 0x0) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:42 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', '\x00\x00\x00\x00\x00'}, 0xb) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbce56) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:42 executing program 2: r0 = msgget(0x2, 0x0) msgsnd(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x1008, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_RMID(r0, 0x0) msgget(0x2, 0x0) (async) msgsnd(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x1008, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:42 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', '\x00\x00\x00\x00\x00'}, 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', '\x00\x00\x00\x00\x00'}, 0xb) (async) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:42 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbce56) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbce56) (async) 17:05:42 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:42 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) 17:05:42 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:42 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', '\x00\x00\x00\x00\x00'}, 0xb) 17:05:42 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbce56) 17:05:42 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:42 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:43 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) inotify_rm_watch(r0, 0x0) 17:05:43 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'team\x00'}, 0xa) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) inotify_rm_watch(r0, 0x0) 17:05:43 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) 17:05:43 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'team\x00'}, 0xa) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'team\x00'}, 0xa) (async) 17:05:43 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) inotify_rm_watch(r0, 0x0) 17:05:43 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r1, 0x36}, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x8000, 0x2, 0x80, 0x100, '\x00', '\x00', '\x00', 0x5c, 0x100, 0x8, 0x0, "f288a5e857d37e50b6e15cd120c74e0a"}) r2 = msgget(0x3, 0x200) msgctl$IPC_RMID(r2, 0x0) r3 = msgget(0x0, 0x0) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000180)=""/120) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x100) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 17:05:43 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'team\x00'}, 0xa) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:43 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r1, 0x36}, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x8000, 0x2, 0x80, 0x100, '\x00', '\x00', '\x00', 0x5c, 0x100, 0x8, 0x0, "f288a5e857d37e50b6e15cd120c74e0a"}) r2 = msgget(0x3, 0x200) msgctl$IPC_RMID(r2, 0x0) r3 = msgget(0x0, 0x0) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000180)=""/120) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r1, 0x36}, 0x10) (async) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x8000, 0x2, 0x80, 0x100, '\x00', '\x00', '\x00', 0x5c, 0x100, 0x8, 0x0, "f288a5e857d37e50b6e15cd120c74e0a"}) (async) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r2, 0x0) (async) msgget(0x0, 0x0) (async) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000180)=""/120) (async) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x100) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x100) (async) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) (async) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x0, 0x0}, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x8, 0x5, 0x7, 0x1, 0x20, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x48) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r6) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x9, 0x1}, 0x10, r1, 0x0, 0x0, &(0x7f0000000240)=[r2, r3, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, r6, r7]}, 0x80) 17:05:43 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x100) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x100) (async) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) (async) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x0, 0x0}, 0x4) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r3) (async) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r4) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x8, 0x5, 0x7, 0x1, 0x20, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x48) (rerun: 64) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r6) (async, rerun: 32) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x9, 0x1}, 0x10, r1, 0x0, 0x0, &(0x7f0000000240)=[r2, r3, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, r6, r7]}, 0x80) 17:05:43 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r1, 0x36}, 0x10) (async) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x8000, 0x2, 0x80, 0x100, '\x00', '\x00', '\x00', 0x5c, 0x100, 0x8, 0x0, "f288a5e857d37e50b6e15cd120c74e0a"}) (async, rerun: 32) r2 = msgget(0x3, 0x200) (rerun: 32) msgctl$IPC_RMID(r2, 0x0) (async) r3 = msgget(0x0, 0x0) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000180)=""/120) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "2978476956df6c6e", "31bf5af72dffa0ff95e54f19b27d54257ffcc480d4e3349024a7d15a6d1285ee", "327e0f1d", "a4afb3e7dc3a25db"}, 0x38) 17:05:43 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x0, 0x0}, 0x4) (async, rerun: 64) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r3) (async, rerun: 64) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$team(&(0x7f0000000140), r4) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x8, 0x5, 0x7, 0x1, 0x20, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x48) (async) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r6) (async) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x9, 0x1}, 0x10, r1, 0x0, 0x0, &(0x7f0000000240)=[r2, r3, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, r6, r7]}, 0x80) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "2978476956df6c6e", "31bf5af72dffa0ff95e54f19b27d54257ffcc480d4e3349024a7d15a6d1285ee", "327e0f1d", "a4afb3e7dc3a25db"}, 0x38) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "2978476956df6c6e", "31bf5af72dffa0ff95e54f19b27d54257ffcc480d4e3349024a7d15a6d1285ee", "327e0f1d", "a4afb3e7dc3a25db"}, 0x38) (async) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 2: setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=0x5, 0x4) r0 = msgget(0x3, 0x280) msgctl$IPC_RMID(r0, 0x0) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:43 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "2978476956df6c6e", "31bf5af72dffa0ff95e54f19b27d54257ffcc480d4e3349024a7d15a6d1285ee", "327e0f1d", "a4afb3e7dc3a25db"}, 0x38) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "2978476956df6c6e", "31bf5af72dffa0ff95e54f19b27d54257ffcc480d4e3349024a7d15a6d1285ee", "327e0f1d", "a4afb3e7dc3a25db"}, 0x38) (async) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 2: setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=0x5, 0x4) r0 = msgget(0x3, 0x280) msgctl$IPC_RMID(r0, 0x0) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xdb3c, 0x8}, 0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @broadcast}, &(0x7f0000000240)=0xc) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540), 0x700602, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000680), 0x80, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000006c0)={r1}, 0x8) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000580)=""/254) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x2a6326ba3575fd59, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="180000003000000000000000ff00000085200000030000008136ff7f06000000852000000300000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x91, &(0x7f0000000140)=""/145, 0x41000, 0x18, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xd, 0x2, 0x4}, 0x10}, 0x80) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xdb3c, 0x8}, 0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @broadcast}, &(0x7f0000000240)=0xc) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540), 0x700602, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000680), 0x80, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000006c0)={r1}, 0x8) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000580)=""/254) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x2a6326ba3575fd59, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="180000003000000000000000ff00000085200000030000008136ff7f06000000852000000300000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x91, &(0x7f0000000140)=""/145, 0x41000, 0x18, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xd, 0x2, 0x4}, 0x10}, 0x80) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) [ 453.621375] kauditd_printk_skb: 107 callbacks suppressed [ 453.621382] audit: type=1400 audit(1652807143.512:301): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=25675 comm="syz-executor.4" 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x8000, 0x4, &(0x7f0000000000)=0x8}) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 2: setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=0x5, 0x4) (async) r0 = msgget(0x3, 0x280) msgctl$IPC_RMID(r0, 0x0) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(0x0, &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xdb3c, 0x8}, 0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @broadcast}, &(0x7f0000000240)=0xc) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540), 0x700602, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000680), 0x80, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000006c0)={r1}, 0x8) (async) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000580)=""/254) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x2a6326ba3575fd59, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="180000003000000000000000ff00000085200000030000008136ff7f06000000852000000300000018200000", @ANYRES32=r1, @ANYBLOB="00000000ff0000950000000000187f0b387cd5857ef1947d0c985c23f303de00650d1d23a504f359917dc09b789c48b1917c1f2b1cb2cb77da5cb42891f8449f483ed41daa57f3648f6a300430b732698f014c1707eda05885055bb8ecb3c71b94ed502e3dfaf1775e4e234e9ef520276b8ee8b73542ac4c45f714891f89f833895a1175f8124bbe7b734b115d85aa155a962b862e6f056ef9be8121c2b1f92247f5276ef7810903dd26cf31d2a907d73f200a387954aea5475dd5f5027500243e20d7622beb91c75b0b945f0d61c0f00d1a77ca6cd341d3db65797bc9a44fca364eb8f9c3a535eb505511d8f5af9f284e6a4f873c5bca088f5d8908139e007ee6d9ce14294b92cda96737bdad69bb65b0c27398184404358b70fbd7d13412d92a7fcdec6b12bee12f8615e368ebf9ff91da8d18151ad5c8bdd47609151e21627f1491ec9750df55bcd172a465e10a4fe33172500611371ebc7411468b4451ba7b"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x91, &(0x7f0000000140)=""/145, 0x41000, 0x18, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xd, 0x2, 0x4}, 0x10}, 0x80) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x8000, 0x4, &(0x7f0000000000)=0x8}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x8000, 0x4, &(0x7f0000000000)=0x8}) (async) 17:05:43 executing program 2: r0 = shmget(0x3, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/42) r1 = msgget(0x3, 0x200) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)) msgctl$IPC_RMID(r1, 0x0) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(0x0, &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(0x0, &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x8000, 0x4, &(0x7f0000000000)=0x8}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x8000, 0x4, &(0x7f0000000000)=0x8}) (async) 17:05:43 executing program 2: r0 = shmget(0x3, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/42) (async) r1 = msgget(0x3, 0x200) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)) (async) msgctl$IPC_RMID(r1, 0x0) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), 0x0, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x54, 0x401, 0x137, {0x6, 0x8001}, {0x3, 0x5}, @ramp={0x40, 0x3f, {0x3, 0x1f, 0x2, 0x8}}}) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x5, 0x0, 0xfe6, 0x6, 0x8f1, 0x1}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000000) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 2: r0 = shmget(0x3, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/42) (async) r1 = msgget(0x3, 0x200) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)) (async) msgctl$IPC_RMID(r1, 0x0) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), 0x0, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x54, 0x401, 0x137, {0x6, 0x8001}, {0x3, 0x5}, @ramp={0x40, 0x3f, {0x3, 0x1f, 0x2, 0x8}}}) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x5, 0x0, 0xfe6, 0x6, 0x8f1, 0x1}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (async) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x54, 0x401, 0x137, {0x6, 0x8001}, {0x3, 0x5}, @ramp={0x40, 0x3f, {0x3, 0x1f, 0x2, 0x8}}}) (async) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x5, 0x0, 0xfe6, 0x6, 0x8f1, 0x1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000000) (async) 17:05:43 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), 0x0, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:43 executing program 2: r0 = msgget(0x0, 0x328) msgctl$IPC_RMID(r0, 0x0) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb) (async) 17:05:43 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x54, 0x401, 0x137, {0x6, 0x8001}, {0x3, 0x5}, @ramp={0x40, 0x3f, {0x3, 0x1f, 0x2, 0x8}}}) (async) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x5, 0x0, 0xfe6, 0x6, 0x8f1, 0x1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000000) 17:05:43 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x180) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:43 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r0) 17:05:43 executing program 2: r0 = msgget(0x0, 0x328) msgctl$IPC_RMID(r0, 0x0) 17:05:43 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:43 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4) 17:05:43 executing program 2: r0 = msgget(0x0, 0x328) msgctl$IPC_RMID(r0, 0x0) msgget(0x0, 0x328) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:44 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4) (async) 17:05:44 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget(0x2, 0x4) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000001000)=""/78) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/4096) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x180) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r0) [ 454.117126] audit: type=1400 audit(1652807144.012:302): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=25782 comm="syz-executor.4" 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x180) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0x180) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r0) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget(0x2, 0x4) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000001000)=""/78) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/4096) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) [ 454.213132] audit: type=1400 audit(1652807144.082:303): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=25806 comm="syz-executor.4" 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='stack tea\t\x00'], 0xb) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:44 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) inotify_init1(0x81000) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='stack tea\t\x00'], 0xb) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget(0x2, 0x4) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000001000)=""/78) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/4096) [ 454.313150] audit: type=1400 audit(1652807144.152:304): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=25822 comm="syz-executor.4" 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) inotify_init1(0x81000) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='stack tea\t\x00'], 0xb) (async) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 17:05:44 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) inotify_init1(0x81000) (async) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f0000000040)='syzkaller\x00', 0xbb7, 0x2e, &(0x7f00000000c0)=""/46, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xe, 0x2, 0xa40000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 17:05:44 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000000)={0xa, 0x1, 0x4, 0x4c, 'syz0\x00', 0x5}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032cbd7000fddbdf250700000008000b000200000005000000000000050013000600000006000e000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4004) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @local}, &(0x7f0000000240)=0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x29, 0x1f, 0x4, 0xdbb, 0xc06478f4f3d2db8a, @empty, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x8, 0x8000, 0x8001, 0x67a}}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000440)={0x4d4, r2, 0x20, 0x70bd2b, 0x25dfdbff, {}, [{{0x8}, {0x27c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x12}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x17ee, 0x81, 0x0, 0x1}, {0x5, 0x5, 0x8f, 0x3}, {0x8, 0x80, 0x62, 0x19}, {0xbd, 0x7b, 0x8, 0x400}, {0x7f, 0x1, 0x80, 0xffffff7f}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb1}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xdd}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x23b}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r6}}}]}}]}, 0x4d4}, 0x1, 0x0, 0x0, 0xa0}, 0x0) 17:05:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) r0 = msgget(0x3, 0x27b) msgctl$IPC_RMID(r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', r1) [ 454.439316] audit: type=1400 audit(1652807144.162:305): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=25822 comm="syz-executor.4" 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000000)={0xa, 0x1, 0x4, 0x4c, 'syz0\x00', 0x5}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032cbd7000fddbdf250700000008000b000200000005000000000000050013000600000006000e000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4004) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @local}, &(0x7f0000000240)=0xc) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x29, 0x1f, 0x4, 0xdbb, 0xc06478f4f3d2db8a, @empty, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x8, 0x8000, 0x8001, 0x67a}}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000440)={0x4d4, r2, 0x20, 0x70bd2b, 0x25dfdbff, {}, [{{0x8}, {0x27c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x12}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x17ee, 0x81, 0x0, 0x1}, {0x5, 0x5, 0x8f, 0x3}, {0x8, 0x80, 0x62, 0x19}, {0xbd, 0x7b, 0x8, 0x400}, {0x7f, 0x1, 0x80, 0xffffff7f}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb1}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xdd}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x23b}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r6}}}]}}]}, 0x4d4}, 0x1, 0x0, 0x0, 0xa0}, 0x0) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', r1) 17:05:44 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f0000000040)='syzkaller\x00', 0xbb7, 0x2e, &(0x7f00000000c0)=""/46, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xe, 0x2, 0xa40000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f0000000040)='syzkaller\x00', 0xbb7, 0x2e, &(0x7f00000000c0)=""/46, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xe, 0x2, 0xa40000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) (async) 17:05:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) r0 = msgget(0x3, 0x27b) msgctl$IPC_RMID(r0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', r1) [ 454.550644] audit: type=1400 audit(1652807144.222:306): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="tea" pid=25836 comm="syz-executor.4" 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) [ 454.588061] audit: type=1400 audit(1652807144.272:307): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="tea" pid=25849 comm="syz-executor.4" 17:05:44 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000000)={0xa, 0x1, 0x4, 0x4c, 'syz0\x00', 0x5}) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032cbd7000fddbdf250700000008000b000200000005000000000000050013000600000006000e000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4004) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @local}, &(0x7f0000000240)=0xc) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x29, 0x1f, 0x4, 0xdbb, 0xc06478f4f3d2db8a, @empty, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x8, 0x8000, 0x8001, 0x67a}}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000440)={0x4d4, r2, 0x20, 0x70bd2b, 0x25dfdbff, {}, [{{0x8}, {0x27c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x12}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x17ee, 0x81, 0x0, 0x1}, {0x5, 0x5, 0x8f, 0x3}, {0x8, 0x80, 0x62, 0x19}, {0xbd, 0x7b, 0x8, 0x400}, {0x7f, 0x1, 0x80, 0xffffff7f}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb1}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xdd}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x23b}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r6}}}]}}]}, 0x4d4}, 0x1, 0x0, 0x0, 0xa0}, 0x0) 17:05:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) (async) r0 = msgget(0x3, 0x27b) msgctl$IPC_RMID(r0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="2b9b43c1a4fefd937def1afb5159272a44663f8c581108e5ecdbc4e86bf3687da9eb271e0233a7643b4ef55ce9c33d5fffe1ef43e2fff99335", &(0x7f0000000040)=@udp6=r0, 0x4}, 0x20) syz_open_dev$dri(&(0x7f00000000c0), 0xffffffffffffffe1, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, r1) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) [ 454.633253] audit: type=1400 audit(1652807144.352:308): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="tea" pid=25864 comm="syz-executor.4" 17:05:44 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f0000000040)='syzkaller\x00', 0xbb7, 0x2e, &(0x7f00000000c0)=""/46, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xe, 0x2, 0xa40000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f0000000040)='syzkaller\x00', 0xbb7, 0x2e, &(0x7f00000000c0)=""/46, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xe, 0x2, 0xa40000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) (async) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgsnd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300000000000000922b50d0561e23231613d5d94064cbe1e72393bead6c24c6768d41fddd683ceca525bdd90d2b3cc46103f1ad0f5c1f58a0657de7f4719456c4a890f42fca07988ce7d9226db6eaaaeda8b2d8382e34d3078e4961052e8fd16d2c8e01cdafd044f39cc9836b5a13b1d561993d8e52dc16e13c63d7b75d4b14bf2b412bcf19d3a565160a96f99d6583850c9ec67316ce2cd4abfc406a84b7a7147c0938aaf1ff36bf07287ed2f35a21fbb60987f0effef2204a4f4ff002740000000000000000e161de93b1929ab7f0c5c00206782a14f5f9b9"], 0x7f, 0x800) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f0000000000)=""/190) 17:05:44 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="2b9b43c1a4fefd937def1afb5159272a44663f8c581108e5ecdbc4e86bf3687da9eb271e0233a7643b4ef55ce9c33d5fffe1ef43e2fff99335", &(0x7f0000000040)=@udp6=r0, 0x4}, 0x20) syz_open_dev$dri(&(0x7f00000000c0), 0xffffffffffffffe1, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="2b9b43c1a4fefd937def1afb5159272a44663f8c581108e5ecdbc4e86bf3687da9eb271e0233a7643b4ef55ce9c33d5fffe1ef43e2fff99335", &(0x7f0000000040)=@udp6=r0, 0x4}, 0x20) (async) syz_open_dev$dri(&(0x7f00000000c0), 0xffffffffffffffe1, 0x0) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000680)=ANY=[@ANYRES16=r0, @ANYRES64=r2, @ANYRESOCT=r3, @ANYRES64=r1, @ANYRESHEX=r1, @ANYBLOB="fdad89d0a322b866e6e73a97574c055b7fd03bb4c46c15971622e6f038146327aef706e9af84c3307471890fa2fbf56b483beb91b1b9c527ed06fbcab9cc8e6ff49fcb1664f27e92f1e9fdcef44b12a7a5f46ed2b51f05bbf13c8c09219242ce1bfa6308c639f857101f92bb4bcdc0f9c1c09102553b6fd2eb73a41483b4cf75bbfd5e4537b43772f1bdf716aa40af67f118a05630736dc0a05cedeea6f09e0fc37f5d501cfbea5dc5b5f33f1c160ccfe0d63f878fc745eceb98f1300ec19785f76c14e042258c3c62ea33c3353f3ef35e35", @ANYRESOCT=r3, @ANYBLOB="00cab1dc00c45a5857a5f440beeaeffcc9fbca4df4853f59d14ed95b1f3cd14b17c55a2d385131cc2e71bb2cdc5946b2aff046aa574fc3a898d878574ae04ec5509f5a85245b9b668964fc1bd242388aeb44f999efa2d193b6358ff284986c925b34d59e8f274189fb546c178f90215fe5e3b9713c779bca3eb350acdd8b2bb9092593d3a9fbc71b68cd751b6b2e6c5f"], 0x21) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) write$apparmor_exec(r4, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="65786503205465616d00"], 0xa) socket$nl_generic(0x10, 0x3, 0x10) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgsnd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300000000000000922b50d0561e23231613d5d94064cbe1e72393bead6c24c6768d41fddd683ceca525bdd90d2b3cc46103f1ad0f5c1f58a0657de7f4719456c4a890f42fca07988ce7d9226db6eaaaeda8b2d8382e34d3078e4961052e8fd16d2c8e01cdafd044f39cc9836b5a13b1d561993d8e52dc16e13c63d7b75d4b14bf2b412bcf19d3a565160a96f99d6583850c9ec67316ce2cd4abfc406a84b7a7147c0938aaf1ff36bf07287ed2f35a21fbb60987f0effef2204a4f4ff002740000000000000000e161de93b1929ab7f0c5c00206782a14f5f9b9"], 0x7f, 0x800) (async) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f0000000000)=""/190) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="2b9b43c1a4fefd937def1afb5159272a44663f8c581108e5ecdbc4e86bf3687da9eb271e0233a7643b4ef55ce9c33d5fffe1ef43e2fff99335", &(0x7f0000000040)=@udp6=r0, 0x4}, 0x20) syz_open_dev$dri(&(0x7f00000000c0), 0xffffffffffffffe1, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="2b9b43c1a4fefd937def1afb5159272a44663f8c581108e5ecdbc4e86bf3687da9eb271e0233a7643b4ef55ce9c33d5fffe1ef43e2fff99335", &(0x7f0000000040)=@udp6=r0, 0x4}, 0x20) (async) syz_open_dev$dri(&(0x7f00000000c0), 0xffffffffffffffe1, 0x0) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) (async) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000680)=ANY=[@ANYRES16=r0, @ANYRES64=r2, @ANYRESOCT=r3, @ANYRES64=r1, @ANYRESHEX=r1, @ANYBLOB="fdad89d0a322b866e6e73a97574c055b7fd03bb4c46c15971622e6f038146327aef706e9af84c3307471890fa2fbf56b483beb91b1b9c527ed06fbcab9cc8e6ff49fcb1664f27e92f1e9fdcef44b12a7a5f46ed2b51f05bbf13c8c09219242ce1bfa6308c639f857101f92bb4bcdc0f9c1c09102553b6fd2eb73a41483b4cf75bbfd5e4537b43772f1bdf716aa40af67f118a05630736dc0a05cedeea6f09e0fc37f5d501cfbea5dc5b5f33f1c160ccfe0d63f878fc745eceb98f1300ec19785f76c14e042258c3c62ea33c3353f3ef35e35", @ANYRESOCT=r3, @ANYBLOB="00cab1dc00c45a5857a5f440beeaeffcc9fbca4df4853f59d14ed95b1f3cd14b17c55a2d385131cc2e71bb2cdc5946b2aff046aa574fc3a898d878574ae04ec5509f5a85245b9b668964fc1bd242388aeb44f999efa2d193b6358ff284986c925b34d59e8f274189fb546c178f90215fe5e3b9713c779bca3eb350acdd8b2bb9092593d3a9fbc71b68cd751b6b2e6c5f"], 0x21) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) write$apparmor_exec(r4, 0x0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="65786503205465616d00"], 0xa) socket$nl_generic(0x10, 0x3, 0x10) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgsnd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300000000000000922b50d0561e23231613d5d94064cbe1e72393bead6c24c6768d41fddd683ceca525bdd90d2b3cc46103f1ad0f5c1f58a0657de7f4719456c4a890f42fca07988ce7d9226db6eaaaeda8b2d8382e34d3078e4961052e8fd16d2c8e01cdafd044f39cc9836b5a13b1d561993d8e52dc16e13c63d7b75d4b14bf2b412bcf19d3a565160a96f99d6583850c9ec67316ce2cd4abfc406a84b7a7147c0938aaf1ff36bf07287ed2f35a21fbb60987f0effef2204a4f4ff002740000000000000000e161de93b1929ab7f0c5c00206782a14f5f9b9"], 0x7f, 0x800) (async) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f0000000000)=""/190) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 1: socketpair(0x6, 0x80000, 0x800, &(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000680)=ANY=[@ANYRES16=r0, @ANYRES64=r2, @ANYRESOCT=r3, @ANYRES64=r1, @ANYRESHEX=r1, @ANYBLOB="fdad89d0a322b866e6e73a97574c055b7fd03bb4c46c15971622e6f038146327aef706e9af84c3307471890fa2fbf56b483beb91b1b9c527ed06fbcab9cc8e6ff49fcb1664f27e92f1e9fdcef44b12a7a5f46ed2b51f05bbf13c8c09219242ce1bfa6308c639f857101f92bb4bcdc0f9c1c09102553b6fd2eb73a41483b4cf75bbfd5e4537b43772f1bdf716aa40af67f118a05630736dc0a05cedeea6f09e0fc37f5d501cfbea5dc5b5f33f1c160ccfe0d63f878fc745eceb98f1300ec19785f76c14e042258c3c62ea33c3353f3ef35e35", @ANYRESOCT=r3, @ANYBLOB="00cab1dc00c45a5857a5f440beeaeffcc9fbca4df4853f59d14ed95b1f3cd14b17c55a2d385131cc2e71bb2cdc5946b2aff046aa574fc3a898d878574ae04ec5509f5a85245b9b668964fc1bd242388aeb44f999efa2d193b6358ff284986c925b34d59e8f274189fb546c178f90215fe5e3b9713c779bca3eb350acdd8b2bb9092593d3a9fbc71b68cd751b6b2e6c5f"], 0x21) (async) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) write$apparmor_exec(r4, 0x0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="65786503205465616d00"], 0xa) (async) socket$nl_generic(0x10, 0x3, 0x10) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 1: socketpair(0x6, 0x80000, 0x800, &(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) socketpair(0x6, 0x80000, 0x800, &(0x7f0000000000)) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x90) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/98) msgctl$IPC_RMID(r0, 0x0) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:44 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x90) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/98) (async) msgctl$IPC_RMID(r0, 0x0) 17:05:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374616314a73465616d00"], 0xb) 17:05:44 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:44 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) 17:05:44 executing program 1: socketpair(0x6, 0x80000, 0x800, &(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:45 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374616314a73465616d00"], 0xb) 17:05:45 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374616314a73465616d00"], 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374616314a73465616d00"], 0xb) (async) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x90) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/98) msgctl$IPC_RMID(r0, 0x0) msgget(0x3, 0x200) (async) msgget$private(0x0, 0x90) (async) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/98) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:45 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:45 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) inotify_init() 17:05:45 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) 17:05:45 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) inotify_init() 17:05:45 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) 17:05:45 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) 17:05:45 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:45 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) inotify_init() 17:05:45 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:45 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) 17:05:45 executing program 5: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) (async) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) (async) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) (async) msgget$private(0x0, 0x0) (async) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) (async) 17:05:45 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) [ 455.326909] audit: type=1400 audit(1652807145.222:309): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=74DF1D pid=26073 comm="syz-executor.4" 17:05:45 executing program 1: ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(0xffffffffffffffff, 0xc01064c5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c49dbbc716) 17:05:45 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) (async) 17:05:45 executing program 1: ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(0xffffffffffffffff, 0xc01064c5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c49dbbc716) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(0xffffffffffffffff, 0xc01064c5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c49dbbc716) (async) 17:05:45 executing program 5: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) 17:05:45 executing program 1: ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(0xffffffffffffffff, 0xc01064c5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c49dbbc716) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) [ 455.448530] audit: type=1400 audit(1652807145.342:310): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=74DF1D pid=26096 comm="syz-executor.4" 17:05:45 executing program 2: r0 = msgget(0x2, 0x401) msgctl$IPC_RMID(r0, 0x0) 17:05:45 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) (async, rerun: 64) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) (async, rerun: 64) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) (async) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) (async, rerun: 32) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) (rerun: 32) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) 17:05:45 executing program 5: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) 17:05:45 executing program 2: r0 = msgget(0x2, 0x401) msgctl$IPC_RMID(r0, 0x0) msgget(0x2, 0x401) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:45 executing program 5: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 3: add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000280)=""/4096) 17:05:45 executing program 2: r0 = msgget(0x2, 0x401) msgctl$IPC_RMID(r0, 0x0) 17:05:45 executing program 5: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0) 17:05:45 executing program 3: add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget(0x1, 0x440) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/87) msgctl$IPC_RMID(r0, 0x0) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) 17:05:45 executing program 3: add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:45 executing program 5: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) (async) r1 = msgget(0x1, 0x440) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/87) (async) msgctl$IPC_RMID(r0, 0x0) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) msgget$private(0x0, 0x0) 17:05:45 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 5: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget(0x1, 0x440) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/87) msgctl$IPC_RMID(r0, 0x0) msgget(0x3, 0x200) (async) msgget(0x1, 0x440) (async) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/87) (async) msgctl$IPC_RMID(r0, 0x0) (async) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180), 0x4) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 't\xdf\x1d\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\xdb.\xb2\xda\x88kj\xcc^\xe0d\xb2x\x00\x00\x00'}, 0x23) 17:05:45 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x4, 0x33, 0x40, 0x20, @mcast2, @mcast2, 0x7800, 0x80, 0x6}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x1, 0x4, 0x8, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x0, 0x6, 0xd974}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @private, @initdev}, &(0x7f00000002c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3f, 0xffffffff, 0x15, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x1, 0x954d, 0x1d8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00', 0x0}) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0), r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000700)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={0x1, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001240)={&(0x7f0000000ac0)={0x764, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x566e}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8}, {0x1d4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r3}, {0x1f0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2605a677}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}]}, 0x764}, 0x1, 0x0, 0x0, 0x8884}, 0x4000094) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:45 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000100)=""/116) msgctl$IPC_RMID(r0, 0x0) r2 = msgget(0x2, 0x238) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/182) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f00000000c0)=""/11) 17:05:45 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x4, 0x33, 0x40, 0x20, @mcast2, @mcast2, 0x7800, 0x80, 0x6}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x1, 0x4, 0x8, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x0, 0x6, 0xd974}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @private, @initdev}, &(0x7f00000002c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3f, 0xffffffff, 0x15, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x1, 0x954d, 0x1d8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00', 0x0}) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0), r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000700)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={0x1, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001240)={&(0x7f0000000ac0)={0x764, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x566e}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8}, {0x1d4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r3}, {0x1f0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2605a677}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}]}, 0x764}, 0x1, 0x0, 0x0, 0x8884}, 0x4000094) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x4, 0x33, 0x40, 0x20, @mcast2, @mcast2, 0x7800, 0x80, 0x6}}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x1, 0x4, 0x8, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x0, 0x6, 0xd974}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @private, @initdev}, &(0x7f00000002c0)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3f, 0xffffffff, 0x15, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x1, 0x954d, 0x1d8}}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00'}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0), r7) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000700)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={0x1, 0x58, &(0x7f0000000a00)}, 0x10) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001240)={&(0x7f0000000ac0)={0x764, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x566e}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8}, {0x1d4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r3}, {0x1f0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2605a677}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}]}, 0x764}, 0x1, 0x0, 0x0, 0x8884}, 0x4000094) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:45 executing program 5: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) 17:05:45 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) (async) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000100)=""/116) msgctl$IPC_RMID(r0, 0x0) (async) r2 = msgget(0x2, 0x238) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/182) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f00000000c0)=""/11) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:45 executing program 5: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) 17:05:45 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:45 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:45 executing program 5: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) 17:05:45 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x4, 0x33, 0x40, 0x20, @mcast2, @mcast2, 0x7800, 0x80, 0x6}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x1, 0x4, 0x8, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x0, 0x6, 0xd974}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @private, @initdev}, &(0x7f00000002c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3f, 0xffffffff, 0x15, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x1, 0x954d, 0x1d8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00', 0x0}) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0), r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000700)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={0x1, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001240)={&(0x7f0000000ac0)={0x764, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x566e}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8}, {0x1d4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r3}, {0x1f0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2605a677}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}]}, 0x764}, 0x1, 0x0, 0x0, 0x8884}, 0x4000094) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x4, 0x33, 0x40, 0x20, @mcast2, @mcast2, 0x7800, 0x80, 0x6}}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x1, 0x4, 0x8, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x0, 0x6, 0xd974}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @private, @initdev}, &(0x7f00000002c0)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3f, 0xffffffff, 0x15, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x1, 0x954d, 0x1d8}}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00'}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r7) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0), r7) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000700)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={0x1, 0x58, &(0x7f0000000a00)}, 0x10) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001240)={&(0x7f0000000ac0)={0x764, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x566e}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8}, {0x1d4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r3}, {0x1f0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2605a677}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}]}, 0x764}, 0x1, 0x0, 0x0, 0x8884}, 0x4000094) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:45 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000100)=""/116) msgctl$IPC_RMID(r0, 0x0) r2 = msgget(0x2, 0x238) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/182) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f00000000c0)=""/11) msgget(0x3, 0x200) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000100)=""/116) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget(0x2, 0x238) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/182) (async) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f00000000c0)=""/11) (async) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 5: msgget(0x3, 0x200) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) 17:05:46 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000000)) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 5: msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/82}, 0x5a, 0x3, 0x0) 17:05:46 executing program 1: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm], 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss, @sack_perm, @sack_perm, @window={0x3, 0x2, 0xcc}, @window={0x3, 0xfffc, 0x6}, @timestamp], 0x6) 17:05:46 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 4: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @broadcast, @empty}, &(0x7f0000000480)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0x1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x4, 0xff, 0x7, 0x1, 0x48, @local, @mcast2, 0x8000, 0x8, 0x312d, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r8, 0x58, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000001500)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f00000017c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000001800)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r8, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001840)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r8, &(0x7f00000022c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002280)={&(0x7f0000001b40)={0x728, r9, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xba}}}]}}, {{0x8, 0x1, r5}, {0xf0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8}, {0x124, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xa79}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x1a0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8c}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r3}, {0x1c0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r1}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x0, 0x4, 0x9, 0xd5}, {0x3, 0x7f, 0x3c, 0x7fffffff}, {0x3, 0x40, 0x4, 0x20}, {0xfffd, 0x7, 0x5, 0x6}, {0x366d, 0x40, 0x49, 0x7fff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x728}, 0x1, 0x0, 0x0, 0x4000000}, 0x24008041) ioctl$KVM_CREATE_DEVICE(r8, 0xc00caee0, &(0x7f0000001480)={0x2}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001400)={&(0x7f0000000700)={0xcdc, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x81, 0x2, 0x4, 0x6}, {0x7, 0x3, 0x87, 0x6}, {0x0, 0x9, 0x6, 0x20}, {0x98ee, 0xe5, 0x7f, 0xc0}, {0x9, 0x0, 0x6, 0x8001}, {0xffff, 0x4, 0xf3, 0x4000}, {0x2, 0x8, 0x36, 0x9}, {0x7, 0x0, 0x7f, 0x1}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x20c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9348}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4fbb}}, {0x8}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r6}, {0x120, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6609}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x218, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0xcdc}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r15 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r15, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:46 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000000)) (async) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) 17:05:46 executing program 1: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm], 0x2) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) (async) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss, @sack_perm, @sack_perm, @window={0x3, 0x2, 0xcc}, @window={0x3, 0xfffc, 0x6}, @timestamp], 0x6) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000000)) (async) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) 17:05:46 executing program 5: msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0) 17:05:46 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 4: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @broadcast, @empty}, &(0x7f0000000480)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0x1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x4, 0xff, 0x7, 0x1, 0x48, @local, @mcast2, 0x8000, 0x8, 0x312d, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) (async) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r8, 0x58, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000001500)={'team0\x00', 0x0}) (async) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f00000017c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000001800)=0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r8, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001840)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r8, &(0x7f00000022c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002280)={&(0x7f0000001b40)={0x728, r9, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xba}}}]}}, {{0x8, 0x1, r5}, {0xf0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8}, {0x124, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xa79}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x1a0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8c}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r3}, {0x1c0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r1}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x0, 0x4, 0x9, 0xd5}, {0x3, 0x7f, 0x3c, 0x7fffffff}, {0x3, 0x40, 0x4, 0x20}, {0xfffd, 0x7, 0x5, 0x6}, {0x366d, 0x40, 0x49, 0x7fff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x728}, 0x1, 0x0, 0x0, 0x4000000}, 0x24008041) ioctl$KVM_CREATE_DEVICE(r8, 0xc00caee0, &(0x7f0000001480)={0x2}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001400)={&(0x7f0000000700)={0xcdc, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x81, 0x2, 0x4, 0x6}, {0x7, 0x3, 0x87, 0x6}, {0x0, 0x9, 0x6, 0x20}, {0x98ee, 0xe5, 0x7f, 0xc0}, {0x9, 0x0, 0x6, 0x8001}, {0xffff, 0x4, 0xf3, 0x4000}, {0x2, 0x8, 0x36, 0x9}, {0x7, 0x0, 0x7f, 0x1}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x20c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9348}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4fbb}}, {0x8}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r6}, {0x120, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6609}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x218, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0xcdc}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) (async) r15 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r15, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:46 executing program 1: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm], 0x2) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss, @sack_perm, @sack_perm, @window={0x3, 0x2, 0xcc}, @window={0x3, 0xfffc, 0x6}, @timestamp], 0x6) 17:05:46 executing program 2: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc000) msgget$private(0x0, 0x712) socketpair(0x1e, 0x0, 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x8, 0x5, 0x7f, 0x5, 0x80, 0x10001, 0x2, 0xffff]) r0 = msgget(0x3, 0x205) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/198) 17:05:46 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5acbbca36) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 17:05:46 executing program 5: msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 17:05:46 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5acbbca36) prctl$PR_SET_THP_DISABLE(0x29, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5acbbca36) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) 17:05:46 executing program 2: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc000) msgget$private(0x0, 0x712) socketpair(0x1e, 0x0, 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x8, 0x5, 0x7f, 0x5, 0x80, 0x10001, 0x2, 0xffff]) r0 = msgget(0x3, 0x205) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/198) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc000) (async) msgget$private(0x0, 0x712) (async) socketpair(0x1e, 0x0, 0x0, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x8, 0x5, 0x7f, 0x5, 0x80, 0x10001, 0x2, 0xffff]) (async) msgget(0x3, 0x205) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/198) (async) 17:05:46 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 5: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7374613f6b200ea300"], 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000001c0)=""/138) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 4: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @broadcast, @empty}, &(0x7f0000000480)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0x1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x4, 0xff, 0x7, 0x1, 0x48, @local, @mcast2, 0x8000, 0x8, 0x312d, 0x7}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r8) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r8, 0x58, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000001500)={'team0\x00', 0x0}) (async) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f00000017c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000001800)=0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r8, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001840)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r8, &(0x7f00000022c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002280)={&(0x7f0000001b40)={0x728, r9, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xba}}}]}}, {{0x8, 0x1, r5}, {0xf0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8}, {0x124, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xa79}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x1a0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8c}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r3}, {0x1c0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r1}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x0, 0x4, 0x9, 0xd5}, {0x3, 0x7f, 0x3c, 0x7fffffff}, {0x3, 0x40, 0x4, 0x20}, {0xfffd, 0x7, 0x5, 0x6}, {0x366d, 0x40, 0x49, 0x7fff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x728}, 0x1, 0x0, 0x0, 0x4000000}, 0x24008041) (async) ioctl$KVM_CREATE_DEVICE(r8, 0xc00caee0, &(0x7f0000001480)={0x2}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'wg2\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001400)={&(0x7f0000000700)={0xcdc, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x81, 0x2, 0x4, 0x6}, {0x7, 0x3, 0x87, 0x6}, {0x0, 0x9, 0x6, 0x20}, {0x98ee, 0xe5, 0x7f, 0xc0}, {0x9, 0x0, 0x6, 0x8001}, {0xffff, 0x4, 0xf3, 0x4000}, {0x2, 0x8, 0x36, 0x9}, {0x7, 0x0, 0x7f, 0x1}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x20c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9348}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4fbb}}, {0x8}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r6}, {0x120, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6609}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x218, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0xcdc}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) (async) r15 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r15, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:46 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, 0x0, 0x0, r0) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) msgget$private(0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5acbbca36) prctl$PR_SET_THP_DISABLE(0x29, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c5acbbca36) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) 17:05:46 executing program 2: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc000) msgget$private(0x0, 0x712) socketpair(0x1e, 0x0, 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x8, 0x5, 0x7f, 0x5, 0x80, 0x10001, 0x2, 0xffff]) r0 = msgget(0x3, 0x205) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/198) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc000) (async) msgget$private(0x0, 0x712) (async) socketpair(0x1e, 0x0, 0x0, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x8, 0x5, 0x7f, 0x5, 0x80, 0x10001, 0x2, 0xffff]) (async) msgget(0x3, 0x205) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/198) (async) 17:05:46 executing program 3: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, 0x0, 0x0, 0x0) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73ff030000000000006d00"], 0xb) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000000)={&(0x7f0000000100)=[r1], 0x7fffffffffffffff, 0x1}) 17:05:46 executing program 5: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000100)=""/116) msgctl$IPC_RMID(r0, 0x0) r2 = msgget(0x2, 0x238) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/182) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f00000000c0)=""/11) 17:05:46 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x15000880) 17:05:46 executing program 3: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, 0x0, 0x0, 0x0) 17:05:46 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @mss={0x2, 0xf3dfb434}, @window={0x3, 0x9, 0x9}, @mss={0x2, 0x5}, @window={0x3, 0x69, 0x8}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x7}, @window={0x3, 0x8, 0x8}], 0xa) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 2: r0 = msgget(0x0, 0x81) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x9) msgrcv(r1, 0x0, 0x0, 0x0, 0x1800) msgctl$IPC_RMID(r1, 0x0) 17:05:46 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x15000880) 17:05:46 executing program 3: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, 0x0, 0x0, 0x0) 17:05:46 executing program 2: r0 = msgget(0x0, 0x81) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x9) msgrcv(r1, 0x0, 0x0, 0x0, 0x1800) (async) msgctl$IPC_RMID(r1, 0x0) 17:05:46 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x15000880) 17:05:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73ff030000000000006d00"], 0xb) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000000)={&(0x7f0000000100)=[r1], 0x7fffffffffffffff, 0x1}) 17:05:46 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb) 17:05:46 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 2: r0 = msgget(0x0, 0x81) msgctl$IPC_RMID(r0, 0x0) (async, rerun: 64) r1 = msgget$private(0x0, 0x9) (rerun: 64) msgrcv(r1, 0x0, 0x0, 0x0, 0x1800) (async, rerun: 32) msgctl$IPC_RMID(r1, 0x0) (rerun: 32) 17:05:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73ff030000000000006d00"], 0xb) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000000)={&(0x7f0000000100)=[r1], 0x7fffffffffffffff, 0x1}) 17:05:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x4d5, 0x8002) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={r1}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f0000000080)) 17:05:46 executing program 3: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = msgget(0x1, 0x402) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/152) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/8) 17:05:46 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x7f, 0xf9, &(0x7f00000000c0)="006a50e3cff0915eaba217e2b74ba6c3f77c002167d9e516db18af9667f87baa1ecae2f3ed49944534d876d1891c00bbdd7097c3e1346552d7030ba91f6c0e4e9032ce8802453ac8c03b7c2287fa8ef8ae0864006a13a69f32fd254552b57ff60f4d68954a610dbb0528d3e7d53aef6c30cecb11145142b78b86be0b2a4af58367bc0858644b83b39fdc2687594df664ab3bd43e072c970b01c26f3eef23d6e28eba95a96de98d7a40000e1d18f6438f153bb8569e090983439995e22feb40953b8cac15ec93911667479f3b38105926d896be5a54f76f88abfaeecfa7cd1d9f52c95446984c3b97a170b50ffee22b0ee1548ce1a9f6a265ca", 0x1, 0x5, 0xfeff, 0x100, 0x1, 0x3, 0x5, 'syz1\x00'}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 17:05:46 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x4d5, 0x8002) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={r1}) (async, rerun: 32) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f0000000080)) (rerun: 32) 17:05:46 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r1 = msgget(0x1, 0x402) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/152) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/8) 17:05:46 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x7f, 0xf9, &(0x7f00000000c0)="006a50e3cff0915eaba217e2b74ba6c3f77c002167d9e516db18af9667f87baa1ecae2f3ed49944534d876d1891c00bbdd7097c3e1346552d7030ba91f6c0e4e9032ce8802453ac8c03b7c2287fa8ef8ae0864006a13a69f32fd254552b57ff60f4d68954a610dbb0528d3e7d53aef6c30cecb11145142b78b86be0b2a4af58367bc0858644b83b39fdc2687594df664ab3bd43e072c970b01c26f3eef23d6e28eba95a96de98d7a40000e1d18f6438f153bb8569e090983439995e22feb40953b8cac15ec93911667479f3b38105926d896be5a54f76f88abfaeecfa7cd1d9f52c95446984c3b97a170b50ffee22b0ee1548ce1a9f6a265ca", 0x1, 0x5, 0xfeff, 0x100, 0x1, 0x3, 0x5, 'syz1\x00'}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x7f, 0xf9, &(0x7f00000000c0)="006a50e3cff0915eaba217e2b74ba6c3f77c002167d9e516db18af9667f87baa1ecae2f3ed49944534d876d1891c00bbdd7097c3e1346552d7030ba91f6c0e4e9032ce8802453ac8c03b7c2287fa8ef8ae0864006a13a69f32fd254552b57ff60f4d68954a610dbb0528d3e7d53aef6c30cecb11145142b78b86be0b2a4af58367bc0858644b83b39fdc2687594df664ab3bd43e072c970b01c26f3eef23d6e28eba95a96de98d7a40000e1d18f6438f153bb8569e090983439995e22feb40953b8cac15ec93911667479f3b38105926d896be5a54f76f88abfaeecfa7cd1d9f52c95446984c3b97a170b50ffee22b0ee1548ce1a9f6a265ca", 0x1, 0x5, 0xfeff, 0x100, 0x1, 0x3, 0x5, 'syz1\x00'}) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) 17:05:46 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:46 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180), 0x4) 17:05:46 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x4d5, 0x8002) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={r1}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f0000000080)) syz_open_dev$dri(&(0x7f0000000040), 0x4d5, 0x8002) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={r1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f0000000080)) (async) 17:05:46 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x7f, 0xf9, &(0x7f00000000c0)="006a50e3cff0915eaba217e2b74ba6c3f77c002167d9e516db18af9667f87baa1ecae2f3ed49944534d876d1891c00bbdd7097c3e1346552d7030ba91f6c0e4e9032ce8802453ac8c03b7c2287fa8ef8ae0864006a13a69f32fd254552b57ff60f4d68954a610dbb0528d3e7d53aef6c30cecb11145142b78b86be0b2a4af58367bc0858644b83b39fdc2687594df664ab3bd43e072c970b01c26f3eef23d6e28eba95a96de98d7a40000e1d18f6438f153bb8569e090983439995e22feb40953b8cac15ec93911667479f3b38105926d896be5a54f76f88abfaeecfa7cd1d9f52c95446984c3b97a170b50ffee22b0ee1548ce1a9f6a265ca", 0x1, 0x5, 0xfeff, 0x100, 0x1, 0x3, 0x5, 'syz1\x00'}) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 17:05:46 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = msgget(0x1, 0x402) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/152) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/8) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) msgget(0x1, 0x402) (async) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/152) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/8) (async) 17:05:46 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:46 executing program 5: add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 17:05:46 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x180, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x30, 0x0, &(0x7f0000000040)=[@increfs, @increfs_done={0x40106308, 0x3}, @increfs_done={0x40106308, 0x3}], 0x15, 0x0, &(0x7f0000000100)="988de2e88a5654b5247c36257cab084372568763ed"}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:46 executing program 1: ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:46 executing program 5: add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 17:05:46 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:46 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x6, 0x5, {0xffffffffffffffff}, {0xee01}, 0x80, 0x5}) r3 = getegid() r4 = gettid() getpgid(r4) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x0, r1, 0xee01, r2, r3, 0xa0, 0x1834}, 0x0, 0x0, 0xb701, 0xd12e, 0x9769, 0xda, 0x7, 0x4, 0x5, 0xfff, 0x0, r4}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) 17:05:46 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x180, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x30, 0x0, &(0x7f0000000040)=[@increfs, @increfs_done={0x40106308, 0x3}, @increfs_done={0x40106308, 0x3}], 0x15, 0x0, &(0x7f0000000100)="988de2e88a5654b5247c36257cab084372568763ed"}) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 17:05:46 executing program 1: ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:46 executing program 5: add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, 0x0) 17:05:46 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) r1 = getuid() (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x6, 0x5, {0xffffffffffffffff}, {0xee01}, 0x80, 0x5}) r3 = getegid() r4 = gettid() getpgid(r4) (async) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x0, r1, 0xee01, r2, r3, 0xa0, 0x1834}, 0x0, 0x0, 0xb701, 0xd12e, 0x9769, 0xda, 0x7, 0x4, 0x5, 0xfff, 0x0, r4}) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) 17:05:46 executing program 3: add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:46 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x180, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x30, 0x0, &(0x7f0000000040)=[@increfs, @increfs_done={0x40106308, 0x3}, @increfs_done={0x40106308, 0x3}], 0x15, 0x0, &(0x7f0000000100)="988de2e88a5654b5247c36257cab084372568763ed"}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x180, 0x0) (async) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x30, 0x0, &(0x7f0000000040)=[@increfs, @increfs_done={0x40106308, 0x3}, @increfs_done={0x40106308, 0x3}], 0x15, 0x0, &(0x7f0000000100)="988de2e88a5654b5247c36257cab084372568763ed"}) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r1, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) 17:05:47 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 1: ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) ioctl$SW_SYNC_IOC_INC(0xffffffffffffffff, 0x40045701, &(0x7f0000000000)) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x6, 0x5, {0xffffffffffffffff}, {0xee01}, 0x80, 0x5}) r3 = getegid() r4 = gettid() getpgid(r4) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x0, r1, 0xee01, r2, r3, 0xa0, 0x1834}, 0x0, 0x0, 0xb701, 0xd12e, 0x9769, 0xda, 0x7, 0x4, 0x5, 0xfff, 0x0, r4}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r0, 0x0) (async) getuid() (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x6, 0x5, {0xffffffffffffffff}, {0xee01}, 0x80, 0x5}) (async) getegid() (async) gettid() (async) getpgid(r4) (async) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x0, r1, 0xee01, r2, r3, 0xa0, 0x1834}, 0x0, 0x0, 0xb701, 0xd12e, 0x9769, 0xda, 0x7, 0x4, 0x5, 0xfff, 0x0, r4}) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) (async) 17:05:47 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x11, 0x6, 0xfffff512) syz_genetlink_get_family_id$team(&(0x7f0000000080), r2) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x3c}, 0x10) 17:05:47 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:47 executing program 3: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket(0x11, 0x6, 0xfffff512) syz_genetlink_get_family_id$team(&(0x7f0000000080), r2) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x3c}, 0x10) 17:05:47 executing program 2: msgget(0x3, 0x211) msgget(0x2, 0x8) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) r1 = msgget$private(0x0, 0x204) msgctl$IPC_RMID(r1, 0x0) 17:05:47 executing program 0: add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 3: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) (async) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) (async) getegid() (async) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) (async) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) (async) 17:05:47 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async, rerun: 32) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket(0x11, 0x6, 0xfffff512) syz_genetlink_get_family_id$team(&(0x7f0000000080), r2) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x3c}, 0x10) 17:05:47 executing program 2: msgget(0x3, 0x211) msgget(0x2, 0x8) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) (async) r1 = msgget$private(0x0, 0x204) msgctl$IPC_RMID(r1, 0x0) 17:05:47 executing program 3: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 0: add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7326cbc239a7e9dd09905f89789726c460f8c023974c6d2c", @ANYRESOCT=r0, @ANYRESOCT=r2, @ANYBLOB="45dc2c1361f1318d3bf16bb356a0c583f1dd8331c2c8ed1671806f30a54c6eaebc3015fb9e2ea18057aafb38edbe59504f701710b8bb26368959852f265512d41afb5fb8fb3b67c5f555cf5e57f54c9029c56cfbfa14528802c4171d90c1c71e", @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES32=r1], 0xfffffc67) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) (async) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() (async) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) (async) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) (async) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 0: add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 3: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 2: msgget(0x3, 0x211) msgget(0x2, 0x8) (async, rerun: 32) r0 = msgget$private(0x0, 0x0) (rerun: 32) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) (async) r1 = msgget$private(0x0, 0x204) msgctl$IPC_RMID(r1, 0x0) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) (async) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7326cbc239a7e9dd09905f89789726c460f8c023974c6d2c", @ANYRESOCT=r0, @ANYRESOCT=r2, @ANYBLOB="45dc2c1361f1318d3bf16bb356a0c583f1dd8331c2c8ed1671806f30a54c6eaebc3015fb9e2ea18057aafb38edbe59504f701710b8bb26368959852f265512d41afb5fb8fb3b67c5f555cf5e57f54c9029c56cfbfa14528802c4171d90c1c71e", @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES32=r1], 0xfffffc67) 17:05:47 executing program 0: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 3: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/79) msgctl$IPC_RMID(r0, 0x0) 17:05:47 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder0\x00', 0x2, 0x0) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) (async) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) (async) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7326cbc239a7e9dd09905f89789726c460f8c023974c6d2c", @ANYRESOCT=r0, @ANYRESOCT=r2, @ANYBLOB="45dc2c1361f1318d3bf16bb356a0c583f1dd8331c2c8ed1671806f30a54c6eaebc3015fb9e2ea18057aafb38edbe59504f701710b8bb26368959852f265512d41afb5fb8fb3b67c5f555cf5e57f54c9029c56cfbfa14528802c4171d90c1c71e", @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES32=r1], 0xfffffc67) 17:05:47 executing program 3: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 0: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/79) (async) msgctl$IPC_RMID(r0, 0x0) 17:05:47 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder0\x00', 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder0\x00', 0x2, 0x0) (async) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', 'T\xc2\xb6u\xc7y\x83\x1a3\x86\xff\xe6\xc5\x029\x99\xf5\x92J:D+\x10\xa9\xc5\x02h\xaf\x93\xa7<\x85\xbeu\x8a\xc8O\x06\xe3#\x95\xf3\xfePw\xd2@\xe5\b\xe5t\x1c\xa7\x82\x1d\bPoG\bL\xb2i\xd4\x10VQ\x1f,\xec\x81\x87\x96\xf2\xd9\xed\xedd,%a\xd0\xe3\r\x12\x1c\xb0-L8\x8e\xaf\x7f&\xe3\xfa\x81\xdc\t\xa6\t5'}, 0x167) 17:05:47 executing program 3: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 0: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/79) msgctl$IPC_RMID(r0, 0x0) 17:05:47 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) (async, rerun: 32) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder0\x00', 0x2, 0x0) (rerun: 32) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', 'T\xc2\xb6u\xc7y\x83\x1a3\x86\xff\xe6\xc5\x029\x99\xf5\x92J:D+\x10\xa9\xc5\x02h\xaf\x93\xa7<\x85\xbeu\x8a\xc8O\x06\xe3#\x95\xf3\xfePw\xd2@\xe5\b\xe5t\x1c\xa7\x82\x1d\bPoG\bL\xb2i\xd4\x10VQ\x1f,\xec\x81\x87\x96\xf2\xd9\xed\xedd,%a\xd0\xe3\r\x12\x1c\xb0-L8\x8e\xaf\x7f&\xe3\xfa\x81\xdc\t\xa6\t5'}, 0x167) 17:05:47 executing program 3: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 0: request_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 2: ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f0000000040)={r0}) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 3: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', 'T\xc2\xb6u\xc7y\x83\x1a3\x86\xff\xe6\xc5\x029\x99\xf5\x92J:D+\x10\xa9\xc5\x02h\xaf\x93\xa7<\x85\xbeu\x8a\xc8O\x06\xe3#\x95\xf3\xfePw\xd2@\xe5\b\xe5t\x1c\xa7\x82\x1d\bPoG\bL\xb2i\xd4\x10VQ\x1f,\xec\x81\x87\x96\xf2\xd9\xed\xedd,%a\xd0\xe3\r\x12\x1c\xb0-L8\x8e\xaf\x7f&\xe3\xfa\x81\xdc\t\xa6\t5'}, 0x167) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000280)={'stack ', 'T\xc2\xb6u\xc7y\x83\x1a3\x86\xff\xe6\xc5\x029\x99\xf5\x92J:D+\x10\xa9\xc5\x02h\xaf\x93\xa7<\x85\xbeu\x8a\xc8O\x06\xe3#\x95\xf3\xfePw\xd2@\xe5\b\xe5t\x1c\xa7\x82\x1d\bPoG\bL\xb2i\xd4\x10VQ\x1f,\xec\x81\x87\x96\xf2\xd9\xed\xedd,%a\xd0\xe3\r\x12\x1c\xb0-L8\x8e\xaf\x7f&\xe3\xfa\x81\xdc\t\xa6\t5'}, 0x167) (async) 17:05:47 executing program 2: ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f0000000040)={r0}) (async) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) 17:05:47 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x209ab6523204cc32) inotify_init() r0 = inotify_init() r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x4000030) read$msr(r1, &(0x7f0000000100)=""/4096, 0x1000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4) 17:05:47 executing program 0: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 3: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:47 executing program 0: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x209ab6523204cc32) inotify_init() (async) r0 = inotify_init() r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x4000030) (async) read$msr(r1, &(0x7f0000000100)=""/4096, 0x1000) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4) 17:05:47 executing program 2: ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f0000000040)={r0}) r1 = msgget(0x3, 0x200) msgctl$IPC_RMID(r1, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f0000000040)={r0}) (async) msgget(0x3, 0x200) (async) msgctl$IPC_RMID(r1, 0x0) (async) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x66, &(0x7f0000000100)=""/102, 0x40f00, 0xa, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000180)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xc, 0x33c3, 0x6}, 0x10}, 0x80) 17:05:47 executing program 3: r0 = msgget(0x3, 0x200) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/79) msgctl$IPC_RMID(r0, 0x0) 17:05:47 executing program 0: request_key(&(0x7f00000003c0)='keyring\x00', 0x0, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', 0x0, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r0) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x66, &(0x7f0000000100)=""/102, 0x40f00, 0xa, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000180)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xc, 0x33c3, 0x6}, 0x10}, 0x80) 17:05:47 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x209ab6523204cc32) (async) inotify_init() (async) r0 = inotify_init() r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x4000030) (async, rerun: 32) read$msr(r1, &(0x7f0000000100)=""/4096, 0x1000) (rerun: 32) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4) 17:05:47 executing program 0: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) 17:05:47 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7326cbc239a7e9dd09905f89789726c460f8c023974c6d2c", @ANYRESOCT=r0, @ANYRESOCT=r2, @ANYBLOB="45dc2c1361f1318d3bf16bb356a0c583f1dd8331c2c8ed1671806f30a54c6eaebc3015fb9e2ea18057aafb38edbe59504f701710b8bb26368959852f265512d41afb5fb8fb3b67c5f555cf5e57f54c9029c56cfbfa14528802c4171d90c1c71e", @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES32=r1], 0xfffffc67) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x66, &(0x7f0000000100)=""/102, 0x40f00, 0xa, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000180)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xc, 0x33c3, 0x6}, 0x10}, 0x80) 17:05:47 executing program 0: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000200)=""/240) msgctl$IPC_RMID(r0, 0x0) r2 = msgget(0x1, 0x200) msgctl$IPC_RMID(r2, 0x0) r3 = msgget$private(0x0, 0x149) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r4, 0xd, &(0x7f0000000100)=""/252) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000540)=""/108) msgget(0x2, 0x0) r5 = msgget$private(0x0, 0x0) msgrcv(r5, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r5, 0xc, &(0x7f0000000300)=""/13) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000000)=""/135) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000440)=""/243) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000340)=""/225) 17:05:47 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7326cbc239a7e9dd09905f89789726c460f8c023974c6d2c", @ANYRESOCT=r0, @ANYRESOCT=r2, @ANYBLOB="45dc2c1361f1318d3bf16bb356a0c583f1dd8331c2c8ed1671806f30a54c6eaebc3015fb9e2ea18057aafb38edbe59504f701710b8bb26368959852f265512d41afb5fb8fb3b67c5f555cf5e57f54c9029c56cfbfa14528802c4171d90c1c71e", @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES32=r1], 0xfffffc67) 17:05:47 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7326cbc239a7e9dd09905f89789726c460f8c023974c6d2c", @ANYRESOCT=r0, @ANYRESOCT=r2, @ANYBLOB="45dc2c1361f1318d3bf16bb356a0c583f1dd8331c2c8ed1671806f30a54c6eaebc3015fb9e2ea18057aafb38edbe59504f701710b8bb26368959852f265512d41afb5fb8fb3b67c5f555cf5e57f54c9029c56cfbfa14528802c4171d90c1c71e", @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES32=r1], 0xfffffc67) 17:05:47 executing program 0: request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) 17:05:47 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000200)=""/240) msgctl$IPC_RMID(r0, 0x0) r2 = msgget(0x1, 0x200) msgctl$IPC_RMID(r2, 0x0) r3 = msgget$private(0x0, 0x149) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT_ANY(r4, 0xd, &(0x7f0000000100)=""/252) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000540)=""/108) msgget(0x2, 0x0) r5 = msgget$private(0x0, 0x0) msgrcv(r5, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r5, 0xc, &(0x7f0000000300)=""/13) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000000)=""/135) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000440)=""/243) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000340)=""/225) msgget(0x3, 0x200) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000200)=""/240) (async) msgctl$IPC_RMID(r0, 0x0) (async) msgget(0x1, 0x200) (async) msgctl$IPC_RMID(r2, 0x0) (async) msgget$private(0x0, 0x149) (async) msgget$private(0x0, 0x0) (async) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT_ANY(r4, 0xd, &(0x7f0000000100)=""/252) (async) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000540)=""/108) (async) msgget(0x2, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r5, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_INFO(r5, 0xc, &(0x7f0000000300)=""/13) (async) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000000)=""/135) (async) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000440)=""/243) (async) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000340)=""/225) (async) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'x\x01\x00\x00\x00'}, 0xa) 17:05:47 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7326cbc239a7e9dd09905f89789726c460f8c023974c6d2c", @ANYRESOCT=r0, @ANYRESOCT=r2, @ANYBLOB="45dc2c1361f1318d3bf16bb356a0c583f1dd8331c2c8ed1671806f30a54c6eaebc3015fb9e2ea18057aafb38edbe59504f701710b8bb26368959852f265512d41afb5fb8fb3b67c5f555cf5e57f54c9029c56cfbfa14528802c4171d90c1c71e", @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES32=r1], 0xfffffc67) 17:05:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) (async, rerun: 32) r1 = msgget$private(0x0, 0x0) (rerun: 32) msgrcv(r1, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000200)=""/240) (async) msgctl$IPC_RMID(r0, 0x0) r2 = msgget(0x1, 0x200) msgctl$IPC_RMID(r2, 0x0) (async) r3 = msgget$private(0x0, 0x149) (async) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT_ANY(r4, 0xd, &(0x7f0000000100)=""/252) (async) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000540)=""/108) (async) msgget(0x2, 0x0) (async) r5 = msgget$private(0x0, 0x0) msgrcv(r5, 0x0, 0x0, 0x2, 0x1800) msgctl$MSG_INFO(r5, 0xc, &(0x7f0000000300)=""/13) msgrcv(r3, 0x0, 0x0, 0x2, 0x1800) (async) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000000)=""/135) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000440)=""/243) (async, rerun: 64) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000340)=""/225) (rerun: 64) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'x\x01\x00\x00\x00'}, 0xa) 17:05:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 5: add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'x\x01\x00\x00\x00'}, 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'x\x01\x00\x00\x00'}, 0xa) (async) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) 17:05:47 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:47 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) 17:05:47 executing program 2: r0 = msgget(0x3, 0x200) r1 = syz_open_dev$dri(&(0x7f0000000000), 0xab2, 0x200000) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r1, 0xc02864ca, &(0x7f0000000180)={&(0x7f00000000c0)=[r2, 0x0, r3, 0x0], &(0x7f0000000100)=[0x9], 0x4, 0x4, 0x6}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000140)) msgctl$IPC_RMID(r0, 0x0) r4 = syz_open_dev$dri(&(0x7f00000001c0), 0x7, 0x20040) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000200)={0x0, 0x956, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x3, 0x8}) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000240)={0x3f, 0xca, {}, {r5}, 0x5, 0x7fffffff}) 17:05:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000340)={0x0, 0x1}) 17:05:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f0000000100)={&(0x7f0000000040)=[r2, 0x0, 0x0, 0x0], 0x7fffffffffffffff, 0x4}) 17:05:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) 17:05:47 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) 17:05:47 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) 17:05:48 executing program 2: r0 = msgget(0x3, 0x200) (async) r1 = syz_open_dev$dri(&(0x7f0000000000), 0xab2, 0x200000) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r1, 0xc02864ca, &(0x7f0000000180)={&(0x7f00000000c0)=[r2, 0x0, r3, 0x0], &(0x7f0000000100)=[0x9], 0x4, 0x4, 0x6}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000140)) msgctl$IPC_RMID(r0, 0x0) (async) r4 = syz_open_dev$dri(&(0x7f00000001c0), 0x7, 0x20040) (async) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000200)={0x0, 0x956, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x3, 0x8}) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000240)={0x3f, 0xca, {}, {r5}, 0x5, 0x7fffffff}) 17:05:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f0000000100)={&(0x7f0000000040)=[r2, 0x0, 0x0, 0x0], 0x7fffffffffffffff, 0x4}) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x7f}, 0x8) 17:05:48 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:48 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) 17:05:48 executing program 2: r0 = msgget(0x3, 0x200) r1 = syz_open_dev$dri(&(0x7f0000000000), 0xab2, 0x200000) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r1, 0xc02864ca, &(0x7f0000000180)={&(0x7f00000000c0)=[r2, 0x0, r3, 0x0], &(0x7f0000000100)=[0x9], 0x4, 0x4, 0x6}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000140)) msgctl$IPC_RMID(r0, 0x0) r4 = syz_open_dev$dri(&(0x7f00000001c0), 0x7, 0x20040) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000200)={0x0, 0x956, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x3, 0x8}) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000240)={0x3f, 0xca, {}, {r5}, 0x5, 0x7fffffff}) msgget(0x3, 0x200) (async) syz_open_dev$dri(&(0x7f0000000000), 0xab2, 0x200000) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)) (async) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r1, 0xc02864ca, &(0x7f0000000180)={&(0x7f00000000c0)=[r2, 0x0, r3, 0x0], &(0x7f0000000100)=[0x9], 0x4, 0x4, 0x6}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000140)) (async) msgctl$IPC_RMID(r0, 0x0) (async) syz_open_dev$dri(&(0x7f00000001c0), 0x7, 0x20040) (async) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000200)={0x0, 0x956, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x3, 0x8}) (async) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000240)={0x3f, 0xca, {}, {r5}, 0x5, 0x7fffffff}) (async) 17:05:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f0000000100)={&(0x7f0000000040)=[r2, 0x0, 0x0, 0x0], 0x7fffffffffffffff, 0x4}) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) inotify_add_watch(0xffffffffffffffff, 0x0, 0xeb4e41c59dbbcf16) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:48 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = msgget(0x0, 0x110) msgctl$IPC_RMID(r0, 0x0) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) getegid() 17:05:48 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = msgget(0x0, 0x110) msgctl$IPC_RMID(r0, 0x0) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, 0x0) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = msgget(0x0, 0x110) msgctl$IPC_RMID(r0, 0x0) 17:05:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, 0x0) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, 0x0) 17:05:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, 0x0) 17:05:48 executing program 0: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:48 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1, 0x10}, 0xc) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x7, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9e8d, 0x0, 0x0, 0x0, 0x9}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000000}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x400000}]}, &(0x7f0000000280)='syzkaller\x00', 0x6, 0x6b, &(0x7f00000002c0)=""/107, 0x41100, 0x5, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000380)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x400003, 0x10, 0x9, 0x8}, 0x10}, 0x80) socket$l2tp(0x2, 0x2, 0x73) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="1ce81f6fc87fde8e7f7c498393c40e885f1aa51c0d1dd44653965bd411f482dc65ec1549dfb07fa7cc92029caecababb38492425db25b6bd061ca9102b42a98f2fa2f2e0c58150dbec28cea2d6a7d698787d0d97f69f00f8874fbb054d5c57eae2f72c1a02244e655a48358b8b5d0606876d7887e01bdd689427ddeb0e0fd6ecb61ec57c4e4a5e0a56eb5d4a9c1725234a82a01c67c3a6c920517c238bb2c9cfe3841906af97b11bf0c756c2cbc0694be393f96c79720e3a63f8bcf29f3a8668637007a7892c7059c0388713c791f337315dd3c9dafc55b7c85ab0ee8a70bb7e7bf1d5d45f6c76591cc76d286c27202fd14b3c535e82625c0c05fde5746e73dc7d3d269e60e176d0544ab470a0"], 0xb) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x3a1400, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'ip6gre0\x00', r4, 0x4, 0x3, 0x3, 0xa0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, 0x20, 0x80, 0x8000, 0x1}}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r5) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r5, 0xc01864cd, &(0x7f0000000180)={&(0x7f0000000040)=[r6, r6], &(0x7f0000000100)=[0x3, 0x3f, 0x9, 0x3, 0x6, 0x61, 0x8, 0x3, 0x0], 0x2}) 17:05:48 executing program 2: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:48 executing program 1: r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:48 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, 0x0) 17:05:48 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1, 0x10}, 0xc) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) (async) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x7, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9e8d, 0x0, 0x0, 0x0, 0x9}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000000}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x400000}]}, &(0x7f0000000280)='syzkaller\x00', 0x6, 0x6b, &(0x7f00000002c0)=""/107, 0x41100, 0x5, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000380)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x400003, 0x10, 0x9, 0x8}, 0x10}, 0x80) socket$l2tp(0x2, 0x2, 0x73) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="1ce81f6fc87fde8e7f7c498393c40e885f1aa51c0d1dd44653965bd411f482dc65ec1549dfb07fa7cc92029caecababb38492425db25b6bd061ca9102b42a98f2fa2f2e0c58150dbec28cea2d6a7d698787d0d97f69f00f8874fbb054d5c57eae2f72c1a02244e655a48358b8b5d0606876d7887e01bdd689427ddeb0e0fd6ecb61ec57c4e4a5e0a56eb5d4a9c1725234a82a01c67c3a6c920517c238bb2c9cfe3841906af97b11bf0c756c2cbc0694be393f96c79720e3a63f8bcf29f3a8668637007a7892c7059c0388713c791f337315dd3c9dafc55b7c85ab0ee8a70bb7e7bf1d5d45f6c76591cc76d286c27202fd14b3c535e82625c0c05fde5746e73dc7d3d269e60e176d0544ab470a0"], 0xb) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x3a1400, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'ip6gre0\x00', r4, 0x4, 0x3, 0x3, 0xa0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, 0x20, 0x80, 0x8000, 0x1}}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r5) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r5, 0xc01864cd, &(0x7f0000000180)={&(0x7f0000000040)=[r6, r6], &(0x7f0000000100)=[0x3, 0x3f, 0x9, 0x3, 0x6, 0x61, 0x8, 0x3, 0x0], 0x2}) 17:05:48 executing program 1: r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:48 executing program 0: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:48 executing program 2: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'team\x00'}, 0xa) 17:05:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, 0x0) 17:05:48 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1, 0x10}, 0xc) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) (async) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x7, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9e8d, 0x0, 0x0, 0x0, 0x9}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000000}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x400000}]}, &(0x7f0000000280)='syzkaller\x00', 0x6, 0x6b, &(0x7f00000002c0)=""/107, 0x41100, 0x5, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000380)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x400003, 0x10, 0x9, 0x8}, 0x10}, 0x80) (async) socket$l2tp(0x2, 0x2, 0x73) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="1ce81f6fc87fde8e7f7c498393c40e885f1aa51c0d1dd44653965bd411f482dc65ec1549dfb07fa7cc92029caecababb38492425db25b6bd061ca9102b42a98f2fa2f2e0c58150dbec28cea2d6a7d698787d0d97f69f00f8874fbb054d5c57eae2f72c1a02244e655a48358b8b5d0606876d7887e01bdd689427ddeb0e0fd6ecb61ec57c4e4a5e0a56eb5d4a9c1725234a82a01c67c3a6c920517c238bb2c9cfe3841906af97b11bf0c756c2cbc0694be393f96c79720e3a63f8bcf29f3a8668637007a7892c7059c0388713c791f337315dd3c9dafc55b7c85ab0ee8a70bb7e7bf1d5d45f6c76591cc76d286c27202fd14b3c535e82625c0c05fde5746e73dc7d3d269e60e176d0544ab470a0"], 0xb) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x3a1400, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'ip6gre0\x00', r4, 0x4, 0x3, 0x3, 0xa0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, 0x20, 0x80, 0x8000, 0x1}}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r5) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r5, 0xc01864cd, &(0x7f0000000180)={&(0x7f0000000040)=[r6, r6], &(0x7f0000000100)=[0x3, 0x3f, 0x9, 0x3, 0x6, 0x61, 0x8, 0x3, 0x0], 0x2}) 17:05:48 executing program 0: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:48 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 1: r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:48 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 3: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 5: r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:48 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x9, 0x6, 0x7, 0x9}, 0x14) socket$inet6_udplite(0xa, 0x2, 0x88) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100), 0x4) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@tcp=r0, 0x1}, 0x20) 17:05:48 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 3: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x9, 0x6, 0x7, 0x9}, 0x14) socket$inet6_udplite(0xa, 0x2, 0x88) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100), 0x4) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@tcp=r0, 0x1}, 0x20) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x9, 0x6, 0x7, 0x9}, 0x14) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100), 0x4) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@tcp=r0, 0x1}, 0x20) (async) 17:05:48 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 5: r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:48 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x9, 0x6, 0x7, 0x9}, 0x14) socket$inet6_udplite(0xa, 0x2, 0x88) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100), 0x4) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@tcp=r0, 0x1}, 0x20) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x9, 0x6, 0x7, 0x9}, 0x14) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100), 0x4) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@tcp=r0, 0x1}, 0x20) (async) 17:05:48 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 3: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 17:05:48 executing program 5: r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:48 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 5: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='stack3team\x00'], 0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r1, 0xc00864c0, &(0x7f0000000240)={r2}) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1}) 17:05:48 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='stack3team\x00'], 0xb) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r1, 0xc00864c0, &(0x7f0000000240)={r2}) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1}) 17:05:48 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:48 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:48 executing program 5: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 2: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) (async, rerun: 32) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) (async, rerun: 32) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='stack3team\x00'], 0xb) (async, rerun: 32) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r1, 0xc00864c0, &(0x7f0000000240)={r2}) (async, rerun: 32) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (rerun: 32) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1}) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:48 executing program 2: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:48 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:48 executing program 5: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:49 executing program 2: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 3: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:49 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:49 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:49 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, 0x0) 17:05:49 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 17:05:49 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) (async, rerun: 64) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) (rerun: 64) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) [ 459.413030] kauditd_printk_skb: 26 callbacks suppressed [ 459.413037] audit: type=1400 audit(1652807149.312:337): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=27164 comm="syz-executor.4" 17:05:49 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) [ 459.545741] audit: type=1400 audit(1652807149.442:338): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=27189 comm="syz-executor.4" 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 3: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 3: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) [ 459.675446] audit: type=1400 audit(1652807149.573:339): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=27216 comm="syz-executor.4" 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 3: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 2: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0x0) 17:05:49 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 2: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0x0) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e", 0x68, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 2: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0x0) 17:05:49 executing program 4: add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e", 0x68, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 2: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 4: add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 4: add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, 0x0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 2: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 1: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:50 executing program 2: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 4: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e", 0x68, r0) 17:05:50 executing program 1: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 5: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:50 executing program 4: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 5: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:50 executing program 1: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 4: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 5: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 2: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r1) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 2: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e9190ae4fb6dc8992cd47ebe9e4c555f2f169f8464296c98150e6006a4c7c94af2e94e21bca9f2b29b30af7448466023c2702cd631c2feeb4cb1f0134f8111295b8ccf50504cd7bd32ef4fe768d32ce92ad30c6f0d3c7bf554ed090d78328391cffbfa463b02e4a", 0xcf, r0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r1) 17:05:50 executing program 2: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, r0) 17:05:50 executing program 2: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r1) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e", 0x68, r0) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x17e, r1) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, r0) 17:05:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="72ec751e91b29143d05d3b83f8e4080e6474ffae4b07519df8f58b4ccc3fd3a5cbae8682096716adba9428caa17bce552149dc4e37ebf0e9755a4caf0c181105dcee34aceb59ef70122dba36eb67952a109d70d8da60706ebc05454f4dac8024d1187c0e5bde662532b65513a6fb06206802fb0a343e44649a51e77ea835ebd2600172f8bf559bd397b17981c70e1d216e4ca204fc60d2de36c2f411a4a741d5b4e26ff4967690dc5318c25ed7fa4e04d810981dcdc3a726c4146517a696896981bf5859823b5ab4ba2e258e03541d02be2b0473fc437841387e311e35c19da8f1f7d38a2100692d0e061b625aa08b66eda2674e867a36d242e50cf0d17f05fbd10a22e27e4f765b6f4240be8692750d78c2e2dc1de4230b60a991cbcbf8e352a5cb2486207972010bcda973cd565795572474a8ad4c6cadfb350ca87883a3ffd4600c8b39d56e9bdcab60e893105d448e61eed18f630954f5b1aff1ce85fbc5db4e76449540a7f8092c4020d29ded2c117727b0cb3b07c6d1fcef68a5fd", 0x17e, r1) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) 17:05:50 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) 17:05:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 17:05:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, r0) 17:05:50 executing program 2: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, r0) add_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 17:05:51 executing program 2: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r1) 17:05:51 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r1) 17:05:51 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r3) 17:05:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240), 0x0, r0) 17:05:51 executing program 1: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:51 executing program 2: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) 17:05:51 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:51 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240), 0x0, r0) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240), 0x0, r0) 17:05:51 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:51 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:51 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:51 executing program 1: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) socket$nl_generic(0x10, 0x3, 0x10) 17:05:51 executing program 3: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240), 0x0, r0) 17:05:51 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', 0x0) 17:05:51 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) socket$nl_generic(0x10, 0x3, 0x10) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:51 executing program 3: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)="5935db9fa577aaec80a4056966d4a2a86c27cce96ee511fb0e887c91a822b17e1dcb3dc8d63defb1aad4c662e1acb59a377279abc0c090af708e4f9a4ef7a22e9b0a8178fb655d0f5b8089e1c9ccea31f29d5c18d37459c2134b403d5458fd6c3cc3203259f1f06e", 0x68, r0) 17:05:51 executing program 1: keyctl$get_security(0x11, 0x0, &(0x7f00000000c0)=""/176, 0xb0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000540)={0x0, 0x1}) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/12, 0xc) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff19cc5c40fd79c22bf4a64e39a4b7fe72282ae10acf2ef743e79b"], 0xb) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="ebc9954eeff8d891a5e6e1f76914e7a48cb84fd51b8f70396d1931011bc9ad6c639569930ccd23664c5f24504bb0fb6bdf27f406248d8f39c0023f4238c2a3160b0e2e5a0f065117fc28957a964f2f9d1dbb83d9001ffbd042475141d62db0183a9a81b97751fda5419b5b98320850174bb85884605f81bec42aebd1f97fc7d9759be7803700fbc31f2c72de61fe5214a7e8cbc978d82ff4da8b4e333e56cc1702796353238c4ea54d866715e87697c0ed3b7a3721983685209ad62db4669c0820bb354202fb259270d930f999757e6b03640f519b29082c37e26ad5e83fea65841c2e89fb8f5f", 0xe7, r3) r4 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), r5) request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='keyring\x00', r4) 17:05:51 executing program 2: inotify_init1(0x80000) inotify_init1(0x80400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) inotify_add_watch(r0, 0x0, 0x2000156) [ 461.292880] audit: type=1400 audit(1652807151.193:340): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=27544 comm="syz-executor.2" 17:05:51 executing program 3: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:51 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', ':\x94/:}\x00'}, 0xc) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)='Y', 0x1, r0) 17:05:51 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', 'team\x00'}, 0xa) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240), 0x0, r0) 17:05:51 executing program 2: inotify_init1(0x80000) inotify_init1(0x80400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) inotify_add_watch(r0, 0x0, 0x2000156) 17:05:51 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:51 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240), 0x0, r0) [ 461.417137] audit: type=1400 audit(1652807151.313:341): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=27573 comm="syz-executor.0" 17:05:51 executing program 2: inotify_init1(0x80000) inotify_init1(0x80400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) inotify_add_watch(r0, 0x0, 0x2000156) 17:05:51 executing program 1: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) 17:05:51 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[], 0xb) 17:05:51 executing program 0: r0 = msgget(0x1, 0x646) msgctl$IPC_RMID(r0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x2, 0x2000) r2 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c9fa6616d58db344539d3637b4c0bc43a02356d239af8be7b5a89720714eebda5d77806c6a3ce24bf7c80dc63932d6489918999e2d431647a2e3f69f67a02c6fb7510839f6e83dad8fa5a696fd702aaed8f2931eedc684510be6d5a6e07f2511842a7944694b1c3959e57b988cb2e6ec3e835d51c4e6b5ea23f2bf531b263239fb4d165ba5045db5be9641019b28ed846e4dea480f41c8aecfcc665b0ddbe57732dc917de658743f0556f242bea2468c045352b0055b406fe619f23a292b70c96e818565a33b90533acdc3435bcc6af6c6948089277bed074bf1b2b48d7e2f43e6cbf1b893c58de70b85c00c0d387b", 0xef, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='&\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001600)=[{&(0x7f0000000200)="8a2d393e036ca94855e27f177fb9f650e5f9439fc84daacf29ade07c452696a852bc1aeaef7e19fb412198c3508810c5905dd38c864f09a7104abbee3532607d40a23b7b3383ec39ce4edb1908da8cbf2b8efedbb2d5e0ccf74472821c7d644a8bbf1b651e0df483c8d059619e69edec89af10e8547a10dd4719eb3778eaf0875dacf4a77225760cb08ffd580e24769a7e5161cf59feaca01605d0b2008ce07bedb5b9e245a25708b45e6e5889239a22d1f03540c1a742fd75ee57cbbab19b21668601d9d4dc3de01e176f58afd4", 0xce}, {&(0x7f0000000300)="c8b10fabbf025005dda71738eae23d44757c959473f23a26441c13bd617dd83ac2", 0x21}, {&(0x7f0000000340)="fb8bd770a5d55074c96b00a3218390200fc44b76d44c4488f44ef2a9656d370c1f979373acc12950e939db65a09d3a7ce8df3c6b8960cb4814ed7d955e9f3eaf1ab665bc2c8dc3c496ba36bf34a2ce094754ed0d71c6af0a6dcb8d77120cd77b519759343d7e9f173a2f66e440", 0x6d}, {&(0x7f00000003c0)="a29edb320d19003560d10280c273dc2261ae18da9a0908ed851e9584aa215fd32fd8885eb483271ac4e1b89523e6277dbbbe8fa64fbc406e55c659911db802fcc8b6fda950fcb8f0ae1c852284b32a0df37a4a9bd24c35dddb2f81f878d0b465d22b6d", 0x63}, {&(0x7f0000000440)="a2e7f30a819dff12b3bfc01bc13d6fdc560e99f8dae875e4d741e5ba4f676082ab74eda8797e4511a48219e13f246f535edb6c304a3f95d06f47e42d6769ed8c2dc5b4cfc2f2e6df26d7ac13189d26daa884f7db68e5e48e99a7d58d1919d850fdbaa424069ea8fb69a573af74bcf5b0dcb84f60de304aeb1d6ef201815774bf5351aba140f6cb42db49f73094271d8d6ae6fa3c56bab0511044259aec3cb354fd580e8b145f27e0c7040e71c788128a5f26cc0823bf9bad625b3b5def39725e5a90fd4baff35737a7aeddd6e8d219a2b85a7a41225bd09f19aa69f58ddd8168c41bfb14f1e890f96ad7dc94ad411cd2183654f8a8443de9d2380177431af434ea9fcac8b9310860252f76b0738761f2d08cd77b672e91a685d936cdcb503ac8ea7a8434762c4a443dd6ee86d154381383385469962e38285647da21959d93c7dd82768e023a74d691168ae1a356c0b846de60d63548f4bfb302158c312f0d7f897d6d20fc3097f33a58a92693f6c0f088e79ce2687c1b3d90dc97add6b9d9086e3d36279aa0c3ad5818f9ca71272cc5341dbdab45617a5c62ea0e42a6697362155f35ece5bb28e85d2fdcb80d99fedda5e791e9f0b4fd625cb0e44add51e9ded273134a9e825eda5d7d11a1191cc73622f04b330be4962540ef03cae45a98c9ad262608b83468a81a6a42c329ca5c207fff4a61f932e7465c0d76b8c7bb5b1c08780757796bb8190c33e61a51dd24fd2170be604c635268345407fe0e270a890c946e90108a14b8234197c5731a0c7b363f41dec594e44d41068dec2f2150f0033154da8c1ae262354ac225bd68eac9a4b8b1f7867a0b293b6442f8585eae62a03ae9e273355ba87f741dd6c9a10b638d2275470972146e351f13f98df4796c64768f1560ae8dc0c0aabed7d2450c38e3da6d8066307133f43d4661335fb45a8be8ec7f9e2b40a0340ffd26dfcd431ce70c3a9dd2ca4ac18f33bdf5d2e6e9fb974a0b988899b06608d05f5807d202c69722d3f17ae86e7b48507f93f88edc1a88ce918b2ad726716f371f97f102e703afa7627cc2698678ed40052fffdd1f59798e8b5fc02012af4a6a7e3e41da46ba42d4812b1614181b744791d654c33c7e8e1fbb6e53a49afa16112bf0d028c9c2e387d690ebe02a2d638d3725a3f483d197325433c6558d4f251e9b3b2e4bf46927582afc1ec903b49a37c10540b29cd4686f816a288fdb3158b214b57fba507fef77b5501005dbe181b541e9260469f6de1256ec7354b6524523a6e54dc507fda4b9e0254499d7e4089bcc5474650de9ba5a6970bbda06024a7f1eeab7f418fa39ecbe21c793ebf4a2499b2f56ec4ccc99552d37ce69bd851a395950ec92d672e3332c7414a4d74143a07d3511e0da7003cd4a6d923e95c794421af0bb25541037457ad7eda433895c7d7ac6016565fc62e4944838ea51e3a8c9f813c9fdbac4400b787c14bd836f5f2eb55b8f2bb8192d551f1fad74ee759986e9aaf21bfa5f6ed953c652eac9dbe91adc0f4a69f177e9098f8fc553884598a65060efff1502d0e2934d65ae9cea5c9bd662f78967fce22eafa368d7e310e8815112e364afbe4526cfcece7af7108560b022dc8a435d145d07c5db24beff22187ab4033280a0351ff11c8058a1f859d20fd5069eb60b2ff9936c3f27fb0c2ecac089bc5f2fb2a26b51f0eac60442678c7777486557b83522ce3257223b6a68c01f65d06250daef0e9c36a9e3d8f2a52d32e74566ff3be972498c23a16497eb0277507b1e18be4b714db09d03718a04dba34e4f6f7fdff923c418022d4467985aa45a9344814d099d82671282ace11665bfcaf9b3f9520f4ca30015c5248b3fbf87bc2e92f14f3b014799081cef37c51819e139cf35822d00647d9d795c391309b1cd12316ca11e4b8651f84bcc75859dd5503e0e598e915c41546e785de655dbda183c3d44aad1635ac5b880f257587957a5d61fe23ddd0095237268750e22b050814aa64d27e4eaeef3a60552218d593e1ea8860418d28a53b8710ea8c616f40e3d21fa08dd635af6b23543db9643efd0003b5934972123d67a7fc6f75cf47b42f73199e44630ea73de373303bc1fa9a9466a39582eec45fa108a60351e154b1280ad4d63a4f4c9988e26fa856c32b756ecb68907d318b4e1098ba406bb0a23c55a42676ab8cbb7458caced21e7b13489fb46e0111aa236d550d0cf08c61a70b6ab5dd025dc853bc1b8a5ed07682cbdf4989d0802f41d866ed9d79ee38479e009d5068ddf6dc7a7d85121d103b8b78dcfb332772dcf86b393be3c4a2f743f7db19e4ef8d39a9a09d85612f1e7bc150a376a43f55772fff0830839a6f68cde41244ac0d07e511630c7e70e3b445e28fec09bea3c1d36317379b3462f4aeac7ddba2d1dbe89d5fa65d7b8660df90562ec5705c789f7ea0c13fd5e891953c4179502b364ea1779bef1f2a4f577d67dbda49e1e8175f6f9a437b04f03f53226d59a5ead79ebd98d4ddd617b692c588ef12521191f6358939e8835d8b52107b437f341124be53baa3f6aa4ccd08fe66d47819a0ec099209fda99e99cafe7578aa7d09a5a5d97ba00293f6d7f34a9c2adf44d57fb115c0c0e4fcfc8e55a0985f26aa30d70b6b6c74d666b360cdd4929e75f1d2e5845866cd8908cc0da7f66389c135be763f8b4c5366d081aa541e92b46dafe48ab52474ae2e63d0aee1c377c277b9cc765fc34459373468a8c2429ddbca4f8235d19f653ac527bae64616a755767daccd2cc57dd3c81b7c572ff12a5cf889d2ef83c764c1a313cb94531c3f44ee03c0594420b33c84e66d8b5df7c71ab3d6f3bd9d34728f5795415640d6a86f82e0e26e9c5ce9cdae3932b56555517bf8013b807347d03ac17a095d38a12f26e83ff6342142741bced943a6b1b91b84ba407f37c6c7f7d5dce15e42492c7ecdae98a79cba7a5e0508a4e7821cfb3a3773451170494b5c5a7462450f8df69c7d8f807ce0449750101d8e75deedfe076b8aac090c3f9be89df024874c2b1e304330a257770c0b03e3890d6196cc8a14de9d09d572e4309ce676d4259ea7549b046b690aaa67b7824d01ea8f6afdb239fa9e47034646efe296219e220622b07ad579cadcd29ebf9631b542acdcf3564232ce5378dff4afa2763ef157602bd2e87e44d3a3c7cf11011e6240a92cc371880095918a6488a997e33b9d16e125cd5084fec62bafcaa52993f26403b23a051c8aef6efa91125e205cd4e5d4671869f40de9d3b41d6c5bd52fd11ef59fce18317545bdb042acb0b114ecfeaf3c4846f55cfe0a6ba586784f83c4fc0b9da9c6845a97f87a8fb409e9e84883a9d7b1702da791292fe90f06d431384a89fb92438f8b8fd1921ed68a1089f890dbf1310e794aeabebd3dca93568c849a714445297514cb5a5343809e15019d27a73c853202bf5ba6bf7b4c5fe09f8a6dac18d9437f6a5940e8cbc03888773a0e68d50b960160a4cf2e1eb1a354c90cd50effdab54ef0d74ca0613b058d1f4a714054c356e013688cc9b85b30f31946c09bab7ebe87561e396e58ec33cf2f7242ef8af03b43ffca6207da37dcf2df279445e933b3a92ad470fbfd4f3fdfeecbad4a59d8e15a83088c2c17668031e868513d046842b6fc97bcb347d4d12d88439cb358ac0d6d2f891606f4736ffd45fb4a8a0d241f51b933e1c808d9f907972906524c644226174b8a5706ec9dd798217b391f2d02ec25b8dcb9a320df3195bb31a7b29cb16a77cb7605c3514aa5ef533c479dba4c83238b59e68405b269237dd2ecca70c3e723ad62e70dcdde931da674a9b437cf7976046d1708b698ba54f1cf7d2a1f75b0fefad6213d531048a5f5afed46d303018c1cbddb6daa9a4154ed84212a0e1af87fa33ec3bc7c3ee9062cbc181cdee8358d2d3dffbdf8e82769ed7c5f430019c2f2bf28e3c6106e70d10a01bddd3d2a35d246ddb85eba2a73246d49aa6899be9922e5a1539abcd5618521688a4db02b1418d6816c10c7190660e9cfb168d740b10bd03b847258d5ef9fc8ecc976ca340e02b1038a9f9e0b4328e3123bafda8494508f5f9182adf39cfa0b3cc88c4180dd1576362b69650cfabc7df5e251892110d5f96cea160f060f02b4a0d175dade36b0357bb8b284125f82ee02789fd4afa9713df70f6d0c45462e1f79708681051e8f2c27e29b17a7c6eb91505c6b2455671aaf3456160f9ac9e2af7bcb0f6daf0130d09ce4f7b7739a3146c1a11e554c4dec3ac9fb95f10126c5ff6ed86643832fb3d9f672445a8130862dc3e8ad5ed1a78123dca93c1dd987a1d7999528867f841c33a7f4a3fe98d5aadf72e6b9634e8ada9174ec6a021ee370096c49752de8bf606f96028ea039f4bc0671cd5d94903e7c95a039c751ba224d31857b30176ea6df453e8460b6280561e2a867b9b20e33d864c8edb26c90ea6acd28fb7f6373af78d17b5cd0b28de258974596917dac03e5a1a24d81f996f5530dbb0a4a94301da892bca4bef72c8e42af78098d7337fdcfd64c702c1271685add680f9caf3668dd62f5ffe96603ec7f2461c5e4d8b71c5a09732edf38ef3fe866da7f797e107b1fe758d776f531307524573e57c0d826ccb6d65046326d62fd7d8e6f5b6ad87fd946215df1485a2494a8dc29492a3aa6dd16b1043022fd9ee70ad788106cd857abfe4ad56fc4c82e896144c3b4ae477e7ee264d557b4373ecb5abcc9b9bc74da97886cd297044363d0f42a8647901658529f33527ebd993011682e8e9c35da2d5bba855e22bf79241fc980c87b49da5155f828f494cf36f91f739085a4e3e7d08aa61d27a7dcefb547b46791852dfc96951a251609a6240313c1118346bc81b4ea670dc3149af007df22cf13d19b554bfdd4172f0d94e6bc572f68eec3b1714abec350dc1e3755aa5b6d0907da214396e83cf4889decf2fde7bbecfe0765a5cc929034ec93dc23abbdee592bf89a8ee6748cc17ed68cf443e525f5cd193607985c487f88d46891e040ffe61e340b0459adc0459e6a469e78441e2962aa4e48b9c2f5095c1be7f9d930375732bc75d3e2f6d05460e4fa9eaace052c542153af784f0bd75c9cdb5e78759d0bdb1f060a51156183f2c3a83b19533fcc80d9cacfda22591177ad0ffe1f6de550cbed7ddd6b413863c16c0c371b0bb95eb95eeacdf6950dfcdcf33da4e1d8825a49f8e36eb271ff928729b6c05fbea3fdecbf6ddd6d062b2cb3c643aae019858e6f27e6fb0e5a9aa0c514cecd4d39549dff3b303224912c6877e535aa58af0f8722a0d1f559af87b11348af11c0678458786b5dc0bc686399d53b2bcf4b953d428e7bb3798b6e44ddb6e63ad186a968f893b038b8277921318066030b36e35d2f73305123c76ea8c8abab45c0ecbda8ff82cd7a63e1bc93b02ef46e331dacb5d40e3b516aa2c34623d8850b17e2400ab6c0a0ccf0e3ca5fb7cb56163b03cf25338425098a7c3f256c2d9efa3e4be603fc5745e775d39736cf754b2dccdfc22f6915bb04719cf0e36d41aa9a9ed51a356d7138b5d589699c1dc386242ac07c507d035796694cd8f9d344812a7c604c855c04066dbe064aeec2398b7d1a9153d93a458cd5c6300c397dab715f73cc4838142aa4f20456b8efe8d3749df2ed06ca2d09491591982cba210d472c3eb9cc3f952c0688b2700fbcaf58e028546984df15eda667f455d68d79a38b6f3ed30cb6c0994afd6863f26c07f251e642b0a9787cca3f0584b60b80504f255ccf62565c4be334b19bd29acf84d6e300f02c49c", 0x1000}, {&(0x7f0000001440)="401015c2eb11c5e1bf76c2ac999a3eb73e12dfd330832c7b4b8a6c5d09926af6b2fa375609bce8e585a6a2029b4e25cba3c91d6b4bebe308620da7f3bdc2230625a311393dcc529cbe9a600edeb82036403ce3491fa3f8939a473df1c617819e70c98dc59bdfcf2ce24def8c5a8b4ae66f71ea858b056702fefa2e20d48606b1a10bec377cee195d1b6966dd1206a14004cbff8991db12aab6f6", 0x9a}, {&(0x7f0000001500)="903f1a8826d558f1ca154dfbba8fe9665737bf4070c26a629871", 0x1a}, {&(0x7f0000001540)="e074c16898e1f754b346f9233d90fb088031d72cbd55b73c4fa80f3414fe7264f48689b25e870360bc2fea3312cc12f338c153767b80a713a15d273f84574cfa56e61ed7eecc52a0b3b6a4bd2cd7604c157a0a24f1c3764cd69bfc8965779db3301580c181f9eed6c8c4210bf28f2863f503ec93ce6e813571c96a21c349153814d8d593812adedf4008f7d5a5986570d88183b5eefbad63bfdb7540bc997fef742b6c1e9cd64cea6918ac5d2c4845186b3d9c33228d6e7e0632c01895318f92", 0xc0}], 0x8, r3) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/52) 17:05:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240), 0x0, r0) [ 461.483531] audit: type=1400 audit(1652807151.313:342): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A942F3A7D pid=27573 comm="syz-executor.0" 17:05:51 executing program 2: inotify_init1(0x80000) inotify_init1(0x80400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) 17:05:51 executing program 1: r0 = msgget(0x3, 0x200) msgctl$IPC_RMID(r0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/1}, 0x9, 0x1, 0x3000) r1 = msgget$private(0x0, 0x80) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/82) 17:05:51 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) 17:05:51 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/109, 0x6d, 0x0, &(0x7f0000000180)=""/4096, 0x1000}, &(0x7f00000011c0)=0x40) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:51 executing program 4: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:51 executing program 2: inotify_init1(0x80000) inotify_init1(0x80400) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2c71b7c5d428cecf, 0x0) 17:05:51 executing program 1: r0 = msgget(0x3, 0x200) r1 = msgget(0x2, 0x50) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000000)=""/66) r2 = msgget$private(0x0, 0x37) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgget(0x0, 0x54) msgget$private(0x0, 0x4) r3 = msgget(0x1, 0x10) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000140)=""/70) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000001c0)=""/102400) socket$inet_udp(0x2, 0x2, 0x0) msgctl$IPC_RMID(r0, 0x0) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_RMID(r4, 0x0) [ 461.568424] audit: type=1400 audit(1652807151.353:343): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=27577 comm="syz-executor.5" 17:05:51 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/109, 0x6d, 0x0, &(0x7f0000000180)=""/4096, 0x1000}, &(0x7f00000011c0)=0x40) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:51 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) 17:05:51 executing program 4: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)='Y', 0x1, 0x0) [ 461.669186] audit: type=1400 audit(1652807151.363:344): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="team" pid=27577 comm="syz-executor.5" [ 461.697532] audit: type=1400 audit(1652807151.503:345): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=27610 comm="syz-executor.5" [ 461.722921] audit: type=1400 audit(1652807151.583:346): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=27623 comm="syz-executor.5" 17:05:52 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRESHEX, @ANYRESHEX], 0xb) 17:05:52 executing program 2: inotify_init1(0x80000) inotify_init1(0x80400) 17:05:52 executing program 1: r0 = msgget(0x3, 0x200) r1 = msgget(0x2, 0x50) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000000)=""/66) r2 = msgget$private(0x0, 0x37) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgget(0x0, 0x54) msgget$private(0x0, 0x4) r3 = msgget(0x1, 0x10) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000140)=""/70) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000001c0)=""/102400) socket$inet_udp(0x2, 0x2, 0x0) msgctl$IPC_RMID(r0, 0x0) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_RMID(r4, 0x0) 17:05:52 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/109, 0x6d, 0x0, &(0x7f0000000180)=""/4096, 0x1000}, &(0x7f00000011c0)=0x40) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 4: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000240)='Y', 0x1, 0x0) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:52 executing program 2: inotify_init1(0x80400) 17:05:52 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRES64=r0, @ANYRESHEX, @ANYRESHEX=r1], 0xb) 17:05:52 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/109, 0x6d, 0x0, &(0x7f0000000180)=""/4096, 0x1000}, &(0x7f00000011c0)=0x40) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x40, 0x0, 0x602, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x43}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_vlan\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000000)) ioctl$SW_SYNC_IOC_INC(r1, 0x40045701, &(0x7f0000000180)=0xa83) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='stack taam\x00'], 0xb) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 17:05:52 executing program 1: r0 = msgget(0x3, 0x200) r1 = msgget(0x2, 0x50) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000000)=""/66) r2 = msgget$private(0x0, 0x37) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgget(0x0, 0x54) msgget$private(0x0, 0x4) r3 = msgget(0x1, 0x10) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000140)=""/70) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000001c0)=""/102400) socket$inet_udp(0x2, 0x2, 0x0) msgctl$IPC_RMID(r0, 0x0) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_RMID(r4, 0x0) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) 17:05:52 executing program 4: r0 = msgget(0x1, 0x100) socket(0x0, 0x8081a, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 2: inotify_init1(0x0) 17:05:52 executing program 1: r0 = msgget(0x3, 0x200) r1 = msgget(0x2, 0x50) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000000)=""/66) r2 = msgget$private(0x0, 0x37) msgrcv(r2, 0x0, 0x0, 0x2, 0x1800) msgget(0x0, 0x54) msgget$private(0x0, 0x4) r3 = msgget(0x1, 0x10) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000140)=""/70) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000001c0)=""/102400) socket$inet_udp(0x2, 0x2, 0x0) msgctl$IPC_RMID(r0, 0x0) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x2, 0x1800) msgctl$IPC_RMID(r4, 0x0) 17:05:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/109, 0x6d, 0x0, &(0x7f0000000180)=""/4096, 0x1000}, &(0x7f00000011c0)=0x40) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 4: r0 = msgget(0x1, 0x100) socket(0x0, 0x8081a, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) 17:05:52 executing program 2: inotify_init1(0x0) 17:05:52 executing program 1: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\b\x00'], 0xb) 17:05:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 4: r0 = msgget(0x1, 0x100) socket(0x0, 0x8081a, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:05:52 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/109, 0x6d, 0x0, &(0x7f0000000180)=""/4096, 0x1000}, &(0x7f00000011c0)=0x40) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 2: inotify_init1(0x0) 17:05:52 executing program 1: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) 17:05:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 4: r0 = msgget(0x1, 0x100) socket(0x0, 0x8081a, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/109, 0x6d, 0x0, &(0x7f0000000180)=""/4096, 0x1000}, &(0x7f00000011c0)=0x40) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8080}, 0x44000) 17:05:52 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xd1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa20b}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x50}, 0x1, 0x0, 0x0, 0x8815}, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:52 executing program 0: keyctl$read(0xb, 0x0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:52 executing program 4: r0 = msgget(0x1, 0x100) socket(0x0, 0x8081a, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) 17:05:52 executing program 0: keyctl$read(0xb, 0x0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xd1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa20b}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x50}, 0x1, 0x0, 0x0, 0x8815}, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:52 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 4: r0 = msgget(0x1, 0x100) socket(0x0, 0x8081a, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 0: keyctl$read(0xb, 0x0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf25050000000500060000000000060001000400000008000c000200000014002000fc0200"/58], 0x40}, 0x1, 0x0, 0x0, 0x2010}, 0x1) 17:05:52 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xd1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa20b}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x50}, 0x1, 0x0, 0x0, 0x8815}, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) 17:05:52 executing program 4: r0 = msgget(0x1, 0x100) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x814}, 0x0) 17:05:52 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xd1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa20b}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x50}, 0x1, 0x0, 0x0, 0x8815}, 0x0) 17:05:52 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x18, 0x0, &(0x7f0000000180)=[@clear_death={0x400c630f, 0x1}, @acquire={0x40046305, 0x2}], 0xe3, 0x0, &(0x7f00000001c0)="13875273c8f78654b5d8d0b50b9f21b71938a2f72b42629e7b1304f997339695ad9b8f53b74fddcf5b9723f3aea563e57ba973bbb94bd98dbede33515e6ed8015190ed10055b682151cc1210ce77cc1eb09bc5f7f65f8410521d507236ec98c0e41465fb6e906425bea4c41a35cca514a67cdd685714fe4e2fba12ce86fda7a83e8e5f9b6a30588f8f96a9e51f7a41a29c5f74017437190caaf9f0cd7c88051326cbd95b8d0381de48afadbca0b996d66a7ec9c42c6e39c344ccaed3962f2b3d811df556f29274e97127cc7db387dba5a7bb904feb35dd478af77bdd0b9369891b9bfe"}) 17:05:52 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 4: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/44) 17:05:52 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:52 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) 17:05:52 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) 17:05:52 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'team\x00'}, 0xb) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:52 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x2800) msgget(0x3, 0x200) 17:05:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:52 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (fail_nth: 1) 17:05:52 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:52 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) (fail_nth: 1) 17:05:52 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:52 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) (fail_nth: 1) 17:05:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) [ 463.019866] FAULT_INJECTION: forcing a failure. [ 463.019866] name failslab, interval 1, probability 0, space 0, times 0 [ 463.048463] FAULT_INJECTION: forcing a failure. [ 463.048463] name failslab, interval 1, probability 0, space 0, times 0 [ 463.065530] CPU: 1 PID: 27777 Comm: syz-executor.4 Not tainted 4.14.279-syzkaller #0 [ 463.073437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.082789] Call Trace: [ 463.085381] dump_stack+0x1b2/0x281 [ 463.089014] should_fail.cold+0x10a/0x149 [ 463.093162] ? 0xffffffff81000000 [ 463.096613] should_failslab+0xd6/0x130 [ 463.100589] kmem_cache_alloc+0x28e/0x3c0 [ 463.104733] ? 0xffffffff81000000 [ 463.108184] ? 0xffffffff81000000 [ 463.111635] getname_flags+0xc8/0x550 [ 463.115433] ? 0xffffffff81000000 17:05:53 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:53 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = gettid() getpgid(r0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xa6, 0x4}, 0x0, 0x0, 0x8000000000000001, 0xe8, 0x10001, 0x10000, 0x1, 0x3, 0x7, 0x200, r0}) [ 463.118887] do_sys_open+0x1ce/0x410 [ 463.122615] ? filp_open+0x60/0x60 [ 463.126155] ? __do_page_fault+0x159/0xad0 [ 463.130391] ? do_syscall_64+0x4c/0x640 [ 463.134363] ? SyS_open+0x30/0x30 [ 463.137817] do_syscall_64+0x1d5/0x640 [ 463.141728] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.146912] RIP: 0033:0x7fc025a770e9 [ 463.150677] RSP: 002b:00007fc0243ec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 463.158394] RAX: ffffffffffffffda RBX: 00007fc025b89f60 RCX: 00007fc025a770e9 17:05:53 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack team\x00'], 0xb) 17:05:53 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = gettid() getpgid(r0) (async, rerun: 32) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xa6, 0x4}, 0x0, 0x0, 0x8000000000000001, 0xe8, 0x10001, 0x10000, 0x1, 0x3, 0x7, 0x200, r0}) (rerun: 32) 17:05:53 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) [ 463.165672] RDX: 0000000000000002 RSI: ffffffff81000000 RDI: ffffffffffffff9c [ 463.172942] RBP: 00007fc0243ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.180210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.187480] R13: 00007ffcb8c0adef R14: 00007fc0243ec300 R15: 0000000000022000 [ 463.194761] ? 0xffffffff81000000 17:05:53 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xb) [ 463.221081] CPU: 1 PID: 27784 Comm: syz-executor.3 Not tainted 4.14.279-syzkaller #0 [ 463.228985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.238336] Call Trace: [ 463.240930] dump_stack+0x1b2/0x281 [ 463.244565] should_fail.cold+0x10a/0x149 [ 463.248727] should_failslab+0xd6/0x130 [ 463.252706] kmem_cache_alloc+0x28e/0x3c0 [ 463.256854] ? sock_destroy_inode+0x60/0x60 [ 463.261176] sock_alloc_inode+0x19/0x250 [ 463.265236] ? sock_destroy_inode+0x60/0x60 [ 463.269553] alloc_inode+0x5d/0x170 [ 463.273181] new_inode_pseudo+0x14/0xe0 [ 463.277152] sock_alloc+0x3c/0x270 [ 463.280687] __sock_create+0x8a/0x620 [ 463.284493] SyS_socket+0xd1/0x1b0 [ 463.288035] ? move_addr_to_kernel+0x60/0x60 [ 463.292441] ? __do_page_fault+0x159/0xad0 [ 463.296676] ? do_syscall_64+0x4c/0x640 [ 463.300647] ? move_addr_to_kernel+0x60/0x60 [ 463.305058] do_syscall_64+0x1d5/0x640 [ 463.308947] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.314143] RIP: 0033:0x7fd26ada80e9 [ 463.317846] RSP: 002b:00007fd26971d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 463.325548] RAX: ffffffffffffffda RBX: 00007fd26aebaf60 RCX: 00007fd26ada80e9 [ 463.332813] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 463.340082] RBP: 00007fd26971d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.347346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.354615] R13: 00007ffeb7c052df R14: 00007fd26971d300 R15: 0000000000022000 17:05:53 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (fail_nth: 2) 17:05:53 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xb) 17:05:53 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) (async) r0 = gettid() getpgid(r0) (async) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xa6, 0x4}, 0x0, 0x0, 0x8000000000000001, 0xe8, 0x10001, 0x10000, 0x1, 0x3, 0x7, 0x200, r0}) 17:05:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:53 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) (fail_nth: 2) 17:05:53 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) [ 463.373713] socket: no more sockets 17:05:53 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xb) 17:05:53 executing program 0: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:53 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:53 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000000)={0x1, "dea72e8fe3ade33948499dc08d49b882fcb20d19caab7ba932489d939baf79039dff780fd550d73ed623851d4dc59565c64414794e1ccff49602a406ceeaa65f00e90d445a60258f96935b05d4aecde50802da67a2e4133e451fbb38c4ed9b685e2f857ee999fca44da2ab3a17d3abf268ea5c943f3b64d86b8add816a96346303b2160325ded2c59ff291cca977713a2e3a94a8d7e67b4faff722411c932c50549df6dc9aa35caab14089711b21e8fc5d8743ee0de8a13128e17e0aa5c90f558ec0e9edd55e062eab"}, 0xd1, 0x0) r0 = msgget(0x2, 0x100) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000140)=""/50) msgrcv(r0, &(0x7f0000000100)={0x0, ""/40}, 0x30, 0x0, 0x1800) [ 463.416250] FAULT_INJECTION: forcing a failure. [ 463.416250] name failslab, interval 1, probability 0, space 0, times 0 [ 463.452901] FAULT_INJECTION: forcing a failure. [ 463.452901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 463.457023] CPU: 1 PID: 27822 Comm: syz-executor.3 Not tainted 4.14.279-syzkaller #0 [ 463.472595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.481935] Call Trace: [ 463.484509] dump_stack+0x1b2/0x281 [ 463.488121] should_fail.cold+0x10a/0x149 [ 463.492255] should_failslab+0xd6/0x130 [ 463.496209] kmem_cache_alloc_trace+0x29a/0x3d0 [ 463.500855] ? kmem_cache_alloc+0x35f/0x3c0 [ 463.505159] sock_alloc_inode+0x5f/0x250 [ 463.509200] ? sock_destroy_inode+0x60/0x60 [ 463.513499] alloc_inode+0x5d/0x170 [ 463.517108] new_inode_pseudo+0x14/0xe0 [ 463.521067] sock_alloc+0x3c/0x270 [ 463.524587] __sock_create+0x8a/0x620 [ 463.528371] SyS_socket+0xd1/0x1b0 [ 463.531895] ? move_addr_to_kernel+0x60/0x60 [ 463.536286] ? __do_page_fault+0x159/0xad0 [ 463.540501] ? do_syscall_64+0x4c/0x640 [ 463.544471] ? move_addr_to_kernel+0x60/0x60 [ 463.548866] do_syscall_64+0x1d5/0x640 [ 463.552739] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.557907] RIP: 0033:0x7fd26ada80e9 [ 463.561595] RSP: 002b:00007fd26971d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 463.569281] RAX: ffffffffffffffda RBX: 00007fd26aebaf60 RCX: 00007fd26ada80e9 [ 463.576529] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 463.583777] RBP: 00007fd26971d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.591027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.598281] R13: 00007ffeb7c052df R14: 00007fd26971d300 R15: 0000000000022000 [ 463.605545] CPU: 0 PID: 27826 Comm: syz-executor.4 Not tainted 4.14.279-syzkaller #0 [ 463.613423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.622781] Call Trace: [ 463.624821] socket: no more sockets [ 463.625362] dump_stack+0x1b2/0x281 [ 463.625376] should_fail.cold+0x10a/0x149 [ 463.625390] __alloc_pages_nodemask+0x22c/0x2720 [ 463.641479] ? lock_downgrade+0x740/0x740 [ 463.645637] ? __lock_acquire+0x5fc/0x3f20 [ 463.649877] ? get_pid_task+0x91/0x130 [ 463.653765] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 463.656800] FAULT_INJECTION: forcing a failure. [ 463.656800] name failslab, interval 1, probability 0, space 0, times 0 [ 463.658607] ? lock_downgrade+0x740/0x740 [ 463.673919] ? get_pid_task+0xb8/0x130 [ 463.677792] ? proc_fail_nth_write+0x7b/0x180 [ 463.682268] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 463.687190] cache_grow_begin+0x91/0x700 [ 463.691234] ? fs_reclaim_release+0xd0/0x110 [ 463.695625] ? check_preemption_disabled+0x35/0x240 [ 463.700623] cache_alloc_refill+0x273/0x350 [ 463.704928] kmem_cache_alloc+0x333/0x3c0 [ 463.709061] ? 0xffffffff81000000 [ 463.712494] ? 0xffffffff81000000 [ 463.715925] getname_flags+0xc8/0x550 [ 463.719718] ? 0xffffffff81000000 [ 463.723152] do_sys_open+0x1ce/0x410 [ 463.726847] ? filp_open+0x60/0x60 [ 463.730372] ? __do_page_fault+0x159/0xad0 [ 463.734585] ? do_syscall_64+0x4c/0x640 [ 463.738537] ? SyS_open+0x30/0x30 [ 463.741975] do_syscall_64+0x1d5/0x640 [ 463.745845] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.751015] RIP: 0033:0x7fc025a770e9 [ 463.754713] RSP: 002b:00007fc0243ec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 17:05:53 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) (fail_nth: 3) [ 463.762401] RAX: ffffffffffffffda RBX: 00007fc025b89f60 RCX: 00007fc025a770e9 [ 463.769653] RDX: 0000000000000002 RSI: ffffffff81000000 RDI: ffffffffffffff9c [ 463.776900] RBP: 00007fc0243ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.784147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.791395] R13: 00007ffcb8c0adef R14: 00007fc0243ec300 R15: 0000000000022000 [ 463.798662] ? 0xffffffff81000000 [ 463.802103] CPU: 1 PID: 27833 Comm: syz-executor.3 Not tainted 4.14.279-syzkaller #0 [ 463.809991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.819341] Call Trace: [ 463.821932] dump_stack+0x1b2/0x281 [ 463.825571] should_fail.cold+0x10a/0x149 [ 463.829739] should_failslab+0xd6/0x130 [ 463.833723] kmem_cache_alloc+0x28e/0x3c0 [ 463.837877] sk_prot_alloc+0x5f/0x290 [ 463.841679] sk_alloc+0x36/0xcd0 [ 463.845047] inet6_create+0x2df/0xe20 [ 463.848858] __sock_create+0x303/0x620 [ 463.852745] SyS_socket+0xd1/0x1b0 [ 463.856281] ? move_addr_to_kernel+0x60/0x60 [ 463.860687] ? __do_page_fault+0x159/0xad0 17:05:53 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000000)={0x1, "dea72e8fe3ade33948499dc08d49b882fcb20d19caab7ba932489d939baf79039dff780fd550d73ed623851d4dc59565c64414794e1ccff49602a406ceeaa65f00e90d445a60258f96935b05d4aecde50802da67a2e4133e451fbb38c4ed9b685e2f857ee999fca44da2ab3a17d3abf268ea5c943f3b64d86b8add816a96346303b2160325ded2c59ff291cca977713a2e3a94a8d7e67b4faff722411c932c50549df6dc9aa35caab14089711b21e8fc5d8743ee0de8a13128e17e0aa5c90f558ec0e9edd55e062eab"}, 0xd1, 0x0) (async) r0 = msgget(0x2, 0x100) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000140)=""/50) msgrcv(r0, &(0x7f0000000100)={0x0, ""/40}, 0x30, 0x0, 0x1800) [ 463.864917] ? do_syscall_64+0x4c/0x640 [ 463.868889] ? move_addr_to_kernel+0x60/0x60 [ 463.873297] do_syscall_64+0x1d5/0x640 [ 463.877188] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.882368] RIP: 0033:0x7fd26ada80e9 [ 463.886070] RSP: 002b:00007fd26971d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 463.893859] RAX: ffffffffffffffda RBX: 00007fd26aebaf60 RCX: 00007fd26ada80e9 [ 463.901126] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 463.908389] RBP: 00007fd26971d1d0 R08: 0000000000000000 R09: 0000000000000000 17:05:53 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (fail_nth: 3) 17:05:53 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:53 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[], 0xb) 17:05:53 executing program 0: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:53 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) (async) msgsnd(0xffffffffffffffff, &(0x7f0000000000)={0x1, "dea72e8fe3ade33948499dc08d49b882fcb20d19caab7ba932489d939baf79039dff780fd550d73ed623851d4dc59565c64414794e1ccff49602a406ceeaa65f00e90d445a60258f96935b05d4aecde50802da67a2e4133e451fbb38c4ed9b685e2f857ee999fca44da2ab3a17d3abf268ea5c943f3b64d86b8add816a96346303b2160325ded2c59ff291cca977713a2e3a94a8d7e67b4faff722411c932c50549df6dc9aa35caab14089711b21e8fc5d8743ee0de8a13128e17e0aa5c90f558ec0e9edd55e062eab"}, 0xd1, 0x0) (async) r0 = msgget(0x2, 0x100) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000140)=""/50) msgrcv(r0, &(0x7f0000000100)={0x0, ""/40}, 0x30, 0x0, 0x1800) 17:05:53 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2001, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) [ 463.915657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.922923] R13: 00007ffeb7c052df R14: 00007fd26971d300 R15: 0000000000022000 17:05:53 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:53 executing program 1: r0 = msgget(0x1, 0x110) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/238) msgctl$IPC_STAT(r0, 0x2, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/217) 17:05:53 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) (fail_nth: 4) 17:05:53 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[], 0xb) 17:05:53 executing program 0: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, &(0x7f0000000100)=""/4096, 0x1000) 17:05:53 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2001, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) 17:05:53 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2001, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) [ 464.046383] FAULT_INJECTION: forcing a failure. [ 464.046383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 464.058218] CPU: 0 PID: 27870 Comm: syz-executor.3 Not tainted 4.14.279-syzkaller #0 [ 464.058224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.058228] Call Trace: [ 464.058242] dump_stack+0x1b2/0x281 [ 464.058258] should_fail.cold+0x10a/0x149 [ 464.058273] __alloc_pages_nodemask+0x22c/0x2720 [ 464.058287] ? unwind_get_return_address+0x51/0x90 17:05:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, 0x0, 0x0) [ 464.058296] ? __save_stack_trace+0xa0/0x160 [ 464.058304] ? __save_stack_trace+0xa0/0x160 [ 464.058316] ? __lock_acquire+0x5fc/0x3f20 [ 464.058329] ? kasan_kmalloc+0x139/0x160 [ 464.058339] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 464.058346] ? static_obj+0x50/0x50 [ 464.058356] ? kmem_cache_alloc_trace+0x131/0x3d0 [ 464.058364] ? sock_alloc_inode+0x5f/0x250 [ 464.058373] ? alloc_inode+0x5d/0x170 [ 464.058391] ? __lock_acquire+0x5fc/0x3f20 [ 464.058406] cache_grow_begin+0x91/0x700 [ 464.058415] ? fs_reclaim_release+0xd0/0x110 17:05:54 executing program 4: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x40000) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) [ 464.058426] ? check_preemption_disabled+0x35/0x240 [ 464.058439] cache_alloc_refill+0x273/0x350 [ 464.058453] kmem_cache_alloc+0x333/0x3c0 [ 464.058465] sk_prot_alloc+0x5f/0x290 [ 464.058475] sk_alloc+0x36/0xcd0 [ 464.058488] inet6_create+0x2df/0xe20 [ 464.058514] __sock_create+0x303/0x620 [ 464.174844] SyS_socket+0xd1/0x1b0 [ 464.174855] ? move_addr_to_kernel+0x60/0x60 [ 464.182780] ? __do_page_fault+0x159/0xad0 [ 464.187016] ? do_syscall_64+0x4c/0x640 [ 464.190991] ? move_addr_to_kernel+0x60/0x60 17:05:54 executing program 4: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x40000) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x40000) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (async) [ 464.195399] do_syscall_64+0x1d5/0x640 [ 464.199288] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 464.204471] RIP: 0033:0x7fd26ada80e9 [ 464.208177] RSP: 002b:00007fd26971d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 464.215972] RAX: ffffffffffffffda RBX: 00007fd26aebaf60 RCX: 00007fd26ada80e9 [ 464.223238] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 464.230503] RBP: 00007fd26971d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 464.237777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:05:54 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[], 0xb) 17:05:54 executing program 1: r0 = msgget(0x1, 0x110) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/238) (async) msgctl$IPC_STAT(r0, 0x2, 0x0) (async) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/217) 17:05:54 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:54 executing program 4: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x40000) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) [ 464.245044] R13: 00007ffeb7c052df R14: 00007fd26971d300 R15: 0000000000022000 17:05:54 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) (fail_nth: 5) 17:05:54 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0xb) 17:05:54 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:54 executing program 1: r0 = msgget(0x1, 0x110) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/238) (async) msgctl$IPC_STAT(r0, 0x2, 0x0) (async, rerun: 64) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/217) (rerun: 64) 17:05:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, 0x0, 0x0) 17:05:54 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000040)={0x0, 0x4, 0x8, &(0x7f0000000000)=0x6e9}) 17:05:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, 0x0, 0x0) [ 464.348168] FAULT_INJECTION: forcing a failure. [ 464.348168] name failslab, interval 1, probability 0, space 0, times 0 [ 464.377628] CPU: 0 PID: 27914 Comm: syz-executor.3 Not tainted 4.14.279-syzkaller #0 [ 464.385530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.394882] Call Trace: [ 464.397475] dump_stack+0x1b2/0x281 [ 464.401113] should_fail.cold+0x10a/0x149 [ 464.405265] should_failslab+0xd6/0x130 [ 464.409247] kmem_cache_alloc+0x28e/0x3c0 [ 464.413396] get_empty_filp+0x86/0x3f0 [ 464.417286] alloc_file+0x23/0x440 [ 464.420832] sock_alloc_file+0x113/0x2e0 [ 464.424904] ? sock_poll+0x220/0x220 [ 464.428624] SyS_socket+0x108/0x1b0 [ 464.432250] ? move_addr_to_kernel+0x60/0x60 [ 464.436654] ? __do_page_fault+0x159/0xad0 [ 464.440886] ? do_syscall_64+0x4c/0x640 17:05:54 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) [ 464.444860] ? move_addr_to_kernel+0x60/0x60 [ 464.449263] do_syscall_64+0x1d5/0x640 [ 464.453149] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 464.458349] RIP: 0033:0x7fd26ada80e9 [ 464.462040] RSP: 002b:00007fd26971d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 464.469726] RAX: ffffffffffffffda RBX: 00007fd26aebaf60 RCX: 00007fd26ada80e9 [ 464.476970] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 464.484222] RBP: 00007fd26971d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 464.491489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:05:54 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000040)={0x0, 0x4, 0x8, &(0x7f0000000000)=0x6e9}) 17:05:54 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0xb) 17:05:54 executing program 1: ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/166) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgget(0x3, 0x16) r1 = msgget(0x1, 0x49) msgctl$IPC_STAT(r1, 0x2, 0x0) 17:05:54 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) [ 464.498736] R13: 00007ffeb7c052df R14: 00007fd26971d300 R15: 0000000000022000 17:05:54 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) (fail_nth: 6) 17:05:54 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000040)={0x0, 0x4, 0x8, &(0x7f0000000000)=0x6e9}) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (async) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000040)={0x0, 0x4, 0x8, &(0x7f0000000000)=0x6e9}) (async) 17:05:54 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) 17:05:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) (fail_nth: 1) 17:05:54 executing program 1: ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/166) (async) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) (async) msgget(0x3, 0x16) (async) r1 = msgget(0x1, 0x49) msgctl$IPC_STAT(r1, 0x2, 0x0) 17:05:54 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0xb) 17:05:54 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0, 0x0, r0}) 17:05:54 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:54 executing program 1: ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/166) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x1800) msgget(0x3, 0x16) (async) r1 = msgget(0x1, 0x49) msgctl$IPC_STAT(r1, 0x2, 0x0) 17:05:54 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:54 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0, 0x0, r0}) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0, 0x0, r0}) (async) [ 464.603088] FAULT_INJECTION: forcing a failure. [ 464.603088] name failslab, interval 1, probability 0, space 0, times 0 [ 464.630201] FAULT_INJECTION: forcing a failure. [ 464.630201] name failslab, interval 1, probability 0, space 0, times 0 17:05:54 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack '], 0xb) [ 464.677823] CPU: 0 PID: 27950 Comm: syz-executor.0 Not tainted 4.14.279-syzkaller #0 [ 464.685732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.695081] Call Trace: [ 464.697690] dump_stack+0x1b2/0x281 [ 464.701336] should_fail.cold+0x10a/0x149 [ 464.701351] should_failslab+0xd6/0x130 [ 464.701364] kmem_cache_alloc_node_trace+0x25a/0x400 [ 464.701377] __kmalloc_node+0x38/0x70 [ 464.701388] kvmalloc_node+0x46/0xd0 [ 464.701400] keyctl_read_key+0x1e4/0x400 [ 464.701414] SyS_keyctl+0x206/0x390 [ 464.701423] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 464.701433] do_syscall_64+0x1d5/0x640 [ 464.701447] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 464.701455] RIP: 0033:0x7fe60e94a0e9 [ 464.701460] RSP: 002b:00007fe60d2bf168 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 464.701478] RAX: ffffffffffffffda RBX: 00007fe60ea5cf60 RCX: 00007fe60e94a0e9 [ 464.701483] RDX: 0000000020000100 RSI: 000000000f611a5a RDI: 000000000000000b [ 464.701488] RBP: 00007fe60d2bf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 464.701493] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 464.701498] R13: 00007ffe6a0ee05f R14: 00007fe60d2bf300 R15: 0000000000022000 [ 464.720916] CPU: 0 PID: 27952 Comm: syz-executor.3 Not tainted 4.14.279-syzkaller #0 [ 464.813770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.813774] Call Trace: [ 464.813793] dump_stack+0x1b2/0x281 [ 464.829308] should_fail.cold+0x10a/0x149 [ 464.833441] should_failslab+0xd6/0x130 [ 464.837396] kmem_cache_alloc_trace+0x29a/0x3d0 [ 464.842044] apparmor_file_alloc_security+0x129/0x800 [ 464.847216] security_file_alloc+0x66/0xa0 [ 464.851427] ? selinux_is_enabled+0x5/0x50 [ 464.855639] get_empty_filp+0x16b/0x3f0 [ 464.859589] alloc_file+0x23/0x440 [ 464.863109] sock_alloc_file+0x113/0x2e0 [ 464.867164] ? sock_poll+0x220/0x220 [ 464.870855] SyS_socket+0x108/0x1b0 [ 464.874461] ? move_addr_to_kernel+0x60/0x60 [ 464.878847] ? __do_page_fault+0x159/0xad0 [ 464.883143] ? do_syscall_64+0x4c/0x640 [ 464.887094] ? move_addr_to_kernel+0x60/0x60 [ 464.891485] do_syscall_64+0x1d5/0x640 [ 464.895351] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 464.900516] RIP: 0033:0x7fd26ada80e9 [ 464.904203] RSP: 002b:00007fd26971d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 464.911885] RAX: ffffffffffffffda RBX: 00007fd26aebaf60 RCX: 00007fd26ada80e9 [ 464.919129] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 464.926372] RBP: 00007fd26971d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 464.933616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.940860] R13: 00007ffeb7c052df R14: 00007fd26971d300 R15: 0000000000022000 17:05:54 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) (fail_nth: 7) 17:05:54 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:05:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/4096, 0x1000) (fail_nth: 2) 17:05:54 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack '], 0xb) 17:05:54 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0, 0x0, r0}) 17:05:54 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000000)=""/252) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000200)={&(0x7f0000000180)=[0x0, r1, 0x0, 0x0, r2, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x7, 0x0, 0x5ff, 0x40], 0x400, 0x8, 0x1}) 17:05:55 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000000)=""/252) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000200)={&(0x7f0000000180)=[0x0, r1, 0x0, 0x0, r2, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x7, 0x0, 0x5ff, 0x40], 0x400, 0x8, 0x1}) msgctl$IPC_STAT(0x0, 0x2, 0x0) (async) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000000)=""/252) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)) (async) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000200)={&(0x7f0000000180)=[0x0, r1, 0x0, 0x0, r2, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x7, 0x0, 0x5ff, 0x40], 0x400, 0x8, 0x1}) (async) 17:05:55 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) bind$802154_dgram(r1, &(0x7f0000000080)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0102}}}, 0x14) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x7, 0x3a9, 0x4, 0x3, 0x2, 0xffffffff, 0x5, 0x101]) 17:05:55 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffffffffff9}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x66}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008004}, 0x4) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6b}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x18000, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg2\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}]}, 0x50}, 0x1, 0x0, 0x0, 0x40800}, 0x40801) 17:05:55 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack '], 0xb) 17:05:55 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) (fail_nth: 1) 17:05:55 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$read(0xb, r1, &(0x7f0000001100)=""/4101, 0x1005) 17:05:55 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) bind$802154_dgram(r1, &(0x7f0000000080)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0102}}}, 0x14) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x7, 0x3a9, 0x4, 0x3, 0x2, 0xffffffff, 0x5, 0x101]) 17:05:55 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000000)=""/252) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000200)={&(0x7f0000000180)=[0x0, r1, 0x0, 0x0, r2, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x7, 0x0, 0x5ff, 0x40], 0x400, 0x8, 0x1}) msgctl$IPC_STAT(0x0, 0x2, 0x0) (async) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000000)=""/252) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)) (async) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000200)={&(0x7f0000000180)=[0x0, r1, 0x0, 0x0, r2, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x7, 0x0, 0x5ff, 0x40], 0x400, 0x8, 0x1}) (async) 17:05:55 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack tea'], 0xb) 17:05:55 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffffffffff9}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x66}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008004}, 0x4) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6b}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x18000, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg2\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}]}, 0x50}, 0x1, 0x0, 0x0, 0x40800}, 0x40801) socket$l2tp6(0xa, 0x2, 0x73) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffffffffff9}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x66}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008004}, 0x4) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6b}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x18000, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg2\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}]}, 0x50}, 0x1, 0x0, 0x0, 0x40800}, 0x40801) (async) 17:05:55 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgget$private(0x0, 0x5a) 17:05:55 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) (async) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$read(0xb, r1, &(0x7f0000001100)=""/4101, 0x1005) [ 465.208976] FAULT_INJECTION: forcing a failure. [ 465.208976] name failslab, interval 1, probability 0, space 0, times 0 [ 465.233591] kauditd_printk_skb: 5 callbacks suppressed [ 465.233599] audit: type=1400 audit(1652807155.133:352): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=28021 comm="syz-executor.5" 17:05:55 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) (async, rerun: 32) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) (rerun: 32) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$read(0xb, r1, &(0x7f0000001100)=""/4101, 0x1005) 17:05:55 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgget$private(0x0, 0x5a) 17:05:55 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) (async) bind$802154_dgram(r1, &(0x7f0000000080)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0102}}}, 0x14) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x7, 0x3a9, 0x4, 0x3, 0x2, 0xffffffff, 0x5, 0x101]) 17:05:55 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='svack t'], 0xb) [ 465.273757] CPU: 0 PID: 28016 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 [ 465.281667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.291019] Call Trace: [ 465.293608] dump_stack+0x1b2/0x281 [ 465.297241] should_fail.cold+0x10a/0x149 [ 465.301398] should_failslab+0xd6/0x130 [ 465.305375] __kmalloc_track_caller+0x2bc/0x400 [ 465.310049] ? proc_pid_attr_write+0x16c/0x320 [ 465.314643] memdup_user+0x22/0xa0 [ 465.318184] proc_pid_attr_write+0x16c/0x320 17:05:55 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ':\x00'}, 0x7) (fail_nth: 2) [ 465.322623] __vfs_write+0xe4/0x630 17:05:55 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) msgget$private(0x0, 0x5a) 17:05:55 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000001340)=0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0xe8, 0x1, 0x8, 0xd4, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x5}, 0x48) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), r4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_tracing={0x1a, 0x2, &(0x7f0000001380)=ANY=[@ANYBLOB="1870000010000000000000008faa4cf5"], &(0x7f00000013c0)='GPL\x00', 0x1, 0x42, &(0x7f0000001400)=""/66, 0x41000, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000001100)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000014c0)={0x5, 0x6, 0x3, 0x8}, 0x10, 0x305c5, r0, 0x0, &(0x7f0000001500)=[r1, r4, r1]}, 0x80) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r5) keyctl$read(0xb, r5, &(0x7f0000000100)=""/4096, 0x1000) [ 465.322633] ? proc_pid_wchan+0xf0/0xf0 [ 465.322642] ? __handle_mm_fault+0x80f/0x4620 [ 465.322652] ? kernel_read+0x110/0x110 [ 465.322672] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.322684] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 465.322696] vfs_write+0x17f/0x4d0 [ 465.322708] SyS_write+0xf2/0x210 [ 465.322718] ? SyS_read+0x210/0x210 [ 465.322728] ? __do_page_fault+0x159/0xad0 [ 465.322737] ? do_syscall_64+0x4c/0x640 [ 465.322745] ? SyS_read+0x210/0x210 [ 465.322755] do_syscall_64+0x1d5/0x640 [ 465.322771] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 465.322779] RIP: 0033:0x7fcd888ce0e9 [ 465.322784] RSP: 002b:00007fcd87243168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 465.322794] RAX: ffffffffffffffda RBX: 00007fcd889e0f60 RCX: 00007fcd888ce0e9 [ 465.322800] RDX: 0000000000000007 RSI: 0000000020000080 RDI: 0000000000000003 [ 465.322806] RBP: 00007fcd872431d0 R08: 0000000000000000 R09: 0000000000000000 [ 465.322811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.322817] R13: 00007ffe35dbd40f R14: 00007fcd87243300 R15: 0000000000022000 [ 465.421726] audit: type=1400 audit(1652807155.323:353): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=28046 comm="syz-executor.5" [ 465.423365] FAULT_INJECTION: forcing a failure. [ 465.423365] name failslab, interval 1, probability 0, space 0, times 0 [ 465.423377] CPU: 0 PID: 28067 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 [ 465.423390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.423394] Call Trace: [ 465.423408] dump_stack+0x1b2/0x281 [ 465.423424] should_fail.cold+0x10a/0x149 [ 465.423438] should_failslab+0xd6/0x130 [ 465.423451] kmem_cache_alloc+0x28e/0x3c0 [ 465.423464] prepare_creds+0x39/0x490 [ 465.423475] aa_set_current_onexec+0x1e/0x200 [ 465.423490] aa_change_profile+0x120e/0x2440 [ 465.423508] ? aa_change_hat+0xf60/0xf60 [ 465.423518] ? depot_save_stack+0x10d/0x3f0 [ 465.423536] ? __lock_acquire+0x5fc/0x3f20 [ 465.423549] ? do_syscall_64+0x1d5/0x640 [ 465.423558] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 465.423567] ? __lock_acquire+0x5fc/0x3f20 [ 465.423588] apparmor_setprocattr+0x972/0xa80 [ 465.423601] ? apparmor_cred_free+0x70/0x70 [ 465.423611] ? aa_file_perm+0x2dd/0xab0 [ 465.423624] ? proc_pid_attr_write+0x1c0/0x320 [ 465.423642] ? __might_fault+0x177/0x1b0 [ 465.423661] security_setprocattr+0x74/0xb0 [ 465.423674] proc_pid_attr_write+0x22b/0x320 [ 465.423687] __vfs_write+0xe4/0x630 [ 465.423695] ? proc_pid_wchan+0xf0/0xf0 [ 465.423704] ? __handle_mm_fault+0x80f/0x4620 [ 465.423714] ? kernel_read+0x110/0x110 [ 465.423735] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.423747] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 465.423760] vfs_write+0x17f/0x4d0 [ 465.423772] SyS_write+0xf2/0x210 [ 465.423783] ? SyS_read+0x210/0x210 [ 465.423793] ? __do_page_fault+0x159/0xad0 [ 465.423801] ? do_syscall_64+0x4c/0x640 [ 465.423810] ? SyS_read+0x210/0x210 [ 465.423821] do_syscall_64+0x1d5/0x640 [ 465.423835] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 465.423843] RIP: 0033:0x7fcd888ce0e9 [ 465.423848] RSP: 002b:00007fcd87243168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 465.423859] RAX: ffffffffffffffda RBX: 00007fcd889e0f60 RCX: 00007fcd888ce0e9 [ 465.423864] RDX: 0000000000000007 RSI: 0000000020000080 RDI: 0000000000000003 [ 465.423869] RBP: 00007fcd872431d0 R08: 0000000000000000 R09: 0000000000000000 [ 465.423875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.423880] R13: 00007ffe35dbd40f R14: 00007fcd87243300 R15: 0000000000022000 [ 465.426276] AppArmor WARN aa_audit_file: ((!((&sa)->apparmor_audit_data)->request)): [ 465.426517] ------------[ cut here ]------------ [ 465.426534] WARNING: CPU: 0 PID: 28067 at security/apparmor/file.c:136 aa_audit_file.cold+0x18/0x4f [ 465.426541] Kernel panic - not syncing: panic_on_warn set ... [ 465.426541] [ 465.426550] CPU: 0 PID: 28067 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 [ 465.426556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.426559] Call Trace: [ 465.426572] dump_stack+0x1b2/0x281 [ 465.426586] panic+0x1f9/0x42d [ 465.426596] ? add_taint.cold+0x16/0x16 [ 465.426610] ? aa_audit_file.cold+0x18/0x4f [ 465.426618] ? __warn.cold+0x5/0x44 [ 465.426630] ? aa_audit_file.cold+0x18/0x4f [ 465.426640] __warn.cold+0x20/0x44 [ 465.426650] ? ist_end_non_atomic+0x10/0x10 [ 465.426660] ? aa_audit_file.cold+0x18/0x4f [ 465.426670] report_bug+0x208/0x250 [ 465.426684] do_error_trap+0x195/0x2d0 [ 465.426695] ? math_error+0x2d0/0x2d0 [ 465.426704] ? mark_held_locks+0xa6/0xf0 [ 465.426714] ? vprintk_emit+0x4e1/0x620 [ 465.426726] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 465.426736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 465.426751] invalid_op+0x1b/0x40 [ 465.426761] RIP: 0010:aa_audit_file.cold+0x18/0x4f [ 465.426766] RSP: 0018:ffff888086d3f7c8 EFLAGS: 00010282 [ 465.426775] RAX: 0000000000000049 RBX: 1ffff11010da7efc RCX: 0000000000000000 [ 465.426781] RDX: 000000000000a5a7 RSI: ffffffff81443120 RDI: ffffed1010da7eef [ 465.426787] RBP: ffff888086d3f9f0 R08: 0000000000000049 R09: 0000000000000000 [ 465.426792] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffff4 [ 465.426798] R13: ffff88823f8b8d80 R14: ffff888086d3f840 R15: 0000000000000000 [ 465.426814] ? vprintk_func+0x60/0x160 [ 465.426827] ? aa_audit_file.cold+0x18/0x4f [ 465.426839] ? file_audit_cb+0x670/0x670 [ 465.426851] ? prepare_creds+0x39/0x490 [ 465.426861] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.426876] ? prepare_creds+0x3c9/0x490 [ 465.426888] aa_change_profile+0xcd3/0x2440 [ 465.426909] ? aa_change_hat+0xf60/0xf60 [ 465.426918] ? depot_save_stack+0x10d/0x3f0 [ 465.426934] ? __lock_acquire+0x5fc/0x3f20 [ 465.426945] ? do_syscall_64+0x1d5/0x640 [ 465.426954] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 465.426963] ? __lock_acquire+0x5fc/0x3f20 [ 465.426983] apparmor_setprocattr+0x972/0xa80 [ 465.426996] ? apparmor_cred_free+0x70/0x70 [ 465.427006] ? aa_file_perm+0x2dd/0xab0 [ 465.427019] ? proc_pid_attr_write+0x1c0/0x320 [ 465.427036] ? __might_fault+0x177/0x1b0 [ 465.427049] security_setprocattr+0x74/0xb0 [ 465.427062] proc_pid_attr_write+0x22b/0x320 [ 465.427075] __vfs_write+0xe4/0x630 [ 465.427083] ? proc_pid_wchan+0xf0/0xf0 [ 465.427092] ? __handle_mm_fault+0x80f/0x4620 [ 465.427102] ? kernel_read+0x110/0x110 [ 465.427120] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.427131] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 465.427144] vfs_write+0x17f/0x4d0 [ 465.427156] SyS_write+0xf2/0x210 [ 465.427166] ? SyS_read+0x210/0x210 [ 465.427175] ? __do_page_fault+0x159/0xad0 [ 465.427184] ? do_syscall_64+0x4c/0x640 [ 465.427192] ? SyS_read+0x210/0x210 [ 465.427202] do_syscall_64+0x1d5/0x640 [ 465.427216] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 465.427223] RIP: 0033:0x7fcd888ce0e9 [ 465.427228] RSP: 002b:00007fcd87243168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 465.427238] RAX: ffffffffffffffda RBX: 00007fcd889e0f60 RCX: 00007fcd888ce0e9 [ 465.427243] RDX: 0000000000000007 RSI: 0000000020000080 RDI: 0000000000000003 [ 465.427259] RBP: 00007fcd872431d0 R08: 0000000000000000 R09: 0000000000000000 [ 465.427265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.427271] R13: 00007ffe35dbd40f R14: 00007fcd87243300 R15: 0000000000022000 [ 465.427693] Kernel Offset: disabled